Oct 2 19:07:03.197882 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:07:03.197916 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:07:03.197932 kernel: BIOS-provided physical RAM map: Oct 2 19:07:03.197944 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 2 19:07:03.197955 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 2 19:07:03.197966 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 2 19:07:03.197982 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Oct 2 19:07:03.197994 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Oct 2 19:07:03.198005 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Oct 2 19:07:03.198016 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 2 19:07:03.198027 kernel: NX (Execute Disable) protection: active Oct 2 19:07:03.198039 kernel: SMBIOS 2.7 present. Oct 2 19:07:03.198050 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Oct 2 19:07:03.198062 kernel: Hypervisor detected: KVM Oct 2 19:07:03.198079 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:07:03.198091 kernel: kvm-clock: cpu 0, msr 39f8a001, primary cpu clock Oct 2 19:07:03.198104 kernel: kvm-clock: using sched offset of 5837318726 cycles Oct 2 19:07:03.198117 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:07:03.198130 kernel: tsc: Detected 2499.996 MHz processor Oct 2 19:07:03.198141 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:07:03.198157 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:07:03.198170 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Oct 2 19:07:03.198183 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:07:03.198195 kernel: Using GB pages for direct mapping Oct 2 19:07:03.198208 kernel: ACPI: Early table checksum verification disabled Oct 2 19:07:03.198220 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Oct 2 19:07:03.198233 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Oct 2 19:07:03.198246 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Oct 2 19:07:03.198265 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Oct 2 19:07:03.198281 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Oct 2 19:07:03.198294 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:07:03.198307 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Oct 2 19:07:03.198319 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Oct 2 19:07:03.198332 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Oct 2 19:07:03.198344 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Oct 2 19:07:03.198357 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Oct 2 19:07:03.198370 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:07:03.198386 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Oct 2 19:07:03.198398 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Oct 2 19:07:03.198412 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Oct 2 19:07:03.198430 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Oct 2 19:07:03.198443 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Oct 2 19:07:03.198457 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Oct 2 19:07:03.198471 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Oct 2 19:07:03.198487 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Oct 2 19:07:03.198501 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Oct 2 19:07:03.198514 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Oct 2 19:07:03.198528 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:07:03.198542 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:07:03.198555 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Oct 2 19:07:03.198569 kernel: NUMA: Initialized distance table, cnt=1 Oct 2 19:07:03.198581 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Oct 2 19:07:03.198598 kernel: Zone ranges: Oct 2 19:07:03.198612 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:07:03.198626 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Oct 2 19:07:03.198649 kernel: Normal empty Oct 2 19:07:03.198661 kernel: Movable zone start for each node Oct 2 19:07:03.198671 kernel: Early memory node ranges Oct 2 19:07:03.198681 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 2 19:07:03.198691 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Oct 2 19:07:03.198702 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Oct 2 19:07:03.198717 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:07:03.198729 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 2 19:07:03.198740 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Oct 2 19:07:03.198751 kernel: ACPI: PM-Timer IO Port: 0xb008 Oct 2 19:07:03.198762 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:07:03.198773 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Oct 2 19:07:03.198785 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:07:03.200086 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:07:03.200108 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:07:03.200128 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:07:03.200143 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:07:03.200157 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 2 19:07:03.200168 kernel: TSC deadline timer available Oct 2 19:07:03.200182 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:07:03.200196 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Oct 2 19:07:03.200210 kernel: Booting paravirtualized kernel on KVM Oct 2 19:07:03.200223 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:07:03.200237 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:07:03.200255 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:07:03.200268 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:07:03.200282 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:07:03.200294 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Oct 2 19:07:03.200307 kernel: kvm-guest: PV spinlocks enabled Oct 2 19:07:03.200320 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:07:03.200332 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Oct 2 19:07:03.200345 kernel: Policy zone: DMA32 Oct 2 19:07:03.200363 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:07:03.200382 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:07:03.200396 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:07:03.200488 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:07:03.200501 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:07:03.200515 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 121024K reserved, 0K cma-reserved) Oct 2 19:07:03.200529 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:07:03.200544 kernel: Kernel/User page tables isolation: enabled Oct 2 19:07:03.200558 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:07:03.200575 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:07:03.200591 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:07:03.200607 kernel: rcu: RCU event tracing is enabled. Oct 2 19:07:03.200694 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:07:03.200714 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:07:03.200726 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:07:03.200739 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:07:03.200751 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:07:03.200764 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Oct 2 19:07:03.200781 kernel: random: crng init done Oct 2 19:07:03.200793 kernel: Console: colour VGA+ 80x25 Oct 2 19:07:03.200806 kernel: printk: console [ttyS0] enabled Oct 2 19:07:03.200819 kernel: ACPI: Core revision 20210730 Oct 2 19:07:03.200833 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Oct 2 19:07:03.200847 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:07:03.200861 kernel: x2apic enabled Oct 2 19:07:03.200875 kernel: Switched APIC routing to physical x2apic. Oct 2 19:07:03.200890 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Oct 2 19:07:03.200907 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996) Oct 2 19:07:03.200921 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:07:03.200935 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:07:03.200946 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:07:03.200999 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:07:03.201017 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:07:03.201031 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:07:03.201047 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Oct 2 19:07:03.201062 kernel: RETBleed: Vulnerable Oct 2 19:07:03.201077 kernel: Speculative Store Bypass: Vulnerable Oct 2 19:07:03.201092 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:07:03.201107 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:07:03.201122 kernel: GDS: Unknown: Dependent on hypervisor status Oct 2 19:07:03.201145 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:07:03.201164 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:07:03.201180 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:07:03.201195 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Oct 2 19:07:03.201210 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Oct 2 19:07:03.201226 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Oct 2 19:07:03.201244 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Oct 2 19:07:03.201259 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Oct 2 19:07:03.201293 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Oct 2 19:07:03.201309 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:07:03.201324 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Oct 2 19:07:03.201339 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Oct 2 19:07:03.201355 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Oct 2 19:07:03.201370 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Oct 2 19:07:03.201385 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Oct 2 19:07:03.201398 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Oct 2 19:07:03.201411 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Oct 2 19:07:03.201425 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:07:03.201444 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:07:03.201459 kernel: LSM: Security Framework initializing Oct 2 19:07:03.201474 kernel: SELinux: Initializing. Oct 2 19:07:03.201489 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:07:03.201505 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:07:03.201520 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Oct 2 19:07:03.201535 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Oct 2 19:07:03.201550 kernel: signal: max sigframe size: 3632 Oct 2 19:07:03.201565 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:07:03.201581 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:07:03.201600 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:07:03.201615 kernel: x86: Booting SMP configuration: Oct 2 19:07:03.201630 kernel: .... node #0, CPUs: #1 Oct 2 19:07:03.201673 kernel: kvm-clock: cpu 1, msr 39f8a041, secondary cpu clock Oct 2 19:07:03.201688 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Oct 2 19:07:03.201703 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Oct 2 19:07:03.201719 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:07:03.201734 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:07:03.201750 kernel: smpboot: Max logical packages: 1 Oct 2 19:07:03.201769 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS) Oct 2 19:07:03.201784 kernel: devtmpfs: initialized Oct 2 19:07:03.201799 kernel: x86/mm: Memory block size: 128MB Oct 2 19:07:03.201815 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:07:03.201832 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:07:03.201847 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:07:03.201862 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:07:03.201878 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:07:03.201893 kernel: audit: type=2000 audit(1696273621.613:1): state=initialized audit_enabled=0 res=1 Oct 2 19:07:03.201911 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:07:03.201926 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:07:03.201941 kernel: cpuidle: using governor menu Oct 2 19:07:03.201955 kernel: ACPI: bus type PCI registered Oct 2 19:07:03.201968 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:07:03.201980 kernel: dca service started, version 1.12.1 Oct 2 19:07:03.201995 kernel: PCI: Using configuration type 1 for base access Oct 2 19:07:03.202010 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:07:03.202026 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:07:03.202046 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:07:03.202063 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:07:03.202079 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:07:03.202095 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:07:03.202112 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:07:03.202128 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:07:03.202143 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:07:03.202159 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:07:03.202174 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Oct 2 19:07:03.202192 kernel: ACPI: Interpreter enabled Oct 2 19:07:03.202207 kernel: ACPI: PM: (supports S0 S5) Oct 2 19:07:03.202222 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:07:03.202238 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:07:03.202253 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Oct 2 19:07:03.202269 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:07:03.202475 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:07:03.202889 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Oct 2 19:07:03.202921 kernel: acpiphp: Slot [3] registered Oct 2 19:07:03.202937 kernel: acpiphp: Slot [4] registered Oct 2 19:07:03.202953 kernel: acpiphp: Slot [5] registered Oct 2 19:07:03.202968 kernel: acpiphp: Slot [6] registered Oct 2 19:07:03.202984 kernel: acpiphp: Slot [7] registered Oct 2 19:07:03.203000 kernel: acpiphp: Slot [8] registered Oct 2 19:07:03.203016 kernel: acpiphp: Slot [9] registered Oct 2 19:07:03.203032 kernel: acpiphp: Slot [10] registered Oct 2 19:07:03.203048 kernel: acpiphp: Slot [11] registered Oct 2 19:07:03.203066 kernel: acpiphp: Slot [12] registered Oct 2 19:07:03.203083 kernel: acpiphp: Slot [13] registered Oct 2 19:07:03.203098 kernel: acpiphp: Slot [14] registered Oct 2 19:07:03.203111 kernel: acpiphp: Slot [15] registered Oct 2 19:07:03.203125 kernel: acpiphp: Slot [16] registered Oct 2 19:07:03.203140 kernel: acpiphp: Slot [17] registered Oct 2 19:07:03.203155 kernel: acpiphp: Slot [18] registered Oct 2 19:07:03.203170 kernel: acpiphp: Slot [19] registered Oct 2 19:07:03.203184 kernel: acpiphp: Slot [20] registered Oct 2 19:07:03.203202 kernel: acpiphp: Slot [21] registered Oct 2 19:07:03.203217 kernel: acpiphp: Slot [22] registered Oct 2 19:07:03.203232 kernel: acpiphp: Slot [23] registered Oct 2 19:07:03.203246 kernel: acpiphp: Slot [24] registered Oct 2 19:07:03.203261 kernel: acpiphp: Slot [25] registered Oct 2 19:07:03.203275 kernel: acpiphp: Slot [26] registered Oct 2 19:07:03.203290 kernel: acpiphp: Slot [27] registered Oct 2 19:07:03.203305 kernel: acpiphp: Slot [28] registered Oct 2 19:07:03.203321 kernel: acpiphp: Slot [29] registered Oct 2 19:07:03.203337 kernel: acpiphp: Slot [30] registered Oct 2 19:07:03.203354 kernel: acpiphp: Slot [31] registered Oct 2 19:07:03.203370 kernel: PCI host bridge to bus 0000:00 Oct 2 19:07:03.203558 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:07:03.203775 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:07:03.204004 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:07:03.204121 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Oct 2 19:07:03.204246 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:07:03.204414 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:07:03.204555 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Oct 2 19:07:03.204796 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Oct 2 19:07:03.204932 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Oct 2 19:07:03.205055 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Oct 2 19:07:03.205215 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Oct 2 19:07:03.205345 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Oct 2 19:07:03.205476 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Oct 2 19:07:03.205604 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Oct 2 19:07:03.205764 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Oct 2 19:07:03.205891 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Oct 2 19:07:03.206017 kernel: pci 0000:00:01.3: quirk_piix4_acpi+0x0/0x170 took 13671 usecs Oct 2 19:07:03.206152 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Oct 2 19:07:03.206281 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Oct 2 19:07:03.206412 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Oct 2 19:07:03.206538 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:07:03.206694 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Oct 2 19:07:03.206924 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Oct 2 19:07:03.207073 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Oct 2 19:07:03.207204 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Oct 2 19:07:03.207228 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:07:03.207243 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:07:03.207258 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:07:03.207274 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:07:03.207298 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:07:03.207314 kernel: iommu: Default domain type: Translated Oct 2 19:07:03.207329 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:07:03.207456 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Oct 2 19:07:03.207607 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:07:03.207781 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Oct 2 19:07:03.207800 kernel: vgaarb: loaded Oct 2 19:07:03.207814 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:07:03.207830 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:07:03.207845 kernel: PTP clock support registered Oct 2 19:07:03.207860 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:07:03.207875 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:07:03.207890 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 2 19:07:03.207908 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Oct 2 19:07:03.207923 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Oct 2 19:07:03.207938 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Oct 2 19:07:03.207953 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:07:03.208055 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:07:03.208071 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:07:03.208087 kernel: pnp: PnP ACPI init Oct 2 19:07:03.208102 kernel: pnp: PnP ACPI: found 5 devices Oct 2 19:07:03.208118 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:07:03.208136 kernel: NET: Registered PF_INET protocol family Oct 2 19:07:03.208151 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:07:03.208165 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 2 19:07:03.208180 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:07:03.208195 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:07:03.208209 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 19:07:03.208224 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 2 19:07:03.208239 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:07:03.208255 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:07:03.208272 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:07:03.208287 kernel: NET: Registered PF_XDP protocol family Oct 2 19:07:03.208419 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:07:03.208536 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:07:03.208717 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:07:03.208838 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Oct 2 19:07:03.208975 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:07:03.209108 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Oct 2 19:07:03.209132 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:07:03.209220 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:07:03.209237 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Oct 2 19:07:03.209252 kernel: clocksource: Switched to clocksource tsc Oct 2 19:07:03.209267 kernel: Initialise system trusted keyrings Oct 2 19:07:03.209282 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 2 19:07:03.209297 kernel: Key type asymmetric registered Oct 2 19:07:03.209312 kernel: Asymmetric key parser 'x509' registered Oct 2 19:07:03.209331 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:07:03.209347 kernel: io scheduler mq-deadline registered Oct 2 19:07:03.209363 kernel: io scheduler kyber registered Oct 2 19:07:03.209378 kernel: io scheduler bfq registered Oct 2 19:07:03.209393 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:07:03.209409 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:07:03.209424 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:07:03.209439 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:07:03.209455 kernel: i8042: Warning: Keylock active Oct 2 19:07:03.209472 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:07:03.209487 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:07:03.209651 kernel: rtc_cmos 00:00: RTC can wake from S4 Oct 2 19:07:03.209776 kernel: rtc_cmos 00:00: registered as rtc0 Oct 2 19:07:03.209895 kernel: rtc_cmos 00:00: setting system clock to 2023-10-02T19:07:02 UTC (1696273622) Oct 2 19:07:03.210085 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Oct 2 19:07:03.210105 kernel: intel_pstate: CPU model not supported Oct 2 19:07:03.210118 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:07:03.210136 kernel: Segment Routing with IPv6 Oct 2 19:07:03.210150 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:07:03.210162 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:07:03.210179 kernel: Key type dns_resolver registered Oct 2 19:07:03.210197 kernel: IPI shorthand broadcast: enabled Oct 2 19:07:03.210216 kernel: sched_clock: Marking stable (618495406, 315627184)->(1096768548, -162645958) Oct 2 19:07:03.210234 kernel: registered taskstats version 1 Oct 2 19:07:03.210247 kernel: Loading compiled-in X.509 certificates Oct 2 19:07:03.210261 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:07:03.210279 kernel: Key type .fscrypt registered Oct 2 19:07:03.210366 kernel: Key type fscrypt-provisioning registered Oct 2 19:07:03.210384 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:07:03.210399 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:07:03.210414 kernel: ima: No architecture policies found Oct 2 19:07:03.210428 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:07:03.210443 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:07:03.210457 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:07:03.210472 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:07:03.210490 kernel: Run /init as init process Oct 2 19:07:03.210505 kernel: with arguments: Oct 2 19:07:03.210604 kernel: /init Oct 2 19:07:03.210621 kernel: with environment: Oct 2 19:07:03.210635 kernel: HOME=/ Oct 2 19:07:03.228860 kernel: TERM=linux Oct 2 19:07:03.228878 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:07:03.228899 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:07:03.228927 systemd[1]: Detected virtualization amazon. Oct 2 19:07:03.228943 systemd[1]: Detected architecture x86-64. Oct 2 19:07:03.228958 systemd[1]: Running in initrd. Oct 2 19:07:03.228973 systemd[1]: No hostname configured, using default hostname. Oct 2 19:07:03.229003 systemd[1]: Hostname set to . Oct 2 19:07:03.229025 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:07:03.229041 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:07:03.229057 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:07:03.229073 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:07:03.229091 systemd[1]: Reached target cryptsetup.target. Oct 2 19:07:03.229106 systemd[1]: Reached target paths.target. Oct 2 19:07:03.229122 systemd[1]: Reached target slices.target. Oct 2 19:07:03.229138 systemd[1]: Reached target swap.target. Oct 2 19:07:03.229153 systemd[1]: Reached target timers.target. Oct 2 19:07:03.229173 systemd[1]: Listening on iscsid.socket. Oct 2 19:07:03.229189 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:07:03.229205 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:07:03.229221 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:07:03.229237 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:07:03.229252 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:07:03.229269 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:07:03.229288 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:07:03.229303 systemd[1]: Reached target sockets.target. Oct 2 19:07:03.229319 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:07:03.229335 systemd[1]: Finished network-cleanup.service. Oct 2 19:07:03.229351 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:07:03.229366 systemd[1]: Starting systemd-journald.service... Oct 2 19:07:03.229383 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:07:03.229399 systemd[1]: Starting systemd-resolved.service... Oct 2 19:07:03.229415 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:07:03.229440 systemd-journald[185]: Journal started Oct 2 19:07:03.229542 systemd-journald[185]: Runtime Journal (/run/log/journal/ec203bc52ca9df5f81522077298ec65f) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:07:03.218041 systemd-modules-load[186]: Inserted module 'overlay' Oct 2 19:07:03.442067 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:07:03.442092 kernel: Bridge firewalling registered Oct 2 19:07:03.442104 kernel: SCSI subsystem initialized Oct 2 19:07:03.442114 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:07:03.442129 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:07:03.442143 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:07:03.442154 systemd[1]: Started systemd-journald.service. Oct 2 19:07:03.274500 systemd-modules-load[186]: Inserted module 'br_netfilter' Oct 2 19:07:03.330484 systemd-resolved[187]: Positive Trust Anchors: Oct 2 19:07:03.330502 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:07:03.454153 kernel: audit: type=1130 audit(1696273623.446:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.330552 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:07:03.476818 kernel: audit: type=1130 audit(1696273623.453:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.335368 systemd-resolved[187]: Defaulting to hostname 'linux'. Oct 2 19:07:03.335756 systemd-modules-load[186]: Inserted module 'dm_multipath' Oct 2 19:07:03.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.454303 systemd[1]: Started systemd-resolved.service. Oct 2 19:07:03.477161 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:07:03.500482 kernel: audit: type=1130 audit(1696273623.483:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.500517 kernel: audit: type=1130 audit(1696273623.493:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.486046 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:07:03.501916 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:07:03.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.504535 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:07:03.509683 kernel: audit: type=1130 audit(1696273623.502:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.516091 systemd[1]: Reached target nss-lookup.target. Oct 2 19:07:03.526285 kernel: audit: type=1130 audit(1696273623.513:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.527602 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:07:03.531117 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:07:03.534305 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:07:03.567882 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:07:03.576662 kernel: audit: type=1130 audit(1696273623.566:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.582386 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:07:03.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.588662 kernel: audit: type=1130 audit(1696273623.580:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.590282 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:07:03.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.602260 kernel: audit: type=1130 audit(1696273623.591:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.600686 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:07:03.619769 dracut-cmdline[207]: dracut-dracut-053 Oct 2 19:07:03.623998 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:07:03.711702 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:07:03.725663 kernel: iscsi: registered transport (tcp) Oct 2 19:07:03.751786 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:07:03.751860 kernel: QLogic iSCSI HBA Driver Oct 2 19:07:03.793011 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:07:03.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:03.797128 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:07:03.854981 kernel: raid6: avx512x4 gen() 14654 MB/s Oct 2 19:07:03.873744 kernel: raid6: avx512x4 xor() 5156 MB/s Oct 2 19:07:03.893730 kernel: raid6: avx512x2 gen() 11834 MB/s Oct 2 19:07:03.910702 kernel: raid6: avx512x2 xor() 9028 MB/s Oct 2 19:07:03.927701 kernel: raid6: avx512x1 gen() 10529 MB/s Oct 2 19:07:03.945812 kernel: raid6: avx512x1 xor() 19260 MB/s Oct 2 19:07:03.962690 kernel: raid6: avx2x4 gen() 16129 MB/s Oct 2 19:07:03.979677 kernel: raid6: avx2x4 xor() 5255 MB/s Oct 2 19:07:03.996695 kernel: raid6: avx2x2 gen() 16841 MB/s Oct 2 19:07:04.014687 kernel: raid6: avx2x2 xor() 15935 MB/s Oct 2 19:07:04.032678 kernel: raid6: avx2x1 gen() 8819 MB/s Oct 2 19:07:04.049684 kernel: raid6: avx2x1 xor() 12547 MB/s Oct 2 19:07:04.069698 kernel: raid6: sse2x4 gen() 7349 MB/s Oct 2 19:07:04.086687 kernel: raid6: sse2x4 xor() 5620 MB/s Oct 2 19:07:04.103691 kernel: raid6: sse2x2 gen() 9927 MB/s Oct 2 19:07:04.120687 kernel: raid6: sse2x2 xor() 5657 MB/s Oct 2 19:07:04.137958 kernel: raid6: sse2x1 gen() 6837 MB/s Oct 2 19:07:04.155827 kernel: raid6: sse2x1 xor() 3990 MB/s Oct 2 19:07:04.155904 kernel: raid6: using algorithm avx2x2 gen() 16841 MB/s Oct 2 19:07:04.155933 kernel: raid6: .... xor() 15935 MB/s, rmw enabled Oct 2 19:07:04.156921 kernel: raid6: using avx512x2 recovery algorithm Oct 2 19:07:04.171670 kernel: xor: automatically using best checksumming function avx Oct 2 19:07:04.285671 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:07:04.294940 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:07:04.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:04.295000 audit: BPF prog-id=7 op=LOAD Oct 2 19:07:04.295000 audit: BPF prog-id=8 op=LOAD Oct 2 19:07:04.297387 systemd[1]: Starting systemd-udevd.service... Oct 2 19:07:04.334256 systemd-udevd[385]: Using default interface naming scheme 'v252'. Oct 2 19:07:04.342174 systemd[1]: Started systemd-udevd.service. Oct 2 19:07:04.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:04.345260 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:07:04.373100 dracut-pre-trigger[393]: rd.md=0: removing MD RAID activation Oct 2 19:07:04.421904 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:07:04.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:04.425044 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:07:04.515471 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:07:04.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:04.597659 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:07:04.625724 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:07:04.625792 kernel: AES CTR mode by8 optimization enabled Oct 2 19:07:04.658677 kernel: ena 0000:00:05.0: ENA device version: 0.10 Oct 2 19:07:04.658932 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Oct 2 19:07:04.662779 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Oct 2 19:07:04.675763 kernel: nvme nvme0: pci function 0000:00:04.0 Oct 2 19:07:04.676031 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Oct 2 19:07:04.676052 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:83:6a:52:16:d7 Oct 2 19:07:04.688043 kernel: nvme nvme0: 2/0/0 default/read/poll queues Oct 2 19:07:04.691664 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:07:04.691731 kernel: GPT:9289727 != 16777215 Oct 2 19:07:04.691750 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:07:04.691769 kernel: GPT:9289727 != 16777215 Oct 2 19:07:04.691785 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:07:04.691805 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:07:04.694157 (udev-worker)[435]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:07:04.908020 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (432) Oct 2 19:07:04.828508 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:07:04.931331 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:07:04.931469 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:07:04.949963 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:07:04.962371 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:07:04.965042 systemd[1]: Starting disk-uuid.service... Oct 2 19:07:04.974341 disk-uuid[578]: Primary Header is updated. Oct 2 19:07:04.974341 disk-uuid[578]: Secondary Entries is updated. Oct 2 19:07:04.974341 disk-uuid[578]: Secondary Header is updated. Oct 2 19:07:04.981670 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:07:04.992158 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:07:04.998661 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:07:05.999845 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:07:06.003828 disk-uuid[579]: The operation has completed successfully. Oct 2 19:07:06.174506 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:07:06.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.174677 systemd[1]: Finished disk-uuid.service. Oct 2 19:07:06.189057 systemd[1]: Starting verity-setup.service... Oct 2 19:07:06.220673 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:07:06.345515 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:07:06.349003 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:07:06.368377 systemd[1]: Finished verity-setup.service. Oct 2 19:07:06.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.499670 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:07:06.500447 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:07:06.502906 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:07:06.505357 systemd[1]: Starting ignition-setup.service... Oct 2 19:07:06.507801 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:07:06.531182 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:07:06.531348 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:07:06.531425 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:07:06.547676 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:07:06.561780 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:07:06.587604 systemd[1]: Finished ignition-setup.service. Oct 2 19:07:06.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.596561 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:07:06.636359 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:07:06.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.637000 audit: BPF prog-id=9 op=LOAD Oct 2 19:07:06.639803 systemd[1]: Starting systemd-networkd.service... Oct 2 19:07:06.668056 systemd-networkd[1091]: lo: Link UP Oct 2 19:07:06.668070 systemd-networkd[1091]: lo: Gained carrier Oct 2 19:07:06.671327 systemd-networkd[1091]: Enumeration completed Oct 2 19:07:06.672511 systemd[1]: Started systemd-networkd.service. Oct 2 19:07:06.673053 systemd-networkd[1091]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:07:06.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.675992 systemd[1]: Reached target network.target. Oct 2 19:07:06.679255 systemd-networkd[1091]: eth0: Link UP Oct 2 19:07:06.679261 systemd-networkd[1091]: eth0: Gained carrier Oct 2 19:07:06.679705 systemd[1]: Starting iscsiuio.service... Oct 2 19:07:06.688834 systemd[1]: Started iscsiuio.service. Oct 2 19:07:06.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.691706 systemd[1]: Starting iscsid.service... Oct 2 19:07:06.698651 iscsid[1096]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:07:06.698651 iscsid[1096]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 2 19:07:06.698651 iscsid[1096]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:07:06.698651 iscsid[1096]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:07:06.698651 iscsid[1096]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:07:06.698651 iscsid[1096]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:07:06.698651 iscsid[1096]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:07:06.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.699444 systemd[1]: Started iscsid.service. Oct 2 19:07:06.700857 systemd-networkd[1091]: eth0: DHCPv4 address 172.31.17.113/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:07:06.703051 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:07:06.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.726491 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:07:06.728733 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:07:06.731517 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:07:06.736118 systemd[1]: Reached target remote-fs.target. Oct 2 19:07:06.738331 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:07:06.749538 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:07:06.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.244290 ignition[1048]: Ignition 2.14.0 Oct 2 19:07:07.244306 ignition[1048]: Stage: fetch-offline Oct 2 19:07:07.244450 ignition[1048]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:07:07.244491 ignition[1048]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:07:07.265552 ignition[1048]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:07:07.269871 ignition[1048]: Ignition finished successfully Oct 2 19:07:07.273067 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:07:07.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.281402 kernel: kauditd_printk_skb: 18 callbacks suppressed Oct 2 19:07:07.281462 kernel: audit: type=1130 audit(1696273627.274:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.276675 systemd[1]: Starting ignition-fetch.service... Oct 2 19:07:07.288977 ignition[1115]: Ignition 2.14.0 Oct 2 19:07:07.288989 ignition[1115]: Stage: fetch Oct 2 19:07:07.289258 ignition[1115]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:07:07.289295 ignition[1115]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:07:07.304870 ignition[1115]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:07:07.306960 ignition[1115]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:07:07.323564 ignition[1115]: INFO : PUT result: OK Oct 2 19:07:07.328173 ignition[1115]: DEBUG : parsed url from cmdline: "" Oct 2 19:07:07.328173 ignition[1115]: INFO : no config URL provided Oct 2 19:07:07.328173 ignition[1115]: INFO : reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:07:07.328173 ignition[1115]: INFO : no config at "/usr/lib/ignition/user.ign" Oct 2 19:07:07.341910 ignition[1115]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:07:07.341910 ignition[1115]: INFO : PUT result: OK Oct 2 19:07:07.341910 ignition[1115]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Oct 2 19:07:07.347170 ignition[1115]: INFO : GET result: OK Oct 2 19:07:07.348054 ignition[1115]: DEBUG : parsing config with SHA512: b69cb9fe24eecd4c4bb1b9c70602d73ae5760381c95b9c5366ee6ea4bff6cd1a4ac12428dfe3c789fb658a5de39d604125d0caa08d94eafbc9ec892db37da603 Oct 2 19:07:07.383354 unknown[1115]: fetched base config from "system" Oct 2 19:07:07.383528 unknown[1115]: fetched base config from "system" Oct 2 19:07:07.383534 unknown[1115]: fetched user config from "aws" Oct 2 19:07:07.403193 ignition[1115]: fetch: fetch complete Oct 2 19:07:07.403678 ignition[1115]: fetch: fetch passed Oct 2 19:07:07.403765 ignition[1115]: Ignition finished successfully Oct 2 19:07:07.409347 systemd[1]: Finished ignition-fetch.service. Oct 2 19:07:07.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.413084 systemd[1]: Starting ignition-kargs.service... Oct 2 19:07:07.419908 kernel: audit: type=1130 audit(1696273627.410:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.432774 ignition[1121]: Ignition 2.14.0 Oct 2 19:07:07.432789 ignition[1121]: Stage: kargs Oct 2 19:07:07.433060 ignition[1121]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:07:07.433092 ignition[1121]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:07:07.455627 ignition[1121]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:07:07.459743 ignition[1121]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:07:07.463130 ignition[1121]: INFO : PUT result: OK Oct 2 19:07:07.467673 ignition[1121]: kargs: kargs passed Oct 2 19:07:07.467869 ignition[1121]: Ignition finished successfully Oct 2 19:07:07.470986 systemd[1]: Finished ignition-kargs.service. Oct 2 19:07:07.488336 kernel: audit: type=1130 audit(1696273627.470:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.488089 ignition[1127]: Ignition 2.14.0 Oct 2 19:07:07.473742 systemd[1]: Starting ignition-disks.service... Oct 2 19:07:07.488099 ignition[1127]: Stage: disks Oct 2 19:07:07.488491 ignition[1127]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:07:07.488522 ignition[1127]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:07:07.499384 ignition[1127]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:07:07.500809 ignition[1127]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:07:07.502776 ignition[1127]: INFO : PUT result: OK Oct 2 19:07:07.506101 ignition[1127]: disks: disks passed Oct 2 19:07:07.506381 ignition[1127]: Ignition finished successfully Oct 2 19:07:07.511125 systemd[1]: Finished ignition-disks.service. Oct 2 19:07:07.524789 kernel: audit: type=1130 audit(1696273627.512:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.513901 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:07:07.525138 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:07:07.528597 systemd[1]: Reached target local-fs.target. Oct 2 19:07:07.528690 systemd[1]: Reached target sysinit.target. Oct 2 19:07:07.533399 systemd[1]: Reached target basic.target. Oct 2 19:07:07.535674 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:07:07.586495 systemd-fsck[1135]: ROOT: clean, 603/553520 files, 56012/553472 blocks Oct 2 19:07:07.592125 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:07:07.602063 kernel: audit: type=1130 audit(1696273627.592:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.595306 systemd[1]: Mounting sysroot.mount... Oct 2 19:07:07.618409 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:07:07.618675 systemd[1]: Mounted sysroot.mount. Oct 2 19:07:07.627879 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:07:07.642699 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:07:07.650326 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:07:07.650528 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:07:07.650565 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:07:07.661392 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:07:07.676098 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:07:07.683970 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:07:07.691776 initrd-setup-root[1157]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:07:07.698671 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1152) Oct 2 19:07:07.702267 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:07:07.702339 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:07:07.702359 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:07:07.706229 initrd-setup-root[1178]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:07:07.713683 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:07:07.714140 initrd-setup-root[1191]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:07:07.718723 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:07:07.723014 initrd-setup-root[1199]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:07:07.745789 systemd-networkd[1091]: eth0: Gained IPv6LL Oct 2 19:07:07.883578 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:07:07.894687 kernel: audit: type=1130 audit(1696273627.884:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.886442 systemd[1]: Starting ignition-mount.service... Oct 2 19:07:07.896898 systemd[1]: Starting sysroot-boot.service... Oct 2 19:07:07.906133 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:07:07.906246 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:07:07.933006 ignition[1218]: INFO : Ignition 2.14.0 Oct 2 19:07:07.933006 ignition[1218]: INFO : Stage: mount Oct 2 19:07:07.935436 ignition[1218]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:07:07.935436 ignition[1218]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:07:07.947704 systemd[1]: Finished sysroot-boot.service. Oct 2 19:07:07.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.953423 ignition[1218]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:07:07.953423 ignition[1218]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:07:07.958445 kernel: audit: type=1130 audit(1696273627.948:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.958487 ignition[1218]: INFO : PUT result: OK Oct 2 19:07:07.961867 ignition[1218]: INFO : mount: mount passed Oct 2 19:07:07.963312 ignition[1218]: INFO : Ignition finished successfully Oct 2 19:07:07.964425 systemd[1]: Finished ignition-mount.service. Oct 2 19:07:07.966969 systemd[1]: Starting ignition-files.service... Oct 2 19:07:07.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.976669 kernel: audit: type=1130 audit(1696273627.964:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.980713 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:07:07.994671 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1227) Oct 2 19:07:07.997858 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:07:07.997906 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:07:07.997924 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:07:08.005663 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:07:08.008250 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:07:08.039953 ignition[1246]: INFO : Ignition 2.14.0 Oct 2 19:07:08.039953 ignition[1246]: INFO : Stage: files Oct 2 19:07:08.042438 ignition[1246]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:07:08.042438 ignition[1246]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:07:08.054566 ignition[1246]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:07:08.056954 ignition[1246]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:07:08.059086 ignition[1246]: INFO : PUT result: OK Oct 2 19:07:08.062975 ignition[1246]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:07:08.068780 ignition[1246]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:07:08.068780 ignition[1246]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:07:08.081251 ignition[1246]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:07:08.083319 ignition[1246]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:07:08.085832 unknown[1246]: wrote ssh authorized keys file for user: core Oct 2 19:07:08.087555 ignition[1246]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:07:08.095049 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:07:08.098439 ignition[1246]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Oct 2 19:07:08.293841 ignition[1246]: INFO : GET result: OK Oct 2 19:07:08.566779 ignition[1246]: DEBUG : file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Oct 2 19:07:08.570091 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:07:08.570091 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.24.2-linux-amd64.tar.gz" Oct 2 19:07:08.570091 ignition[1246]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.24.2/crictl-v1.24.2-linux-amd64.tar.gz: attempt #1 Oct 2 19:07:08.654570 ignition[1246]: INFO : GET result: OK Oct 2 19:07:08.751221 ignition[1246]: DEBUG : file matches expected sum of: 961188117863ca9af5b084e84691e372efee93ad09daf6a0422e8d75a5803f394d8968064f7ca89f14e8973766201e731241f32538cf2c8d91f0233e786302df Oct 2 19:07:08.754608 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.24.2-linux-amd64.tar.gz" Oct 2 19:07:08.754608 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:07:08.760399 ignition[1246]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:07:08.766905 ignition[1246]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2780186206" Oct 2 19:07:08.771965 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1248) Oct 2 19:07:08.772033 ignition[1246]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2780186206": device or resource busy Oct 2 19:07:08.772033 ignition[1246]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2780186206", trying btrfs: device or resource busy Oct 2 19:07:08.772033 ignition[1246]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2780186206" Oct 2 19:07:08.778945 ignition[1246]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2780186206" Oct 2 19:07:08.787216 ignition[1246]: INFO : op(3): [started] unmounting "/mnt/oem2780186206" Oct 2 19:07:08.788520 systemd[1]: mnt-oem2780186206.mount: Deactivated successfully. Oct 2 19:07:08.790521 ignition[1246]: INFO : op(3): [finished] unmounting "/mnt/oem2780186206" Oct 2 19:07:08.792046 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:07:08.792046 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:07:08.792046 ignition[1246]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:07:08.951044 ignition[1246]: INFO : GET result: OK Oct 2 19:07:09.965625 ignition[1246]: DEBUG : file matches expected sum of: 43b8f213f1732c092e34008d5334e6622a6603f7ec5890c395ac911d50069d0dc11a81fa38436df40fc875a10fee6ee13aa285c017f1de210171065e847c99c5 Oct 2 19:07:09.969378 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:07:09.969378 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:07:09.969378 ignition[1246]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:07:10.018868 ignition[1246]: INFO : GET result: OK Oct 2 19:07:11.650960 ignition[1246]: DEBUG : file matches expected sum of: 82b36a0b83a1d48ef1f70e3ed2a263b3ce935304cdc0606d194b290217fb04f98628b0d82e200b51ccf5c05c718b2476274ae710bb143fffe28dc6bbf8407d54 Oct 2 19:07:11.654190 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:07:11.654190 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:07:11.654190 ignition[1246]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:07:11.702369 ignition[1246]: INFO : GET result: OK Oct 2 19:07:12.491714 ignition[1246]: DEBUG : file matches expected sum of: 9006cd791c99f5421c09ae8f6029fdd0ea4608909f590dea41ba4dd5c500440272e9ece21489d1f192966717987251ded5394ea1dd4c5d091b700ac1c8cfa392 Oct 2 19:07:12.494760 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:07:12.494760 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:07:12.494760 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:07:12.494760 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:07:12.494760 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:07:12.494760 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:07:12.494760 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:07:12.494760 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:07:12.494760 ignition[1246]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:07:12.533279 ignition[1246]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4144669256" Oct 2 19:07:12.533279 ignition[1246]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4144669256": device or resource busy Oct 2 19:07:12.533279 ignition[1246]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4144669256", trying btrfs: device or resource busy Oct 2 19:07:12.533279 ignition[1246]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4144669256" Oct 2 19:07:12.543605 ignition[1246]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4144669256" Oct 2 19:07:12.545468 ignition[1246]: INFO : op(6): [started] unmounting "/mnt/oem4144669256" Oct 2 19:07:12.547715 ignition[1246]: INFO : op(6): [finished] unmounting "/mnt/oem4144669256" Oct 2 19:07:12.549658 systemd[1]: mnt-oem4144669256.mount: Deactivated successfully. Oct 2 19:07:12.551244 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:07:12.554213 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:07:12.557670 ignition[1246]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:07:12.567731 ignition[1246]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3934247318" Oct 2 19:07:12.571852 ignition[1246]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3934247318": device or resource busy Oct 2 19:07:12.571852 ignition[1246]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3934247318", trying btrfs: device or resource busy Oct 2 19:07:12.571852 ignition[1246]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3934247318" Oct 2 19:07:12.585979 ignition[1246]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3934247318" Oct 2 19:07:12.585979 ignition[1246]: INFO : op(9): [started] unmounting "/mnt/oem3934247318" Oct 2 19:07:12.596345 ignition[1246]: INFO : op(9): [finished] unmounting "/mnt/oem3934247318" Oct 2 19:07:12.596345 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:07:12.596345 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:07:12.596345 ignition[1246]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:07:12.610092 systemd[1]: mnt-oem3934247318.mount: Deactivated successfully. Oct 2 19:07:12.621833 ignition[1246]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem193342129" Oct 2 19:07:12.623734 ignition[1246]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem193342129": device or resource busy Oct 2 19:07:12.623734 ignition[1246]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem193342129", trying btrfs: device or resource busy Oct 2 19:07:12.623734 ignition[1246]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem193342129" Oct 2 19:07:12.631447 ignition[1246]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem193342129" Oct 2 19:07:12.631447 ignition[1246]: INFO : op(c): [started] unmounting "/mnt/oem193342129" Oct 2 19:07:12.640331 ignition[1246]: INFO : op(c): [finished] unmounting "/mnt/oem193342129" Oct 2 19:07:12.641794 ignition[1246]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:07:12.641794 ignition[1246]: INFO : files: op(f): [started] processing unit "nvidia.service" Oct 2 19:07:12.641794 ignition[1246]: INFO : files: op(f): [finished] processing unit "nvidia.service" Oct 2 19:07:12.641794 ignition[1246]: INFO : files: op(10): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:07:12.641794 ignition[1246]: INFO : files: op(10): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:07:12.641794 ignition[1246]: INFO : files: op(11): [started] processing unit "amazon-ssm-agent.service" Oct 2 19:07:12.641794 ignition[1246]: INFO : files: op(11): op(12): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(11): op(12): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(11): [finished] processing unit "amazon-ssm-agent.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(13): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(13): op(14): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(13): op(14): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(13): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(15): [started] processing unit "prepare-critools.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(15): op(16): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(15): op(16): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(15): [finished] processing unit "prepare-critools.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(17): [started] setting preset to enabled for "nvidia.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(17): [finished] setting preset to enabled for "nvidia.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(18): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(18): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(19): [started] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(19): [finished] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:07:12.656226 ignition[1246]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:07:12.723529 kernel: audit: type=1130 audit(1696273632.670:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.723557 kernel: audit: type=1130 audit(1696273632.706:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.723569 kernel: audit: type=1131 audit(1696273632.706:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.723794 ignition[1246]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:07:12.723794 ignition[1246]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:07:12.723794 ignition[1246]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:07:12.723794 ignition[1246]: INFO : files: files passed Oct 2 19:07:12.723794 ignition[1246]: INFO : Ignition finished successfully Oct 2 19:07:12.755035 kernel: audit: type=1130 audit(1696273632.723:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.667336 systemd[1]: Finished ignition-files.service. Oct 2 19:07:12.677497 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:07:12.758277 initrd-setup-root-after-ignition[1271]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:07:12.685876 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:07:12.687229 systemd[1]: Starting ignition-quench.service... Oct 2 19:07:12.700925 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:07:12.702992 systemd[1]: Finished ignition-quench.service. Oct 2 19:07:12.723616 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:07:12.749497 systemd[1]: Reached target ignition-complete.target. Oct 2 19:07:12.753255 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:07:12.778514 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:07:12.778667 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:07:12.800520 kernel: audit: type=1130 audit(1696273632.779:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.800568 kernel: audit: type=1131 audit(1696273632.779:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.780939 systemd[1]: Reached target initrd-fs.target. Oct 2 19:07:12.800689 systemd[1]: Reached target initrd.target. Oct 2 19:07:12.800833 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:07:12.801942 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:07:12.822065 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:07:12.839808 kernel: audit: type=1130 audit(1696273632.829:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.839312 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:07:12.853046 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:07:12.853386 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:07:12.858259 systemd[1]: Stopped target timers.target. Oct 2 19:07:12.860437 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:07:12.860697 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:07:12.883425 kernel: audit: type=1131 audit(1696273632.864:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.883944 systemd[1]: Stopped target initrd.target. Oct 2 19:07:12.890541 systemd[1]: Stopped target basic.target. Oct 2 19:07:12.895013 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:07:12.897621 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:07:12.901539 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:07:12.904365 systemd[1]: Stopped target remote-fs.target. Oct 2 19:07:12.908286 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:07:12.911697 systemd[1]: Stopped target sysinit.target. Oct 2 19:07:12.913825 systemd[1]: Stopped target local-fs.target. Oct 2 19:07:12.916584 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:07:12.924324 systemd[1]: Stopped target swap.target. Oct 2 19:07:12.926809 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:07:12.929311 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:07:12.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.931941 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:07:12.941674 kernel: audit: type=1131 audit(1696273632.930:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.941757 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:07:12.944279 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:07:12.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.949699 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:07:12.960111 kernel: audit: type=1131 audit(1696273632.947:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.949888 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:07:12.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.962231 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:07:12.964351 systemd[1]: Stopped ignition-files.service. Oct 2 19:07:12.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.967973 systemd[1]: Stopping ignition-mount.service... Oct 2 19:07:12.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.968966 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:07:12.969091 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:07:12.971245 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:07:12.972211 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:07:12.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:12.972341 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:07:12.974195 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:07:12.974302 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:07:12.989055 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:07:12.999656 ignition[1284]: INFO : Ignition 2.14.0 Oct 2 19:07:12.999656 ignition[1284]: INFO : Stage: umount Oct 2 19:07:12.999656 ignition[1284]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:07:12.999656 ignition[1284]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:07:12.989201 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:07:13.008450 ignition[1284]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:07:13.008450 ignition[1284]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:07:13.011702 ignition[1284]: INFO : PUT result: OK Oct 2 19:07:13.014285 ignition[1284]: INFO : umount: umount passed Oct 2 19:07:13.015952 ignition[1284]: INFO : Ignition finished successfully Oct 2 19:07:13.016940 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:07:13.017289 systemd[1]: Stopped ignition-mount.service. Oct 2 19:07:13.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.026383 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:07:13.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.026463 systemd[1]: Stopped ignition-disks.service. Oct 2 19:07:13.033424 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:07:13.033503 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:07:13.038532 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:07:13.038606 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:07:13.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.048507 systemd[1]: Stopped target network.target. Oct 2 19:07:13.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.049540 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:07:13.049621 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:07:13.050710 systemd[1]: Stopped target paths.target. Oct 2 19:07:13.051574 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:07:13.055951 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:07:13.063597 systemd[1]: Stopped target slices.target. Oct 2 19:07:13.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.065725 systemd[1]: Stopped target sockets.target. Oct 2 19:07:13.067193 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:07:13.067252 systemd[1]: Closed iscsid.socket. Oct 2 19:07:13.068318 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:07:13.068359 systemd[1]: Closed iscsiuio.socket. Oct 2 19:07:13.069256 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:07:13.069319 systemd[1]: Stopped ignition-setup.service. Oct 2 19:07:13.071006 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:07:13.074104 systemd-networkd[1091]: eth0: DHCPv6 lease lost Oct 2 19:07:13.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.091000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:07:13.077101 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:07:13.082190 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:07:13.082429 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:07:13.088704 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:07:13.100000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:07:13.088826 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:07:13.091190 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:07:13.091245 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:07:13.101863 systemd[1]: Stopping network-cleanup.service... Oct 2 19:07:13.112051 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:07:13.113567 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:07:13.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.114970 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:07:13.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.115032 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:07:13.117432 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:07:13.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.117485 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:07:13.119011 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:07:13.121779 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:07:13.121862 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:07:13.124573 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:07:13.125349 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:07:13.128724 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:07:13.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.128774 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:07:13.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.130543 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:07:13.130578 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:07:13.132742 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:07:13.132786 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:07:13.139255 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:07:13.139309 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:07:13.141418 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:07:13.141464 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:07:13.144845 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:07:13.144892 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:07:13.147419 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:07:13.165429 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:07:13.165517 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:07:13.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.170022 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:07:13.178102 systemd[1]: Stopped network-cleanup.service. Oct 2 19:07:13.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.182176 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:07:13.182287 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:07:13.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.185998 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:07:13.189167 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:07:13.202624 systemd[1]: Switching root. Oct 2 19:07:13.227144 iscsid[1096]: iscsid shutting down. Oct 2 19:07:13.228280 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). Oct 2 19:07:13.228363 systemd-journald[185]: Journal stopped Oct 2 19:07:18.766945 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:07:18.767026 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:07:18.767049 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:07:18.767080 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:07:18.767100 kernel: SELinux: policy capability open_perms=1 Oct 2 19:07:18.767126 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:07:18.767147 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:07:18.767167 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:07:18.767187 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:07:18.767212 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:07:18.767231 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:07:18.767254 systemd[1]: Successfully loaded SELinux policy in 92.291ms. Oct 2 19:07:18.767289 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.374ms. Oct 2 19:07:18.767313 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:07:18.767339 systemd[1]: Detected virtualization amazon. Oct 2 19:07:18.767361 systemd[1]: Detected architecture x86-64. Oct 2 19:07:18.767382 systemd[1]: Detected first boot. Oct 2 19:07:18.767402 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:07:18.767423 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:07:18.767445 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:07:18.767481 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:07:18.767509 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:07:18.767536 kernel: kauditd_printk_skb: 37 callbacks suppressed Oct 2 19:07:18.767556 kernel: audit: type=1334 audit(1696273638.317:84): prog-id=12 op=LOAD Oct 2 19:07:18.767576 kernel: audit: type=1334 audit(1696273638.317:85): prog-id=3 op=UNLOAD Oct 2 19:07:18.767596 kernel: audit: type=1334 audit(1696273638.320:86): prog-id=13 op=LOAD Oct 2 19:07:18.767616 kernel: audit: type=1334 audit(1696273638.325:87): prog-id=14 op=LOAD Oct 2 19:07:18.767635 kernel: audit: type=1334 audit(1696273638.325:88): prog-id=4 op=UNLOAD Oct 2 19:07:18.771277 kernel: audit: type=1334 audit(1696273638.325:89): prog-id=5 op=UNLOAD Oct 2 19:07:18.771303 kernel: audit: type=1131 audit(1696273638.327:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.771321 kernel: audit: type=1334 audit(1696273638.338:91): prog-id=12 op=UNLOAD Oct 2 19:07:18.771341 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:07:18.771364 systemd[1]: Stopped iscsiuio.service. Oct 2 19:07:18.771383 kernel: audit: type=1131 audit(1696273638.344:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.771401 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:07:18.771420 systemd[1]: Stopped iscsid.service. Oct 2 19:07:18.771444 kernel: audit: type=1131 audit(1696273638.353:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.771466 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:07:18.771485 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:07:18.771503 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:07:18.771523 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:07:18.771542 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:07:18.771562 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:07:18.771580 systemd[1]: Created slice system-getty.slice. Oct 2 19:07:18.771601 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:07:18.771621 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:07:18.771665 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:07:18.771684 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:07:18.771703 systemd[1]: Created slice user.slice. Oct 2 19:07:18.771725 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:07:18.771744 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:07:18.771768 systemd[1]: Set up automount boot.automount. Oct 2 19:07:18.771786 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:07:18.771808 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:07:18.771828 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:07:18.771846 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:07:18.771865 systemd[1]: Reached target integritysetup.target. Oct 2 19:07:18.771889 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:07:18.771908 systemd[1]: Reached target remote-fs.target. Oct 2 19:07:18.771927 systemd[1]: Reached target slices.target. Oct 2 19:07:18.771946 systemd[1]: Reached target swap.target. Oct 2 19:07:18.771964 systemd[1]: Reached target torcx.target. Oct 2 19:07:18.771982 systemd[1]: Reached target veritysetup.target. Oct 2 19:07:18.772004 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:07:18.772022 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:07:18.772040 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:07:18.772058 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:07:18.772080 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:07:18.772113 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:07:18.772132 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:07:18.772151 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:07:18.772170 systemd[1]: Mounting media.mount... Oct 2 19:07:18.772189 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:07:18.772208 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:07:18.774290 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:07:18.774332 systemd[1]: Mounting tmp.mount... Oct 2 19:07:18.774353 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:07:18.774378 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:07:18.774397 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:07:18.774416 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:07:18.774434 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:07:18.774453 systemd[1]: Starting modprobe@drm.service... Oct 2 19:07:18.774472 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:07:18.774895 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:07:18.774930 systemd[1]: Starting modprobe@loop.service... Oct 2 19:07:18.774949 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:07:18.774972 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:07:18.774991 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:07:18.775009 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:07:18.775028 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:07:18.775047 systemd[1]: Stopped systemd-journald.service. Oct 2 19:07:18.775067 systemd[1]: Starting systemd-journald.service... Oct 2 19:07:18.775421 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:07:18.775447 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:07:18.775539 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:07:18.775601 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:07:18.775624 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:07:18.775656 systemd[1]: Stopped verity-setup.service. Oct 2 19:07:18.776807 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:07:18.776839 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:07:18.776861 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:07:18.776883 systemd[1]: Mounted media.mount. Oct 2 19:07:18.776903 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:07:18.776924 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:07:18.776948 systemd[1]: Mounted tmp.mount. Oct 2 19:07:18.776968 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:07:18.776992 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:07:18.777013 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:07:18.777033 kernel: fuse: init (API version 7.34) Oct 2 19:07:18.777053 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:07:18.777074 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:07:18.777096 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:07:18.777116 systemd[1]: Finished modprobe@drm.service. Oct 2 19:07:18.777136 kernel: loop: module loaded Oct 2 19:07:18.777154 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:07:18.777173 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:07:18.777194 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:07:18.777213 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:07:18.777238 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:07:18.777259 systemd[1]: Finished modprobe@loop.service. Oct 2 19:07:18.777278 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:07:18.777299 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:07:18.777320 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:07:18.777393 systemd[1]: Reached target network-pre.target. Oct 2 19:07:18.777415 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:07:18.777437 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:07:18.777460 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:07:18.777481 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:07:18.777502 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:07:18.777521 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:07:18.777542 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:07:18.777567 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:07:18.777589 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:07:18.777611 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:07:18.777632 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:07:18.777664 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:07:18.777691 systemd-journald[1393]: Journal started Oct 2 19:07:18.777867 systemd-journald[1393]: Runtime Journal (/run/log/journal/ec203bc52ca9df5f81522077298ec65f) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:07:13.825000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:07:18.780048 systemd[1]: Started systemd-journald.service. Oct 2 19:07:13.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:07:13.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:07:13.972000 audit: BPF prog-id=10 op=LOAD Oct 2 19:07:13.972000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:07:13.972000 audit: BPF prog-id=11 op=LOAD Oct 2 19:07:13.972000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:07:18.317000 audit: BPF prog-id=12 op=LOAD Oct 2 19:07:18.317000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:07:18.320000 audit: BPF prog-id=13 op=LOAD Oct 2 19:07:18.325000 audit: BPF prog-id=14 op=LOAD Oct 2 19:07:18.325000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:07:18.325000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:07:18.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.338000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:07:18.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.579000 audit: BPF prog-id=15 op=LOAD Oct 2 19:07:18.584000 audit: BPF prog-id=16 op=LOAD Oct 2 19:07:18.584000 audit: BPF prog-id=17 op=LOAD Oct 2 19:07:18.584000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:07:18.584000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:07:18.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.740000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:07:18.740000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe7624fbc0 a2=4000 a3=7ffe7624fc5c items=0 ppid=1 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:18.740000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:07:18.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.189665 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:07:18.316945 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:07:14.190436 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:07:18.328565 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:07:14.190465 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:07:18.782527 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:07:14.190507 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:07:14.190523 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:07:14.190567 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:07:14.190587 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:07:14.190878 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:07:14.190933 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:07:14.190953 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:07:14.191700 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:07:14.191756 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:07:14.191786 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:07:14.191809 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:07:14.191834 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:07:14.191854 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:14Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:07:17.715080 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:17Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:07:17.715348 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:17Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:07:17.715465 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:17Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:07:17.715669 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:17Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:07:17.715735 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:17Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:07:17.715795 /usr/lib/systemd/system-generators/torcx-generator[1317]: time="2023-10-02T19:07:17Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:07:18.791878 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:07:18.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.795143 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:07:18.814219 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:07:18.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.816103 systemd-journald[1393]: Time spent on flushing to /var/log/journal/ec203bc52ca9df5f81522077298ec65f is 52.212ms for 1205 entries. Oct 2 19:07:18.816103 systemd-journald[1393]: System Journal (/var/log/journal/ec203bc52ca9df5f81522077298ec65f) is 8.0M, max 195.6M, 187.6M free. Oct 2 19:07:18.883853 systemd-journald[1393]: Received client request to flush runtime journal. Oct 2 19:07:18.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:18.860128 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:07:18.863372 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:07:18.886761 udevadm[1432]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:07:18.884980 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:07:18.939283 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:07:18.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:19.679614 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:07:19.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:19.679000 audit: BPF prog-id=18 op=LOAD Oct 2 19:07:19.680000 audit: BPF prog-id=19 op=LOAD Oct 2 19:07:19.680000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:07:19.680000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:07:19.682634 systemd[1]: Starting systemd-udevd.service... Oct 2 19:07:19.712818 systemd-udevd[1434]: Using default interface naming scheme 'v252'. Oct 2 19:07:19.770679 systemd[1]: Started systemd-udevd.service. Oct 2 19:07:19.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:19.772000 audit: BPF prog-id=20 op=LOAD Oct 2 19:07:19.774823 systemd[1]: Starting systemd-networkd.service... Oct 2 19:07:19.783000 audit: BPF prog-id=21 op=LOAD Oct 2 19:07:19.783000 audit: BPF prog-id=22 op=LOAD Oct 2 19:07:19.783000 audit: BPF prog-id=23 op=LOAD Oct 2 19:07:19.785991 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:07:19.843793 (udev-worker)[1439]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:07:19.852546 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:07:19.863610 systemd[1]: Started systemd-userdbd.service. Oct 2 19:07:19.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:19.938664 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Oct 2 19:07:19.945691 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:07:19.953578 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Oct 2 19:07:19.953697 kernel: ACPI: button: Sleep Button [SLPF] Oct 2 19:07:19.969000 audit[1438]: AVC avc: denied { confidentiality } for pid=1438 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:07:19.969000 audit[1438]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c9b3c84540 a1=32194 a2=7f8f7bd8dbc5 a3=5 items=106 ppid=1434 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:19.969000 audit: CWD cwd="/" Oct 2 19:07:19.969000 audit: PATH item=0 name=(null) inode=15086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=1 name=(null) inode=15088 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=2 name=(null) inode=15086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=3 name=(null) inode=15089 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=4 name=(null) inode=15086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=5 name=(null) inode=15090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=6 name=(null) inode=15090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=7 name=(null) inode=15091 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=8 name=(null) inode=15090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=9 name=(null) inode=15092 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=10 name=(null) inode=15090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=11 name=(null) inode=15093 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=12 name=(null) inode=15090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=13 name=(null) inode=15094 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=14 name=(null) inode=15090 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=15 name=(null) inode=15095 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=16 name=(null) inode=15086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=17 name=(null) inode=15096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=18 name=(null) inode=15096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=19 name=(null) inode=15097 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=20 name=(null) inode=15096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=21 name=(null) inode=15098 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=22 name=(null) inode=15096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=23 name=(null) inode=15099 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=24 name=(null) inode=15096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=25 name=(null) inode=15100 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=26 name=(null) inode=15096 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=27 name=(null) inode=15101 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=28 name=(null) inode=15086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=29 name=(null) inode=15102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=30 name=(null) inode=15102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=31 name=(null) inode=15103 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=32 name=(null) inode=15102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=33 name=(null) inode=15104 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=34 name=(null) inode=15102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=35 name=(null) inode=15105 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=36 name=(null) inode=15102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=37 name=(null) inode=15106 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=38 name=(null) inode=15102 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=39 name=(null) inode=15107 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=40 name=(null) inode=15086 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=41 name=(null) inode=15108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=42 name=(null) inode=15108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:20.036932 systemd-networkd[1443]: lo: Link UP Oct 2 19:07:19.969000 audit: PATH item=43 name=(null) inode=15109 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=44 name=(null) inode=15108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:20.038139 systemd-networkd[1443]: lo: Gained carrier Oct 2 19:07:19.969000 audit: PATH item=45 name=(null) inode=15110 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:20.038999 systemd-networkd[1443]: Enumeration completed Oct 2 19:07:19.969000 audit: PATH item=46 name=(null) inode=15108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=47 name=(null) inode=15111 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=48 name=(null) inode=15108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=49 name=(null) inode=15112 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=50 name=(null) inode=15108 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=51 name=(null) inode=15113 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=52 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=53 name=(null) inode=15114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=54 name=(null) inode=15114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=55 name=(null) inode=15115 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=56 name=(null) inode=15114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=57 name=(null) inode=15116 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=58 name=(null) inode=15114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=59 name=(null) inode=15117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=60 name=(null) inode=15117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=61 name=(null) inode=15118 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=62 name=(null) inode=15117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=63 name=(null) inode=15119 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=64 name=(null) inode=15117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=65 name=(null) inode=15120 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=66 name=(null) inode=15117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=67 name=(null) inode=15121 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=68 name=(null) inode=15117 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=69 name=(null) inode=15122 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=70 name=(null) inode=15114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=71 name=(null) inode=15123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=72 name=(null) inode=15123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=73 name=(null) inode=15124 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=74 name=(null) inode=15123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=75 name=(null) inode=15125 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=76 name=(null) inode=15123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=77 name=(null) inode=15126 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=78 name=(null) inode=15123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=79 name=(null) inode=15127 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=80 name=(null) inode=15123 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=81 name=(null) inode=15128 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:20.041817 systemd[1]: Started systemd-networkd.service. Oct 2 19:07:20.041851 systemd-networkd[1443]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:07:19.969000 audit: PATH item=82 name=(null) inode=15114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=83 name=(null) inode=15129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=84 name=(null) inode=15129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=85 name=(null) inode=15130 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:20.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:19.969000 audit: PATH item=86 name=(null) inode=15129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=87 name=(null) inode=15131 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=88 name=(null) inode=15129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=89 name=(null) inode=15132 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=90 name=(null) inode=15129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=91 name=(null) inode=15133 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=92 name=(null) inode=15129 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=93 name=(null) inode=15134 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=94 name=(null) inode=15114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=95 name=(null) inode=15135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=96 name=(null) inode=15135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=97 name=(null) inode=15136 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=98 name=(null) inode=15135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=99 name=(null) inode=15137 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=100 name=(null) inode=15135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=101 name=(null) inode=15138 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=102 name=(null) inode=15135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=103 name=(null) inode=15139 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=104 name=(null) inode=15135 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PATH item=105 name=(null) inode=15147 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:19.969000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:07:20.045146 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:07:20.055454 systemd-networkd[1443]: eth0: Link UP Oct 2 19:07:20.055658 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:07:20.055630 systemd-networkd[1443]: eth0: Gained carrier Oct 2 19:07:20.064823 systemd-networkd[1443]: eth0: DHCPv4 address 172.31.17.113/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:07:20.092744 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5 Oct 2 19:07:20.096662 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Oct 2 19:07:20.105716 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:07:20.127667 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1441) Oct 2 19:07:20.233897 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:07:20.316099 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:07:20.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:20.320004 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:07:20.387031 lvm[1548]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:07:20.420566 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:07:20.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:20.421945 systemd[1]: Reached target cryptsetup.target. Oct 2 19:07:20.424706 systemd[1]: Starting lvm2-activation.service... Oct 2 19:07:20.441901 lvm[1549]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:07:20.472941 systemd[1]: Finished lvm2-activation.service. Oct 2 19:07:20.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:20.474759 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:07:20.475986 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:07:20.476012 systemd[1]: Reached target local-fs.target. Oct 2 19:07:20.477091 systemd[1]: Reached target machines.target. Oct 2 19:07:20.479880 systemd[1]: Starting ldconfig.service... Oct 2 19:07:20.482713 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:07:20.482915 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:07:20.484581 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:07:20.487384 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:07:20.490155 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:07:20.492179 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:07:20.492326 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:07:20.495543 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:07:20.501402 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1551 (bootctl) Oct 2 19:07:20.509543 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:07:20.511814 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:07:20.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:20.561669 systemd-tmpfiles[1554]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:07:20.577427 systemd-tmpfiles[1554]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:07:20.604984 systemd-tmpfiles[1554]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:07:20.649180 systemd-fsck[1559]: fsck.fat 4.2 (2021-01-31) Oct 2 19:07:20.649180 systemd-fsck[1559]: /dev/nvme0n1p1: 789 files, 115069/258078 clusters Oct 2 19:07:20.655076 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:07:20.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:20.659165 systemd[1]: Mounting boot.mount... Oct 2 19:07:20.677515 systemd[1]: Mounted boot.mount. Oct 2 19:07:20.719135 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:07:20.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:20.899808 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:07:20.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:20.903194 systemd[1]: Starting audit-rules.service... Oct 2 19:07:20.906680 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:07:20.910660 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:07:20.913000 audit: BPF prog-id=24 op=LOAD Oct 2 19:07:20.918000 audit: BPF prog-id=25 op=LOAD Oct 2 19:07:20.916581 systemd[1]: Starting systemd-resolved.service... Oct 2 19:07:20.923027 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:07:20.929840 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:07:20.957066 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:07:20.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:20.959891 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:07:20.971000 audit[1578]: SYSTEM_BOOT pid=1578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:07:20.976696 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:07:20.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:21.048929 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:07:21.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:21.082000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:07:21.082000 audit[1593]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0aa65680 a2=420 a3=0 items=0 ppid=1573 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:21.082000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:07:21.084399 augenrules[1593]: No rules Oct 2 19:07:21.085173 systemd[1]: Finished audit-rules.service. Oct 2 19:07:21.134710 systemd-resolved[1576]: Positive Trust Anchors: Oct 2 19:07:21.135345 systemd-resolved[1576]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:07:21.135466 systemd-resolved[1576]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:07:21.140379 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:07:21.141609 systemd[1]: Reached target time-set.target. Oct 2 19:07:21.172201 systemd-resolved[1576]: Defaulting to hostname 'linux'. Oct 2 19:07:21.173879 systemd[1]: Started systemd-resolved.service. Oct 2 19:07:21.175191 systemd[1]: Reached target network.target. Oct 2 19:07:21.176575 systemd[1]: Reached target nss-lookup.target. Oct 2 19:07:21.185769 systemd-networkd[1443]: eth0: Gained IPv6LL Oct 2 19:07:21.186201 systemd-timesyncd[1577]: Network configuration changed, trying to establish connection. Oct 2 19:07:21.187314 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:07:21.188853 systemd[1]: Reached target network-online.target. Oct 2 19:07:21.232736 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:07:21.233963 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:07:21.571056 ldconfig[1550]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:07:21.579150 systemd[1]: Finished ldconfig.service. Oct 2 19:07:21.581996 systemd[1]: Starting systemd-update-done.service... Oct 2 19:07:21.594792 systemd[1]: Finished systemd-update-done.service. Oct 2 19:07:21.596398 systemd[1]: Reached target sysinit.target. Oct 2 19:07:21.597847 systemd[1]: Started motdgen.path. Oct 2 19:07:21.598990 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:07:21.600899 systemd[1]: Started logrotate.timer. Oct 2 19:07:21.601935 systemd[1]: Started mdadm.timer. Oct 2 19:07:21.603237 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:07:21.604467 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:07:21.604507 systemd[1]: Reached target paths.target. Oct 2 19:07:21.605437 systemd[1]: Reached target timers.target. Oct 2 19:07:21.606971 systemd[1]: Listening on dbus.socket. Oct 2 19:07:21.609264 systemd[1]: Starting docker.socket... Oct 2 19:07:21.628800 systemd[1]: Listening on sshd.socket. Oct 2 19:07:21.629911 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:07:21.630500 systemd[1]: Listening on docker.socket. Oct 2 19:07:21.633082 systemd[1]: Reached target sockets.target. Oct 2 19:07:21.634293 systemd[1]: Reached target basic.target. Oct 2 19:07:21.639579 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:07:21.639610 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:07:21.640984 systemd[1]: Started amazon-ssm-agent.service. Oct 2 19:07:21.643502 systemd[1]: Starting containerd.service... Oct 2 19:07:21.647098 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:07:21.649951 systemd[1]: Starting dbus.service... Oct 2 19:07:21.653322 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:07:21.656973 systemd[1]: Starting extend-filesystems.service... Oct 2 19:07:21.658793 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:07:21.661510 systemd[1]: Starting motdgen.service... Oct 2 19:07:21.666564 systemd[1]: Started nvidia.service. Oct 2 19:07:21.690007 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:07:21.696575 systemd[1]: Starting prepare-critools.service... Oct 2 19:07:21.711009 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:07:21.714411 systemd[1]: Starting sshd-keygen.service... Oct 2 19:07:21.753344 systemd[1]: Starting systemd-logind.service... Oct 2 19:07:21.757534 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:07:21.757611 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:07:21.758408 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:07:21.759733 systemd[1]: Starting update-engine.service... Oct 2 19:07:21.766807 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:07:21.789569 jq[1607]: false Oct 2 19:07:21.790212 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:07:21.790436 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:07:21.838869 jq[1618]: true Oct 2 19:07:21.901805 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:07:21.902032 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:07:21.919878 jq[1623]: true Oct 2 19:07:21.924059 tar[1620]: ./ Oct 2 19:07:21.934922 tar[1620]: ./macvlan Oct 2 19:07:21.941233 dbus-daemon[1606]: [system] SELinux support is enabled Oct 2 19:07:21.941430 systemd[1]: Started dbus.service. Oct 2 19:07:21.947085 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:07:21.947150 systemd[1]: Reached target system-config.target. Oct 2 19:07:21.949941 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:07:21.949968 systemd[1]: Reached target user-config.target. Oct 2 19:07:21.958853 dbus-daemon[1606]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1443 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 19:07:21.967608 systemd[1]: Starting systemd-hostnamed.service... Oct 2 19:07:21.975394 tar[1621]: crictl Oct 2 19:07:22.010325 extend-filesystems[1608]: Found nvme0n1 Oct 2 19:07:22.010325 extend-filesystems[1608]: Found nvme0n1p2 Oct 2 19:07:22.010325 extend-filesystems[1608]: Found nvme0n1p3 Oct 2 19:07:22.010325 extend-filesystems[1608]: Found usr Oct 2 19:07:22.010325 extend-filesystems[1608]: Found nvme0n1p4 Oct 2 19:07:22.010325 extend-filesystems[1608]: Found nvme0n1p6 Oct 2 19:07:22.010325 extend-filesystems[1608]: Found nvme0n1p7 Oct 2 19:07:22.010325 extend-filesystems[1608]: Found nvme0n1p9 Oct 2 19:07:22.010325 extend-filesystems[1608]: Checking size of /dev/nvme0n1p9 Oct 2 19:07:22.015202 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:07:22.015609 systemd[1]: Finished motdgen.service. Oct 2 19:07:22.085089 amazon-ssm-agent[1603]: 2023/10/02 19:07:22 Failed to load instance info from vault. RegistrationKey does not exist. Oct 2 19:07:22.087081 amazon-ssm-agent[1603]: Initializing new seelog logger Oct 2 19:07:22.087081 amazon-ssm-agent[1603]: New Seelog Logger Creation Complete Oct 2 19:07:22.087232 amazon-ssm-agent[1603]: 2023/10/02 19:07:22 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:07:22.087232 amazon-ssm-agent[1603]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:07:22.087524 amazon-ssm-agent[1603]: 2023/10/02 19:07:22 processing appconfig overrides Oct 2 19:07:22.166203 extend-filesystems[1608]: Resized partition /dev/nvme0n1p9 Oct 2 19:07:22.217058 extend-filesystems[1675]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:07:22.235251 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Oct 2 19:07:22.262254 env[1632]: time="2023-10-02T19:07:22.261371472Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:07:22.273535 update_engine[1617]: I1002 19:07:22.271149 1617 main.cc:92] Flatcar Update Engine starting Oct 2 19:07:22.281108 systemd[1]: Started update-engine.service. Oct 2 19:07:22.285260 systemd[1]: Started locksmithd.service. Oct 2 19:07:22.287842 update_engine[1617]: I1002 19:07:22.287811 1617 update_check_scheduler.cc:74] Next update check in 7m7s Oct 2 19:07:22.303720 bash[1678]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:07:22.314346 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:07:22.340128 tar[1620]: ./static Oct 2 19:07:22.358912 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Oct 2 19:07:22.409790 extend-filesystems[1675]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Oct 2 19:07:22.409790 extend-filesystems[1675]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 2 19:07:22.409790 extend-filesystems[1675]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Oct 2 19:07:22.407944 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:07:22.415759 extend-filesystems[1608]: Resized filesystem in /dev/nvme0n1p9 Oct 2 19:07:22.415759 extend-filesystems[1608]: Found nvme0n1p1 Oct 2 19:07:22.408151 systemd[1]: Finished extend-filesystems.service. Oct 2 19:07:22.445524 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 19:07:22.463949 systemd-logind[1616]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:07:22.463982 systemd-logind[1616]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 19:07:22.464004 systemd-logind[1616]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:07:22.470876 systemd-logind[1616]: New seat seat0. Oct 2 19:07:22.475795 systemd[1]: Started systemd-logind.service. Oct 2 19:07:22.489269 env[1632]: time="2023-10-02T19:07:22.489186850Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:07:22.494489 env[1632]: time="2023-10-02T19:07:22.494430478Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:22.499039 env[1632]: time="2023-10-02T19:07:22.498991268Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:07:22.504794 env[1632]: time="2023-10-02T19:07:22.504747311Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:22.505292 env[1632]: time="2023-10-02T19:07:22.505256217Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:07:22.507597 env[1632]: time="2023-10-02T19:07:22.507557321Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:22.507814 env[1632]: time="2023-10-02T19:07:22.507787447Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:07:22.507903 env[1632]: time="2023-10-02T19:07:22.507887412Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:22.508163 env[1632]: time="2023-10-02T19:07:22.508142852Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:22.508725 env[1632]: time="2023-10-02T19:07:22.508700744Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:22.509961 env[1632]: time="2023-10-02T19:07:22.509929641Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:07:22.510216 env[1632]: time="2023-10-02T19:07:22.510062201Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:07:22.510407 env[1632]: time="2023-10-02T19:07:22.510384382Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:07:22.510499 env[1632]: time="2023-10-02T19:07:22.510484177Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:07:22.518224 env[1632]: time="2023-10-02T19:07:22.518182073Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:07:22.518344 env[1632]: time="2023-10-02T19:07:22.518234552Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:07:22.518344 env[1632]: time="2023-10-02T19:07:22.518253045Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:07:22.518344 env[1632]: time="2023-10-02T19:07:22.518312549Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:07:22.518344 env[1632]: time="2023-10-02T19:07:22.518333125Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:07:22.518493 env[1632]: time="2023-10-02T19:07:22.518407349Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:07:22.518493 env[1632]: time="2023-10-02T19:07:22.518428144Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:07:22.518493 env[1632]: time="2023-10-02T19:07:22.518451468Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:07:22.518493 env[1632]: time="2023-10-02T19:07:22.518471541Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:07:22.518663 env[1632]: time="2023-10-02T19:07:22.518492154Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:07:22.518663 env[1632]: time="2023-10-02T19:07:22.518511161Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:07:22.518663 env[1632]: time="2023-10-02T19:07:22.518531129Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:07:22.518791 env[1632]: time="2023-10-02T19:07:22.518694658Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:07:22.518850 env[1632]: time="2023-10-02T19:07:22.518811877Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:07:22.519281 env[1632]: time="2023-10-02T19:07:22.519247696Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:07:22.519360 env[1632]: time="2023-10-02T19:07:22.519299070Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:07:22.519360 env[1632]: time="2023-10-02T19:07:22.519320983Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:07:22.519443 env[1632]: time="2023-10-02T19:07:22.519395823Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:07:22.519443 env[1632]: time="2023-10-02T19:07:22.519415405Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:07:22.519520 env[1632]: time="2023-10-02T19:07:22.519499906Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:07:22.519560 env[1632]: time="2023-10-02T19:07:22.519520475Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:07:22.519560 env[1632]: time="2023-10-02T19:07:22.519540179Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:07:22.519635 env[1632]: time="2023-10-02T19:07:22.519560183Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:07:22.519635 env[1632]: time="2023-10-02T19:07:22.519578002Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:07:22.519635 env[1632]: time="2023-10-02T19:07:22.519595538Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:07:22.519635 env[1632]: time="2023-10-02T19:07:22.519615442Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:07:22.519819 env[1632]: time="2023-10-02T19:07:22.519789157Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:07:22.519819 env[1632]: time="2023-10-02T19:07:22.519814150Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:07:22.519894 env[1632]: time="2023-10-02T19:07:22.519833194Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:07:22.519894 env[1632]: time="2023-10-02T19:07:22.519853017Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:07:22.519972 env[1632]: time="2023-10-02T19:07:22.519902201Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:07:22.519972 env[1632]: time="2023-10-02T19:07:22.519921420Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:07:22.519972 env[1632]: time="2023-10-02T19:07:22.519947111Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:07:22.520088 env[1632]: time="2023-10-02T19:07:22.519992305Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:07:22.520415 env[1632]: time="2023-10-02T19:07:22.520342508Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:07:22.523571 env[1632]: time="2023-10-02T19:07:22.520427165Z" level=info msg="Connect containerd service" Oct 2 19:07:22.523571 env[1632]: time="2023-10-02T19:07:22.520471816Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:07:22.523705 env[1632]: time="2023-10-02T19:07:22.523628060Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:07:22.528060 env[1632]: time="2023-10-02T19:07:22.528018411Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:07:22.528328 env[1632]: time="2023-10-02T19:07:22.528252740Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:07:22.528424 systemd[1]: Started containerd.service. Oct 2 19:07:22.533287 tar[1620]: ./vlan Oct 2 19:07:22.547341 env[1632]: time="2023-10-02T19:07:22.547264131Z" level=info msg="Start subscribing containerd event" Oct 2 19:07:22.559522 env[1632]: time="2023-10-02T19:07:22.559471587Z" level=info msg="Start recovering state" Oct 2 19:07:22.580339 dbus-daemon[1606]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 19:07:22.580521 systemd[1]: Started systemd-hostnamed.service. Oct 2 19:07:22.581172 dbus-daemon[1606]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1648 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 19:07:22.585497 systemd[1]: Starting polkit.service... Oct 2 19:07:22.587202 env[1632]: time="2023-10-02T19:07:22.586982864Z" level=info msg="Start event monitor" Oct 2 19:07:22.587202 env[1632]: time="2023-10-02T19:07:22.587059440Z" level=info msg="Start snapshots syncer" Oct 2 19:07:22.587202 env[1632]: time="2023-10-02T19:07:22.587096514Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:07:22.587202 env[1632]: time="2023-10-02T19:07:22.587108282Z" level=info msg="Start streaming server" Oct 2 19:07:22.601550 env[1632]: time="2023-10-02T19:07:22.601501116Z" level=info msg="containerd successfully booted in 0.376640s" Oct 2 19:07:22.613633 polkitd[1709]: Started polkitd version 121 Oct 2 19:07:22.637420 polkitd[1709]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 19:07:22.637503 polkitd[1709]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 19:07:22.643375 polkitd[1709]: Finished loading, compiling and executing 2 rules Oct 2 19:07:22.644400 dbus-daemon[1606]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 19:07:22.644591 systemd[1]: Started polkit.service. Oct 2 19:07:22.650039 polkitd[1709]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 19:07:22.674118 systemd-hostnamed[1648]: Hostname set to (transient) Oct 2 19:07:22.674250 systemd-resolved[1576]: System hostname changed to 'ip-172-31-17-113'. Oct 2 19:07:22.736145 tar[1620]: ./portmap Oct 2 19:07:22.855572 coreos-metadata[1605]: Oct 02 19:07:22.855 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Oct 2 19:07:22.863220 tar[1620]: ./host-local Oct 2 19:07:22.864567 coreos-metadata[1605]: Oct 02 19:07:22.864 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Oct 2 19:07:22.869628 coreos-metadata[1605]: Oct 02 19:07:22.869 INFO Fetch successful Oct 2 19:07:22.869802 coreos-metadata[1605]: Oct 02 19:07:22.869 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 2 19:07:22.870610 coreos-metadata[1605]: Oct 02 19:07:22.870 INFO Fetch successful Oct 2 19:07:22.876764 unknown[1605]: wrote ssh authorized keys file for user: core Oct 2 19:07:22.906144 update-ssh-keys[1767]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:07:22.907056 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:07:22.920624 amazon-ssm-agent[1603]: 2023-10-02 19:07:22 INFO Entering SSM Agent hibernate - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-053219a726a0ed08d is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-053219a726a0ed08d because no identity-based policy allows the ssm:UpdateInstanceInformation action Oct 2 19:07:22.920624 amazon-ssm-agent[1603]: status code: 400, request id: 1543be79-310f-4f51-91fd-9a124f3c641f Oct 2 19:07:22.921097 amazon-ssm-agent[1603]: 2023-10-02 19:07:22 INFO Agent is in hibernate mode. Reducing logging. Logging will be reduced to one log per backoff period Oct 2 19:07:22.987393 tar[1620]: ./vrf Oct 2 19:07:23.142146 tar[1620]: ./bridge Oct 2 19:07:23.275217 systemd[1]: Finished prepare-critools.service. Oct 2 19:07:23.278809 tar[1620]: ./tuning Oct 2 19:07:23.329247 tar[1620]: ./firewall Oct 2 19:07:23.391461 tar[1620]: ./host-device Oct 2 19:07:23.460932 tar[1620]: ./sbr Oct 2 19:07:23.513002 tar[1620]: ./loopback Oct 2 19:07:23.563100 tar[1620]: ./dhcp Oct 2 19:07:23.690783 tar[1620]: ./ptp Oct 2 19:07:23.739439 tar[1620]: ./ipvlan Oct 2 19:07:23.786523 tar[1620]: ./bandwidth Oct 2 19:07:23.911095 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:07:23.999997 locksmithd[1691]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:07:24.143728 sshd_keygen[1649]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:07:24.181609 systemd[1]: Finished sshd-keygen.service. Oct 2 19:07:24.186818 systemd[1]: Starting issuegen.service... Oct 2 19:07:24.195338 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:07:24.195624 systemd[1]: Finished issuegen.service. Oct 2 19:07:24.206586 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:07:24.217813 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:07:24.227655 systemd[1]: Started getty@tty1.service. Oct 2 19:07:24.230424 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:07:24.232187 systemd[1]: Reached target getty.target. Oct 2 19:07:24.243533 systemd[1]: Reached target multi-user.target. Oct 2 19:07:24.248331 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:07:24.262528 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:07:24.262813 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:07:24.264769 systemd[1]: Startup finished in 948ms (kernel) + 10.878s (initrd) + 10.542s (userspace) = 22.369s. Oct 2 19:07:31.481768 systemd[1]: Created slice system-sshd.slice. Oct 2 19:07:31.483366 systemd[1]: Started sshd@0-172.31.17.113:22-139.178.89.65:49112.service. Oct 2 19:07:31.712987 sshd[1817]: Accepted publickey for core from 139.178.89.65 port 49112 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:31.718319 sshd[1817]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:31.732463 systemd[1]: Created slice user-500.slice. Oct 2 19:07:31.734486 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:07:31.738789 systemd-logind[1616]: New session 1 of user core. Oct 2 19:07:31.746559 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:07:31.748629 systemd[1]: Starting user@500.service... Oct 2 19:07:31.752256 (systemd)[1820]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:31.858893 systemd[1820]: Queued start job for default target default.target. Oct 2 19:07:31.859833 systemd[1820]: Reached target paths.target. Oct 2 19:07:31.859868 systemd[1820]: Reached target sockets.target. Oct 2 19:07:31.859887 systemd[1820]: Reached target timers.target. Oct 2 19:07:31.859992 systemd[1820]: Reached target basic.target. Oct 2 19:07:31.860175 systemd[1]: Started user@500.service. Oct 2 19:07:31.861626 systemd[1]: Started session-1.scope. Oct 2 19:07:31.862625 systemd[1820]: Reached target default.target. Oct 2 19:07:31.862875 systemd[1820]: Startup finished in 103ms. Oct 2 19:07:32.026794 systemd[1]: Started sshd@1-172.31.17.113:22-139.178.89.65:49114.service. Oct 2 19:07:32.200760 sshd[1829]: Accepted publickey for core from 139.178.89.65 port 49114 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:32.202984 sshd[1829]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:32.208141 systemd-logind[1616]: New session 2 of user core. Oct 2 19:07:32.208843 systemd[1]: Started session-2.scope. Oct 2 19:07:32.340551 sshd[1829]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:32.351362 systemd[1]: sshd@1-172.31.17.113:22-139.178.89.65:49114.service: Deactivated successfully. Oct 2 19:07:32.352405 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:07:32.353130 systemd-logind[1616]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:07:32.354044 systemd-logind[1616]: Removed session 2. Oct 2 19:07:32.366067 systemd[1]: Started sshd@2-172.31.17.113:22-139.178.89.65:49126.service. Oct 2 19:07:32.532987 sshd[1835]: Accepted publickey for core from 139.178.89.65 port 49126 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:32.535198 sshd[1835]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:32.542500 systemd-logind[1616]: New session 3 of user core. Oct 2 19:07:32.543085 systemd[1]: Started session-3.scope. Oct 2 19:07:32.663479 sshd[1835]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:32.668134 systemd[1]: sshd@2-172.31.17.113:22-139.178.89.65:49126.service: Deactivated successfully. Oct 2 19:07:32.669204 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:07:32.670036 systemd-logind[1616]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:07:32.670987 systemd-logind[1616]: Removed session 3. Oct 2 19:07:32.688693 systemd[1]: Started sshd@3-172.31.17.113:22-139.178.89.65:49128.service. Oct 2 19:07:32.847339 sshd[1841]: Accepted publickey for core from 139.178.89.65 port 49128 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:32.848865 sshd[1841]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:32.854427 systemd[1]: Started session-4.scope. Oct 2 19:07:32.855302 systemd-logind[1616]: New session 4 of user core. Oct 2 19:07:33.001061 sshd[1841]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:33.007240 systemd-logind[1616]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:07:33.007560 systemd[1]: sshd@3-172.31.17.113:22-139.178.89.65:49128.service: Deactivated successfully. Oct 2 19:07:33.008705 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:07:33.009993 systemd-logind[1616]: Removed session 4. Oct 2 19:07:33.027756 systemd[1]: Started sshd@4-172.31.17.113:22-139.178.89.65:49142.service. Oct 2 19:07:33.193812 sshd[1847]: Accepted publickey for core from 139.178.89.65 port 49142 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:33.195473 sshd[1847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:33.200845 systemd[1]: Started session-5.scope. Oct 2 19:07:33.201509 systemd-logind[1616]: New session 5 of user core. Oct 2 19:07:33.337887 sudo[1850]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:07:33.338915 sudo[1850]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:07:33.348184 dbus-daemon[1606]: \xd0=\x9e)LV: received setenforce notice (enforcing=1463376320) Oct 2 19:07:33.350258 sudo[1850]: pam_unix(sudo:session): session closed for user root Oct 2 19:07:33.374465 sshd[1847]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:33.377982 systemd[1]: sshd@4-172.31.17.113:22-139.178.89.65:49142.service: Deactivated successfully. Oct 2 19:07:33.379054 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:07:33.379931 systemd-logind[1616]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:07:33.381155 systemd-logind[1616]: Removed session 5. Oct 2 19:07:33.401251 systemd[1]: Started sshd@5-172.31.17.113:22-139.178.89.65:49156.service. Oct 2 19:07:33.568560 sshd[1854]: Accepted publickey for core from 139.178.89.65 port 49156 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:33.570015 sshd[1854]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:33.575154 systemd-logind[1616]: New session 6 of user core. Oct 2 19:07:33.576054 systemd[1]: Started session-6.scope. Oct 2 19:07:33.683500 sudo[1858]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:07:33.684254 sudo[1858]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:07:33.688676 sudo[1858]: pam_unix(sudo:session): session closed for user root Oct 2 19:07:33.693861 sudo[1857]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:07:33.694149 sudo[1857]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:07:33.709100 systemd[1]: Stopping audit-rules.service... Oct 2 19:07:33.708000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:07:33.711952 kernel: kauditd_printk_skb: 176 callbacks suppressed Oct 2 19:07:33.712031 kernel: audit: type=1305 audit(1696273653.708:157): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:07:33.712059 auditctl[1861]: No rules Oct 2 19:07:33.713041 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:07:33.713282 systemd[1]: Stopped audit-rules.service. Oct 2 19:07:33.708000 audit[1861]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe97d5230 a2=420 a3=0 items=0 ppid=1 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:33.717632 systemd[1]: Starting audit-rules.service... Oct 2 19:07:33.729834 kernel: audit: type=1300 audit(1696273653.708:157): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe97d5230 a2=420 a3=0 items=0 ppid=1 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:33.730013 kernel: audit: type=1327 audit(1696273653.708:157): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:07:33.730041 kernel: audit: type=1131 audit(1696273653.710:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:33.708000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:07:33.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:33.754980 augenrules[1878]: No rules Oct 2 19:07:33.755759 systemd[1]: Finished audit-rules.service. Oct 2 19:07:33.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:33.764987 kernel: audit: type=1130 audit(1696273653.754:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:33.765081 kernel: audit: type=1106 audit(1696273653.762:160): pid=1857 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:33.762000 audit[1857]: USER_END pid=1857 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:33.763581 sudo[1857]: pam_unix(sudo:session): session closed for user root Oct 2 19:07:33.762000 audit[1857]: CRED_DISP pid=1857 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:33.776625 kernel: audit: type=1104 audit(1696273653.762:161): pid=1857 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:33.788034 sshd[1854]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:33.788000 audit[1854]: USER_END pid=1854 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:33.792358 systemd[1]: sshd@5-172.31.17.113:22-139.178.89.65:49156.service: Deactivated successfully. Oct 2 19:07:33.794076 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:07:33.796004 systemd-logind[1616]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:07:33.798340 systemd-logind[1616]: Removed session 6. Oct 2 19:07:33.788000 audit[1854]: CRED_DISP pid=1854 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:33.806328 kernel: audit: type=1106 audit(1696273653.788:162): pid=1854 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:33.807177 kernel: audit: type=1104 audit(1696273653.788:163): pid=1854 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:33.807365 kernel: audit: type=1131 audit(1696273653.788:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.17.113:22-139.178.89.65:49156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:33.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.17.113:22-139.178.89.65:49156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:33.818326 systemd[1]: Started sshd@6-172.31.17.113:22-139.178.89.65:49172.service. Oct 2 19:07:33.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.17.113:22-139.178.89.65:49172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:33.992000 audit[1884]: USER_ACCT pid=1884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:33.994687 sshd[1884]: Accepted publickey for core from 139.178.89.65 port 49172 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:33.996000 audit[1884]: CRED_ACQ pid=1884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:33.996000 audit[1884]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1d260a00 a2=3 a3=0 items=0 ppid=1 pid=1884 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:33.996000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:07:34.000858 sshd[1884]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:34.010361 systemd[1]: Started session-7.scope. Oct 2 19:07:34.011089 systemd-logind[1616]: New session 7 of user core. Oct 2 19:07:34.015000 audit[1884]: USER_START pid=1884 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:34.017000 audit[1886]: CRED_ACQ pid=1886 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:34.109000 audit[1887]: USER_ACCT pid=1887 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:34.109000 audit[1887]: CRED_REFR pid=1887 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:34.111341 sudo[1887]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:07:34.111710 sudo[1887]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:07:34.112000 audit[1887]: USER_START pid=1887 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:34.725824 systemd[1]: Starting docker.service... Oct 2 19:07:34.793948 env[1902]: time="2023-10-02T19:07:34.793879449Z" level=info msg="Starting up" Oct 2 19:07:34.799264 env[1902]: time="2023-10-02T19:07:34.799223646Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:07:34.799264 env[1902]: time="2023-10-02T19:07:34.799249765Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:07:34.799429 env[1902]: time="2023-10-02T19:07:34.799277726Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:07:34.799429 env[1902]: time="2023-10-02T19:07:34.799290677Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:07:34.801411 env[1902]: time="2023-10-02T19:07:34.801000942Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:07:34.801411 env[1902]: time="2023-10-02T19:07:34.801396483Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:07:34.801569 env[1902]: time="2023-10-02T19:07:34.801428083Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:07:34.801569 env[1902]: time="2023-10-02T19:07:34.801441874Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:07:34.810416 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3582447272-merged.mount: Deactivated successfully. Oct 2 19:07:34.853549 env[1902]: time="2023-10-02T19:07:34.853509674Z" level=info msg="Loading containers: start." Oct 2 19:07:34.924000 audit[1933]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:34.924000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc3dc3dfb0 a2=0 a3=7ffc3dc3df9c items=0 ppid=1902 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:34.924000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:07:34.926000 audit[1935]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:34.926000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd446860f0 a2=0 a3=7ffd446860dc items=0 ppid=1902 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:34.926000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:07:34.928000 audit[1937]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:34.928000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe395b9b40 a2=0 a3=7ffe395b9b2c items=0 ppid=1902 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:34.928000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:07:34.933000 audit[1939]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:34.933000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe289433b0 a2=0 a3=7ffe2894339c items=0 ppid=1902 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:34.933000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:07:34.945000 audit[1941]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:34.945000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe91b4b060 a2=0 a3=7ffe91b4b04c items=0 ppid=1902 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:34.945000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:07:34.963000 audit[1946]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1946 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:34.963000 audit[1946]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd7df3fa00 a2=0 a3=7ffd7df3f9ec items=0 ppid=1902 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:34.963000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:07:34.972000 audit[1948]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1948 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:34.972000 audit[1948]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd3ca714c0 a2=0 a3=7ffd3ca714ac items=0 ppid=1902 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:34.972000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:07:34.975000 audit[1950]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:34.975000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdffd904a0 a2=0 a3=7ffdffd9048c items=0 ppid=1902 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:34.975000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:07:34.979000 audit[1952]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:34.979000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcd5d146b0 a2=0 a3=7ffcd5d1469c items=0 ppid=1902 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:34.979000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:07:34.989000 audit[1956]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1956 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:34.989000 audit[1956]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcf2448660 a2=0 a3=7ffcf244864c items=0 ppid=1902 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:34.989000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:07:34.993000 audit[1957]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:34.993000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe68296b80 a2=0 a3=7ffe68296b6c items=0 ppid=1902 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:34.993000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:07:35.007667 kernel: Initializing XFRM netlink socket Oct 2 19:07:35.078434 env[1902]: time="2023-10-02T19:07:35.078380883Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:07:35.081141 systemd-timesyncd[1577]: Network configuration changed, trying to establish connection. Oct 2 19:07:35.082810 (udev-worker)[1913]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:07:35.140000 audit[1965]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:35.140000 audit[1965]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd7fe5fa40 a2=0 a3=7ffd7fe5fa2c items=0 ppid=1902 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:35.140000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:07:35.229000 audit[1968]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1968 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:35.229000 audit[1968]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffca22b1ba0 a2=0 a3=7ffca22b1b8c items=0 ppid=1902 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:35.229000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:07:35.234000 audit[1971]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1971 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:35.234000 audit[1971]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc3f469160 a2=0 a3=7ffc3f46914c items=0 ppid=1902 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:35.234000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:07:35.237000 audit[1973]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:35.237000 audit[1973]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdf2fe8bd0 a2=0 a3=7ffdf2fe8bbc items=0 ppid=1902 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:35.237000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:07:35.240000 audit[1975]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1975 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:35.240000 audit[1975]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc9b5b5ab0 a2=0 a3=7ffc9b5b5a9c items=0 ppid=1902 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:35.240000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:07:35.243000 audit[1977]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1977 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:35.243000 audit[1977]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff9b001b00 a2=0 a3=7fff9b001aec items=0 ppid=1902 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:35.243000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:07:35.248000 audit[1979]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:35.248000 audit[1979]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc66c39bb0 a2=0 a3=7ffc66c39b9c items=0 ppid=1902 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:35.248000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:07:35.266000 audit[1982]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:35.266000 audit[1982]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdf8a9e610 a2=0 a3=7ffdf8a9e5fc items=0 ppid=1902 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:35.266000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:07:35.270000 audit[1984]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1984 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:35.270000 audit[1984]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff4f8127a0 a2=0 a3=7fff4f81278c items=0 ppid=1902 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:35.270000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:07:35.274000 audit[1986]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1986 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:35.274000 audit[1986]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffeee24f4b0 a2=0 a3=7ffeee24f49c items=0 ppid=1902 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:35.274000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:07:35.279000 audit[1988]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:35.279000 audit[1988]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdc06b3850 a2=0 a3=7ffdc06b383c items=0 ppid=1902 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:35.279000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:07:35.281773 systemd-networkd[1443]: docker0: Link UP Oct 2 19:07:35.294000 audit[1992]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:35.294000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeeb1f3570 a2=0 a3=7ffeeb1f355c items=0 ppid=1902 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:35.294000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:07:35.295000 audit[1993]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1993 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:35.295000 audit[1993]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff29edd580 a2=0 a3=7fff29edd56c items=0 ppid=1902 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:35.295000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:07:35.297750 env[1902]: time="2023-10-02T19:07:35.297717283Z" level=info msg="Loading containers: done." Oct 2 19:07:35.299308 systemd-timesyncd[1577]: Contacted time server 152.70.159.102:123 (2.flatcar.pool.ntp.org). Oct 2 19:07:35.300069 systemd-timesyncd[1577]: Initial clock synchronization to Mon 2023-10-02 19:07:35.412183 UTC. Oct 2 19:07:35.311323 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3806191821-merged.mount: Deactivated successfully. Oct 2 19:07:35.328620 env[1902]: time="2023-10-02T19:07:35.328564748Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:07:35.328866 env[1902]: time="2023-10-02T19:07:35.328819772Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:07:35.328975 env[1902]: time="2023-10-02T19:07:35.328945741Z" level=info msg="Daemon has completed initialization" Oct 2 19:07:35.349275 systemd[1]: Started docker.service. Oct 2 19:07:35.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:35.360730 env[1902]: time="2023-10-02T19:07:35.360651491Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:07:35.381959 systemd[1]: Reloading. Oct 2 19:07:35.461316 /usr/lib/systemd/system-generators/torcx-generator[2039]: time="2023-10-02T19:07:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:07:35.461358 /usr/lib/systemd/system-generators/torcx-generator[2039]: time="2023-10-02T19:07:35Z" level=info msg="torcx already run" Oct 2 19:07:35.576280 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:07:35.576304 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:07:35.604000 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:07:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.748000 audit: BPF prog-id=34 op=LOAD Oct 2 19:07:35.748000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit: BPF prog-id=35 op=LOAD Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.749000 audit: BPF prog-id=36 op=LOAD Oct 2 19:07:35.749000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:07:35.749000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:07:35.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit: BPF prog-id=37 op=LOAD Oct 2 19:07:35.752000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit: BPF prog-id=38 op=LOAD Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.752000 audit: BPF prog-id=39 op=LOAD Oct 2 19:07:35.752000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:07:35.752000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit: BPF prog-id=40 op=LOAD Oct 2 19:07:35.753000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit: BPF prog-id=41 op=LOAD Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.753000 audit: BPF prog-id=42 op=LOAD Oct 2 19:07:35.753000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:07:35.753000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:07:35.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.754000 audit: BPF prog-id=43 op=LOAD Oct 2 19:07:35.754000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:07:35.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit: BPF prog-id=44 op=LOAD Oct 2 19:07:35.756000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit: BPF prog-id=45 op=LOAD Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.756000 audit: BPF prog-id=46 op=LOAD Oct 2 19:07:35.756000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:07:35.756000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:07:35.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.758000 audit: BPF prog-id=47 op=LOAD Oct 2 19:07:35.758000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:07:35.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.760000 audit: BPF prog-id=48 op=LOAD Oct 2 19:07:35.760000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:07:35.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit: BPF prog-id=49 op=LOAD Oct 2 19:07:35.764000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit: BPF prog-id=50 op=LOAD Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:35.764000 audit: BPF prog-id=51 op=LOAD Oct 2 19:07:35.764000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:07:35.764000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:07:35.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:35.783295 systemd[1]: Started kubelet.service. Oct 2 19:07:35.884405 kubelet[2091]: E1002 19:07:35.884187 2091 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:07:35.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:07:35.888390 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:07:35.888731 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:07:36.417576 env[1632]: time="2023-10-02T19:07:36.417528250Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.25.14\"" Oct 2 19:07:37.092864 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2725772308.mount: Deactivated successfully. Oct 2 19:07:39.903003 env[1632]: time="2023-10-02T19:07:39.902941754Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:39.906988 env[1632]: time="2023-10-02T19:07:39.906940238Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:48f6f02f2e904b54753777e0487169939971458e169171892d46ca1579632d3f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:39.909496 env[1632]: time="2023-10-02T19:07:39.909448750Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:39.912407 env[1632]: time="2023-10-02T19:07:39.912363278Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:bb3eff7d20d94d44ffea47066a4400a70ede58abd9de01c80400817a955397b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:39.913462 env[1632]: time="2023-10-02T19:07:39.913323717Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.25.14\" returns image reference \"sha256:48f6f02f2e904b54753777e0487169939971458e169171892d46ca1579632d3f\"" Oct 2 19:07:39.927373 env[1632]: time="2023-10-02T19:07:39.927330611Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.25.14\"" Oct 2 19:07:43.362692 env[1632]: time="2023-10-02T19:07:43.362590646Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:43.365833 env[1632]: time="2023-10-02T19:07:43.365610344Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2fdc9124e4ab3b396594897e15b74bfe70445ab8f9340ad81af657f2c971118f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:43.368348 env[1632]: time="2023-10-02T19:07:43.368309249Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:43.371875 env[1632]: time="2023-10-02T19:07:43.371826924Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:44d63bed8020f7610851a1a653ad7c6df83bd02ad128303de939a39997854ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:43.373580 env[1632]: time="2023-10-02T19:07:43.373538516Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.25.14\" returns image reference \"sha256:2fdc9124e4ab3b396594897e15b74bfe70445ab8f9340ad81af657f2c971118f\"" Oct 2 19:07:43.392554 env[1632]: time="2023-10-02T19:07:43.392512441Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.25.14\"" Oct 2 19:07:45.021086 env[1632]: time="2023-10-02T19:07:45.020999616Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:45.025560 env[1632]: time="2023-10-02T19:07:45.025509803Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:62a4b43588914100df65a99bb32d7c829fcc21b747a4ae400801eda76994ec7a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:45.027793 env[1632]: time="2023-10-02T19:07:45.027751330Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:45.030110 env[1632]: time="2023-10-02T19:07:45.030058277Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:207b36120eca76bf8607682a3ee37e12b5156b921a9379d776b297ab01ca8198,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:45.030914 env[1632]: time="2023-10-02T19:07:45.030871457Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.25.14\" returns image reference \"sha256:62a4b43588914100df65a99bb32d7c829fcc21b747a4ae400801eda76994ec7a\"" Oct 2 19:07:45.045449 env[1632]: time="2023-10-02T19:07:45.045406954Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\"" Oct 2 19:07:45.986732 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:07:45.987007 systemd[1]: Stopped kubelet.service. Oct 2 19:07:45.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:45.990105 kernel: kauditd_printk_skb: 292 callbacks suppressed Oct 2 19:07:45.990189 kernel: audit: type=1130 audit(1696273665.986:407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:45.996586 systemd[1]: Started kubelet.service. Oct 2 19:07:46.008809 kernel: audit: type=1131 audit(1696273665.986:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:46.008941 kernel: audit: type=1130 audit(1696273665.996:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:45.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:45.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:46.124383 kubelet[2122]: E1002 19:07:46.124334 2122 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:07:46.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:07:46.131551 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:07:46.131766 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:07:46.138676 kernel: audit: type=1131 audit(1696273666.131:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:07:46.432632 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2258111740.mount: Deactivated successfully. Oct 2 19:07:47.096071 env[1632]: time="2023-10-02T19:07:47.096009378Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:47.099084 env[1632]: time="2023-10-02T19:07:47.099031997Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b2d7e01cd611a8a377680226224d6d7f70eea58e8e603b1874585a279866f6a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:47.100886 env[1632]: time="2023-10-02T19:07:47.100845375Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:47.103974 env[1632]: time="2023-10-02T19:07:47.103885192Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:4a23f328943342be6a3eeda75cc7a01d175bcf8b096611c97d2aa14c843cf326,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:47.104752 env[1632]: time="2023-10-02T19:07:47.104708315Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\" returns image reference \"sha256:b2d7e01cd611a8a377680226224d6d7f70eea58e8e603b1874585a279866f6a2\"" Oct 2 19:07:47.124171 env[1632]: time="2023-10-02T19:07:47.124132205Z" level=info msg="PullImage \"registry.k8s.io/pause:3.8\"" Oct 2 19:07:47.667532 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3552385102.mount: Deactivated successfully. Oct 2 19:07:47.676653 env[1632]: time="2023-10-02T19:07:47.676590356Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:47.679864 env[1632]: time="2023-10-02T19:07:47.679786853Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4873874c08efc72e9729683a83ffbb7502ee729e9a5ac097723806ea7fa13517,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:47.682302 env[1632]: time="2023-10-02T19:07:47.682263884Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:47.685194 env[1632]: time="2023-10-02T19:07:47.685088665Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:9001185023633d17a2f98ff69b6ff2615b8ea02a825adffa40422f51dfdcde9d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:47.686088 env[1632]: time="2023-10-02T19:07:47.686016785Z" level=info msg="PullImage \"registry.k8s.io/pause:3.8\" returns image reference \"sha256:4873874c08efc72e9729683a83ffbb7502ee729e9a5ac097723806ea7fa13517\"" Oct 2 19:07:47.703747 env[1632]: time="2023-10-02T19:07:47.703700527Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Oct 2 19:07:48.789330 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2157026037.mount: Deactivated successfully. Oct 2 19:07:52.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:52.703657 kernel: audit: type=1131 audit(1696273672.695:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:52.695561 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 19:07:52.729957 kernel: audit: type=1334 audit(1696273672.722:412): prog-id=46 op=UNLOAD Oct 2 19:07:52.730095 kernel: audit: type=1334 audit(1696273672.724:413): prog-id=45 op=UNLOAD Oct 2 19:07:52.730134 kernel: audit: type=1334 audit(1696273672.724:414): prog-id=44 op=UNLOAD Oct 2 19:07:52.722000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:07:52.724000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:07:52.724000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:07:53.600300 env[1632]: time="2023-10-02T19:07:53.600243015Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:53.602956 env[1632]: time="2023-10-02T19:07:53.602914955Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:53.605539 env[1632]: time="2023-10-02T19:07:53.605496221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:53.607724 env[1632]: time="2023-10-02T19:07:53.607683975Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:53.608411 env[1632]: time="2023-10-02T19:07:53.608378431Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Oct 2 19:07:53.623206 env[1632]: time="2023-10-02T19:07:53.623174778Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Oct 2 19:07:54.193406 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4208509963.mount: Deactivated successfully. Oct 2 19:07:55.062160 env[1632]: time="2023-10-02T19:07:55.062101346Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:55.065095 env[1632]: time="2023-10-02T19:07:55.065047911Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:55.067242 env[1632]: time="2023-10-02T19:07:55.067180843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:55.070043 env[1632]: time="2023-10-02T19:07:55.069982978Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:55.070712 env[1632]: time="2023-10-02T19:07:55.070668216Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Oct 2 19:07:56.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:56.236611 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 19:07:56.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:56.236897 systemd[1]: Stopped kubelet.service. Oct 2 19:07:56.243986 systemd[1]: Started kubelet.service. Oct 2 19:07:56.248500 kernel: audit: type=1130 audit(1696273676.235:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:56.248619 kernel: audit: type=1131 audit(1696273676.235:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:56.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:56.262681 kernel: audit: type=1130 audit(1696273676.241:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:56.348787 kubelet[2199]: E1002 19:07:56.348743 2199 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:07:56.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:07:56.353852 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:07:56.354471 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:07:56.362875 kernel: audit: type=1131 audit(1696273676.353:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:07:58.785627 systemd[1]: Stopped kubelet.service. Oct 2 19:07:58.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:58.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:58.796426 kernel: audit: type=1130 audit(1696273678.784:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:58.796554 kernel: audit: type=1131 audit(1696273678.787:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:58.813013 systemd[1]: Reloading. Oct 2 19:07:58.921814 /usr/lib/systemd/system-generators/torcx-generator[2228]: time="2023-10-02T19:07:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:07:58.921854 /usr/lib/systemd/system-generators/torcx-generator[2228]: time="2023-10-02T19:07:58Z" level=info msg="torcx already run" Oct 2 19:07:59.079055 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:07:59.079082 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:07:59.101841 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:07:59.218034 kernel: audit: type=1400 audit(1696273679.206:421): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.218191 kernel: audit: type=1400 audit(1696273679.206:422): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.232347 kernel: audit: type=1400 audit(1696273679.206:423): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.232528 kernel: audit: type=1400 audit(1696273679.206:424): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.242955 kernel: audit: type=1400 audit(1696273679.206:425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.243083 kernel: audit: type=1400 audit(1696273679.206:426): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.249019 kernel: audit: type=1400 audit(1696273679.206:427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.249145 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:07:59.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.217000 audit: BPF prog-id=52 op=LOAD Oct 2 19:07:59.217000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:07:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.225000 audit: BPF prog-id=53 op=LOAD Oct 2 19:07:59.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.225000 audit: BPF prog-id=54 op=LOAD Oct 2 19:07:59.225000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:07:59.225000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:07:59.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.231000 audit: BPF prog-id=55 op=LOAD Oct 2 19:07:59.231000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:07:59.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.231000 audit: BPF prog-id=56 op=LOAD Oct 2 19:07:59.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.237000 audit: BPF prog-id=57 op=LOAD Oct 2 19:07:59.237000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:07:59.237000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:07:59.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit: BPF prog-id=58 op=LOAD Oct 2 19:07:59.250000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit: BPF prog-id=59 op=LOAD Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.250000 audit: BPF prog-id=60 op=LOAD Oct 2 19:07:59.250000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:07:59.250000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:07:59.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.254000 audit: BPF prog-id=61 op=LOAD Oct 2 19:07:59.254000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:07:59.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.258000 audit: BPF prog-id=62 op=LOAD Oct 2 19:07:59.258000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:07:59.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.259000 audit: BPF prog-id=63 op=LOAD Oct 2 19:07:59.259000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:07:59.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.266000 audit: BPF prog-id=64 op=LOAD Oct 2 19:07:59.266000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit: BPF prog-id=65 op=LOAD Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.267000 audit: BPF prog-id=66 op=LOAD Oct 2 19:07:59.267000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:07:59.267000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:07:59.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:59.291914 systemd[1]: Started kubelet.service. Oct 2 19:07:59.377221 kubelet[2281]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 19:07:59.377221 kubelet[2281]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:07:59.377221 kubelet[2281]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:07:59.377221 kubelet[2281]: I1002 19:07:59.368184 2281 server.go:200] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:07:59.377221 kubelet[2281]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 19:07:59.377221 kubelet[2281]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:07:59.377221 kubelet[2281]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:08:00.373349 kubelet[2281]: I1002 19:08:00.373313 2281 server.go:413] "Kubelet version" kubeletVersion="v1.25.10" Oct 2 19:08:00.373349 kubelet[2281]: I1002 19:08:00.373341 2281 server.go:415] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:08:00.373662 kubelet[2281]: I1002 19:08:00.373624 2281 server.go:825] "Client rotation is on, will bootstrap in background" Oct 2 19:08:00.378978 kubelet[2281]: E1002 19:08:00.378944 2281 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.17.113:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:00.380336 kubelet[2281]: I1002 19:08:00.380283 2281 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:08:00.381217 kubelet[2281]: I1002 19:08:00.381185 2281 server.go:660] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:08:00.381436 kubelet[2281]: I1002 19:08:00.381417 2281 container_manager_linux.go:262] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:08:00.381538 kubelet[2281]: I1002 19:08:00.381514 2281 container_manager_linux.go:267] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] ExperimentalCPUManagerPolicy:none ExperimentalCPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container ExperimentalCPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none} Oct 2 19:08:00.381916 kubelet[2281]: I1002 19:08:00.381550 2281 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:08:00.381916 kubelet[2281]: I1002 19:08:00.381565 2281 container_manager_linux.go:302] "Creating device plugin manager" devicePluginEnabled=true Oct 2 19:08:00.382010 kubelet[2281]: I1002 19:08:00.381916 2281 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:08:00.385535 kubelet[2281]: I1002 19:08:00.385481 2281 kubelet.go:381] "Attempting to sync node with API server" Oct 2 19:08:00.385535 kubelet[2281]: I1002 19:08:00.385535 2281 kubelet.go:270] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:08:00.385960 kubelet[2281]: I1002 19:08:00.385559 2281 kubelet.go:281] "Adding apiserver pod source" Oct 2 19:08:00.385960 kubelet[2281]: I1002 19:08:00.385606 2281 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:08:00.394031 kubelet[2281]: I1002 19:08:00.393866 2281 kuberuntime_manager.go:240] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:08:00.394632 kubelet[2281]: W1002 19:08:00.394611 2281 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:08:00.395707 kubelet[2281]: I1002 19:08:00.395686 2281 server.go:1175] "Started kubelet" Oct 2 19:08:00.415868 kubelet[2281]: W1002 19:08:00.415816 2281 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: Get "https://172.31.17.113:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-17-113&limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:00.416106 kubelet[2281]: E1002 19:08:00.416092 2281 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.17.113:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-17-113&limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:00.415000 audit[2281]: AVC avc: denied { mac_admin } for pid=2281 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:00.415000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:08:00.415000 audit[2281]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008b2b40 a1=c000c6fdb8 a2=c0008b2b10 a3=25 items=0 ppid=1 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.415000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:08:00.417188 kubelet[2281]: I1002 19:08:00.417167 2281 kubelet.go:1274] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:08:00.415000 audit[2281]: AVC avc: denied { mac_admin } for pid=2281 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:00.415000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:08:00.415000 audit[2281]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004ca540 a1=c000c6fdd0 a2=c0008b2bd0 a3=25 items=0 ppid=1 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.415000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:08:00.417693 kubelet[2281]: I1002 19:08:00.417231 2281 kubelet.go:1278] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:08:00.417693 kubelet[2281]: I1002 19:08:00.417325 2281 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:08:00.419980 kubelet[2281]: E1002 19:08:00.419954 2281 cri_stats_provider.go:452] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:08:00.420150 kubelet[2281]: E1002 19:08:00.420135 2281 kubelet.go:1317] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:08:00.420404 kubelet[2281]: E1002 19:08:00.420295 2281 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-17-113.178a5fecd1d32206", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-17-113", UID:"ip-172-31-17-113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-17-113"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 395608582, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 395608582, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.17.113:6443/api/v1/namespaces/default/events": dial tcp 172.31.17.113:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:08:00.421011 kubelet[2281]: W1002 19:08:00.420962 2281 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: Get "https://172.31.17.113:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:00.421143 kubelet[2281]: E1002 19:08:00.421129 2281 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.17.113:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:00.420000 audit[2293]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.420000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc03c14240 a2=0 a3=7ffc03c1422c items=0 ppid=2281 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:08:00.422289 kubelet[2281]: I1002 19:08:00.422238 2281 server.go:155] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:08:00.422847 kubelet[2281]: I1002 19:08:00.422834 2281 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 19:08:00.423535 kubelet[2281]: I1002 19:08:00.423333 2281 server.go:438] "Adding debug handlers to kubelet server" Oct 2 19:08:00.426518 kubelet[2281]: I1002 19:08:00.426490 2281 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Oct 2 19:08:00.425000 audit[2294]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.425000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6617ee30 a2=0 a3=7ffe6617ee1c items=0 ppid=2281 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:08:00.429207 kubelet[2281]: W1002 19:08:00.429094 2281 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: Get "https://172.31.17.113:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:00.429507 kubelet[2281]: E1002 19:08:00.429491 2281 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.17.113:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:00.429695 kubelet[2281]: E1002 19:08:00.429674 2281 controller.go:144] failed to ensure lease exists, will retry in 200ms, error: Get "https://172.31.17.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-17-113?timeout=10s": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:00.430420 kubelet[2281]: E1002 19:08:00.430406 2281 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:08:00.431000 audit[2296]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.431000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff51a71d90 a2=0 a3=7fff51a71d7c items=0 ppid=2281 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:08:00.434000 audit[2298]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.434000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffce5f4e410 a2=0 a3=7ffce5f4e3fc items=0 ppid=2281 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:08:00.460000 audit[2303]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.460000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe49936660 a2=0 a3=7ffe4993664c items=0 ppid=2281 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.460000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:08:00.471856 kubelet[2281]: I1002 19:08:00.471802 2281 cpu_manager.go:213] "Starting CPU manager" policy="none" Oct 2 19:08:00.471856 kubelet[2281]: I1002 19:08:00.471832 2281 cpu_manager.go:214] "Reconciling" reconcilePeriod="10s" Oct 2 19:08:00.471856 kubelet[2281]: I1002 19:08:00.471860 2281 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:08:00.471000 audit[2307]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.471000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdf8094590 a2=0 a3=7ffdf809457c items=0 ppid=2281 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.471000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:08:00.475065 kubelet[2281]: I1002 19:08:00.475039 2281 policy_none.go:49] "None policy: Start" Oct 2 19:08:00.476300 kubelet[2281]: I1002 19:08:00.476280 2281 memory_manager.go:168] "Starting memorymanager" policy="None" Oct 2 19:08:00.476382 kubelet[2281]: I1002 19:08:00.476310 2281 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:08:00.488707 systemd[1]: Created slice kubepods.slice. Oct 2 19:08:00.490000 audit[2311]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.490000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe8a8744c0 a2=0 a3=7ffe8a8744ac items=0 ppid=2281 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.490000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:08:00.499494 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:08:00.504502 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:08:00.509000 audit[2314]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.509000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffced7c3130 a2=0 a3=7ffced7c311c items=0 ppid=2281 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.509000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:08:00.512258 kubelet[2281]: I1002 19:08:00.512163 2281 manager.go:447] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:08:00.511000 audit[2281]: AVC avc: denied { mac_admin } for pid=2281 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:00.511000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:08:00.511000 audit[2281]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f653e0 a1=c000f711d0 a2=c000f653b0 a3=25 items=0 ppid=1 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.511000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:08:00.513850 kubelet[2281]: I1002 19:08:00.513404 2281 server.go:86] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:08:00.513850 kubelet[2281]: I1002 19:08:00.513718 2281 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:08:00.516002 kubelet[2281]: E1002 19:08:00.515983 2281 eviction_manager.go:256] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-17-113\" not found" Oct 2 19:08:00.517000 audit[2315]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.517000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd1cc9bc70 a2=0 a3=7ffd1cc9bc5c items=0 ppid=2281 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.517000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:08:00.519000 audit[2316]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.519000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2de00e60 a2=0 a3=7ffe2de00e4c items=0 ppid=2281 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.519000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:08:00.522000 audit[2318]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.522000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffca090d3b0 a2=0 a3=7ffca090d39c items=0 ppid=2281 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.522000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:08:00.524668 kubelet[2281]: E1002 19:08:00.524622 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:00.526506 kubelet[2281]: I1002 19:08:00.526475 2281 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-17-113" Oct 2 19:08:00.527135 kubelet[2281]: E1002 19:08:00.527121 2281 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.17.113:6443/api/v1/nodes\": dial tcp 172.31.17.113:6443: connect: connection refused" node="ip-172-31-17-113" Oct 2 19:08:00.529000 audit[2320]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.529000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff4b190040 a2=0 a3=7fff4b19002c items=0 ppid=2281 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.529000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:08:00.532000 audit[2322]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.532000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffc777d95d0 a2=0 a3=7ffc777d95bc items=0 ppid=2281 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.532000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:08:00.535000 audit[2324]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.535000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffc03acba20 a2=0 a3=7ffc03acba0c items=0 ppid=2281 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:08:00.539000 audit[2326]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.539000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffe7a32e230 a2=0 a3=7ffe7a32e21c items=0 ppid=2281 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.539000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:08:00.540435 kubelet[2281]: I1002 19:08:00.540342 2281 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:08:00.541000 audit[2327]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:00.541000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe585d27d0 a2=0 a3=7ffe585d27bc items=0 ppid=2281 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:08:00.542000 audit[2328]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.542000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7ff74d40 a2=0 a3=7ffd7ff74d2c items=0 ppid=2281 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.542000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:08:00.543000 audit[2329]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:00.543000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffce7dc5300 a2=0 a3=7ffce7dc52ec items=0 ppid=2281 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:08:00.544000 audit[2330]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.544000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec811cdd0 a2=0 a3=7ffec811cdbc items=0 ppid=2281 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.544000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:08:00.546000 audit[2332]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:00.546000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcc4d69b50 a2=0 a3=7ffcc4d69b3c items=0 ppid=2281 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:08:00.547000 audit[2333]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:00.547000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6ea23540 a2=0 a3=7ffe6ea2352c items=0 ppid=2281 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.547000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:08:00.549000 audit[2334]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:00.549000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff41fed9c0 a2=0 a3=7fff41fed9ac items=0 ppid=2281 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.549000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:08:00.559000 audit[2336]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:00.559000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffd114410a0 a2=0 a3=7ffd1144108c items=0 ppid=2281 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:08:00.562000 audit[2337]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:00.562000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd82d46580 a2=0 a3=7ffd82d4656c items=0 ppid=2281 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.562000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:08:00.564000 audit[2338]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:00.564000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf319db20 a2=0 a3=7ffdf319db0c items=0 ppid=2281 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:08:00.568000 audit[2340]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:00.568000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd744c1770 a2=0 a3=7ffd744c175c items=0 ppid=2281 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:08:00.571000 audit[2342]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:00.571000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc2c5493c0 a2=0 a3=7ffc2c5493ac items=0 ppid=2281 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:08:00.574000 audit[2344]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:00.574000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffda45da6f0 a2=0 a3=7ffda45da6dc items=0 ppid=2281 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:08:00.577000 audit[2346]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:00.577000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffeb02d8950 a2=0 a3=7ffeb02d893c items=0 ppid=2281 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:08:00.584000 audit[2348]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:00.584000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffc56069f20 a2=0 a3=7ffc56069f0c items=0 ppid=2281 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.584000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:08:00.585301 kubelet[2281]: I1002 19:08:00.585275 2281 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:08:00.585446 kubelet[2281]: I1002 19:08:00.585308 2281 status_manager.go:161] "Starting to sync pod status with apiserver" Oct 2 19:08:00.585446 kubelet[2281]: I1002 19:08:00.585329 2281 kubelet.go:2010] "Starting kubelet main sync loop" Oct 2 19:08:00.585446 kubelet[2281]: E1002 19:08:00.585380 2281 kubelet.go:2034] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 19:08:00.586788 kubelet[2281]: W1002 19:08:00.586714 2281 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: Get "https://172.31.17.113:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:00.586788 kubelet[2281]: E1002 19:08:00.586793 2281 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.17.113:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:00.587000 audit[2349]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:00.587000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd04d97180 a2=0 a3=7ffd04d9716c items=0 ppid=2281 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:08:00.588000 audit[2350]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:00.588000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc74434ca0 a2=0 a3=7ffc74434c8c items=0 ppid=2281 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.588000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:08:00.590000 audit[2351]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:00.590000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe26d2e6a0 a2=0 a3=7ffe26d2e68c items=0 ppid=2281 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:00.590000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:08:00.625795 kubelet[2281]: E1002 19:08:00.625697 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:00.631398 kubelet[2281]: E1002 19:08:00.631308 2281 controller.go:144] failed to ensure lease exists, will retry in 400ms, error: Get "https://172.31.17.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-17-113?timeout=10s": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:00.685712 kubelet[2281]: I1002 19:08:00.685670 2281 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:08:00.687365 kubelet[2281]: I1002 19:08:00.687342 2281 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:08:00.705717 kubelet[2281]: I1002 19:08:00.704515 2281 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:08:00.706441 kubelet[2281]: I1002 19:08:00.706352 2281 status_manager.go:667] "Failed to get status for pod" podUID=6d5825b46983b93b995200a88430232c pod="kube-system/kube-apiserver-ip-172-31-17-113" err="Get \"https://172.31.17.113:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-17-113\": dial tcp 172.31.17.113:6443: connect: connection refused" Oct 2 19:08:00.708679 kubelet[2281]: I1002 19:08:00.708635 2281 status_manager.go:667] "Failed to get status for pod" podUID=9f658ff3737bf7ee29ce94d7c59420a3 pod="kube-system/kube-controller-manager-ip-172-31-17-113" err="Get \"https://172.31.17.113:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-17-113\": dial tcp 172.31.17.113:6443: connect: connection refused" Oct 2 19:08:00.711627 kubelet[2281]: I1002 19:08:00.711607 2281 status_manager.go:667] "Failed to get status for pod" podUID=d9900b820b3b0fee9c46b00fcc94428f pod="kube-system/kube-scheduler-ip-172-31-17-113" err="Get \"https://172.31.17.113:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-17-113\": dial tcp 172.31.17.113:6443: connect: connection refused" Oct 2 19:08:00.715359 systemd[1]: Created slice kubepods-burstable-pod6d5825b46983b93b995200a88430232c.slice. Oct 2 19:08:00.725838 kubelet[2281]: E1002 19:08:00.725814 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:00.731411 kubelet[2281]: I1002 19:08:00.730287 2281 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d9900b820b3b0fee9c46b00fcc94428f-kubeconfig\") pod \"kube-scheduler-ip-172-31-17-113\" (UID: \"d9900b820b3b0fee9c46b00fcc94428f\") " pod="kube-system/kube-scheduler-ip-172-31-17-113" Oct 2 19:08:00.731411 kubelet[2281]: I1002 19:08:00.730332 2281 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6d5825b46983b93b995200a88430232c-k8s-certs\") pod \"kube-apiserver-ip-172-31-17-113\" (UID: \"6d5825b46983b93b995200a88430232c\") " pod="kube-system/kube-apiserver-ip-172-31-17-113" Oct 2 19:08:00.731411 kubelet[2281]: I1002 19:08:00.730365 2281 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9f658ff3737bf7ee29ce94d7c59420a3-ca-certs\") pod \"kube-controller-manager-ip-172-31-17-113\" (UID: \"9f658ff3737bf7ee29ce94d7c59420a3\") " pod="kube-system/kube-controller-manager-ip-172-31-17-113" Oct 2 19:08:00.731411 kubelet[2281]: I1002 19:08:00.730397 2281 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/9f658ff3737bf7ee29ce94d7c59420a3-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-17-113\" (UID: \"9f658ff3737bf7ee29ce94d7c59420a3\") " pod="kube-system/kube-controller-manager-ip-172-31-17-113" Oct 2 19:08:00.731411 kubelet[2281]: I1002 19:08:00.730430 2281 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9f658ff3737bf7ee29ce94d7c59420a3-k8s-certs\") pod \"kube-controller-manager-ip-172-31-17-113\" (UID: \"9f658ff3737bf7ee29ce94d7c59420a3\") " pod="kube-system/kube-controller-manager-ip-172-31-17-113" Oct 2 19:08:00.729402 systemd[1]: Created slice kubepods-burstable-pod9f658ff3737bf7ee29ce94d7c59420a3.slice. Oct 2 19:08:00.733265 kubelet[2281]: I1002 19:08:00.730521 2281 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9f658ff3737bf7ee29ce94d7c59420a3-kubeconfig\") pod \"kube-controller-manager-ip-172-31-17-113\" (UID: \"9f658ff3737bf7ee29ce94d7c59420a3\") " pod="kube-system/kube-controller-manager-ip-172-31-17-113" Oct 2 19:08:00.733265 kubelet[2281]: I1002 19:08:00.730609 2281 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6d5825b46983b93b995200a88430232c-ca-certs\") pod \"kube-apiserver-ip-172-31-17-113\" (UID: \"6d5825b46983b93b995200a88430232c\") " pod="kube-system/kube-apiserver-ip-172-31-17-113" Oct 2 19:08:00.733265 kubelet[2281]: I1002 19:08:00.730735 2281 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6d5825b46983b93b995200a88430232c-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-17-113\" (UID: \"6d5825b46983b93b995200a88430232c\") " pod="kube-system/kube-apiserver-ip-172-31-17-113" Oct 2 19:08:00.733265 kubelet[2281]: I1002 19:08:00.730912 2281 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9f658ff3737bf7ee29ce94d7c59420a3-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-17-113\" (UID: \"9f658ff3737bf7ee29ce94d7c59420a3\") " pod="kube-system/kube-controller-manager-ip-172-31-17-113" Oct 2 19:08:00.734947 kubelet[2281]: I1002 19:08:00.734927 2281 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-17-113" Oct 2 19:08:00.736698 kubelet[2281]: E1002 19:08:00.736681 2281 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.17.113:6443/api/v1/nodes\": dial tcp 172.31.17.113:6443: connect: connection refused" node="ip-172-31-17-113" Oct 2 19:08:00.744306 systemd[1]: Created slice kubepods-burstable-podd9900b820b3b0fee9c46b00fcc94428f.slice. Oct 2 19:08:00.829592 kubelet[2281]: E1002 19:08:00.829552 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:00.929957 kubelet[2281]: E1002 19:08:00.929848 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:01.026242 env[1632]: time="2023-10-02T19:08:01.026196190Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-17-113,Uid:6d5825b46983b93b995200a88430232c,Namespace:kube-system,Attempt:0,}" Oct 2 19:08:01.030447 kubelet[2281]: E1002 19:08:01.030417 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:01.031838 kubelet[2281]: E1002 19:08:01.031803 2281 controller.go:144] failed to ensure lease exists, will retry in 800ms, error: Get "https://172.31.17.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-17-113?timeout=10s": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:01.036660 env[1632]: time="2023-10-02T19:08:01.036596802Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-17-113,Uid:9f658ff3737bf7ee29ce94d7c59420a3,Namespace:kube-system,Attempt:0,}" Oct 2 19:08:01.048951 env[1632]: time="2023-10-02T19:08:01.048899796Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-17-113,Uid:d9900b820b3b0fee9c46b00fcc94428f,Namespace:kube-system,Attempt:0,}" Oct 2 19:08:01.130706 kubelet[2281]: E1002 19:08:01.130665 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:01.147061 kubelet[2281]: I1002 19:08:01.147037 2281 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-17-113" Oct 2 19:08:01.147748 kubelet[2281]: E1002 19:08:01.147721 2281 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.17.113:6443/api/v1/nodes\": dial tcp 172.31.17.113:6443: connect: connection refused" node="ip-172-31-17-113" Oct 2 19:08:01.231318 kubelet[2281]: E1002 19:08:01.231210 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:01.331937 kubelet[2281]: E1002 19:08:01.331892 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:01.378952 kubelet[2281]: W1002 19:08:01.378882 2281 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: Get "https://172.31.17.113:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-17-113&limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:01.378952 kubelet[2281]: E1002 19:08:01.378958 2281 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.17.113:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-17-113&limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:01.432439 kubelet[2281]: E1002 19:08:01.432397 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:01.533338 kubelet[2281]: E1002 19:08:01.533292 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:01.564915 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1305102625.mount: Deactivated successfully. Oct 2 19:08:01.571648 env[1632]: time="2023-10-02T19:08:01.571584764Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:01.576707 env[1632]: time="2023-10-02T19:08:01.576662899Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:01.577974 env[1632]: time="2023-10-02T19:08:01.577933795Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:01.579526 env[1632]: time="2023-10-02T19:08:01.579478717Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:01.583508 env[1632]: time="2023-10-02T19:08:01.583463054Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:01.584976 env[1632]: time="2023-10-02T19:08:01.584934618Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:01.587153 env[1632]: time="2023-10-02T19:08:01.586928874Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:01.592304 env[1632]: time="2023-10-02T19:08:01.592226612Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:01.597210 env[1632]: time="2023-10-02T19:08:01.597162800Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:01.600475 env[1632]: time="2023-10-02T19:08:01.600424506Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:01.601770 env[1632]: time="2023-10-02T19:08:01.601725693Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:01.605260 env[1632]: time="2023-10-02T19:08:01.605212380Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:01.639985 kubelet[2281]: E1002 19:08:01.639852 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:01.663925 env[1632]: time="2023-10-02T19:08:01.655075671Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:01.663925 env[1632]: time="2023-10-02T19:08:01.655140314Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:01.663925 env[1632]: time="2023-10-02T19:08:01.655157513Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:01.663925 env[1632]: time="2023-10-02T19:08:01.655366142Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/449e701bb8703e69101f0940c6b0940756df1a1a1d4c86ec3a28c6d91180c936 pid=2360 runtime=io.containerd.runc.v2 Oct 2 19:08:01.664520 env[1632]: time="2023-10-02T19:08:01.663654964Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:01.664520 env[1632]: time="2023-10-02T19:08:01.663747135Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:01.664520 env[1632]: time="2023-10-02T19:08:01.663764008Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:01.676732 env[1632]: time="2023-10-02T19:08:01.676283072Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7188c4006a165434def5f71d746cf6536e298ceacbd4b4d183f97d3f62648061 pid=2378 runtime=io.containerd.runc.v2 Oct 2 19:08:01.689662 env[1632]: time="2023-10-02T19:08:01.689541334Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:01.689836 env[1632]: time="2023-10-02T19:08:01.689688265Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:01.689836 env[1632]: time="2023-10-02T19:08:01.689721004Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:01.689950 env[1632]: time="2023-10-02T19:08:01.689915905Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f2a4c166369bb9f0c9cb39e351c396a926e35d8864adf0cd2fb44defc7afe672 pid=2400 runtime=io.containerd.runc.v2 Oct 2 19:08:01.732470 kubelet[2281]: W1002 19:08:01.732362 2281 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: Get "https://172.31.17.113:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:01.732470 kubelet[2281]: E1002 19:08:01.732444 2281 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.17.113:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:01.740086 kubelet[2281]: W1002 19:08:01.739880 2281 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: Get "https://172.31.17.113:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:01.740086 kubelet[2281]: E1002 19:08:01.739959 2281 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.17.113:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:01.740086 kubelet[2281]: E1002 19:08:01.740011 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:01.755745 systemd[1]: Started cri-containerd-7188c4006a165434def5f71d746cf6536e298ceacbd4b4d183f97d3f62648061.scope. Oct 2 19:08:01.779080 systemd[1]: Started cri-containerd-449e701bb8703e69101f0940c6b0940756df1a1a1d4c86ec3a28c6d91180c936.scope. Oct 2 19:08:01.793180 systemd[1]: Started cri-containerd-f2a4c166369bb9f0c9cb39e351c396a926e35d8864adf0cd2fb44defc7afe672.scope. Oct 2 19:08:01.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.797000 audit: BPF prog-id=67 op=LOAD Oct 2 19:08:01.798000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.798000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2378 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731383863343030366131363534333464656635663731643734366366 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2378 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731383863343030366131363534333464656635663731643734366366 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit: BPF prog-id=68 op=LOAD Oct 2 19:08:01.799000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00031e5e0 items=0 ppid=2378 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731383863343030366131363534333464656635663731643734366366 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.799000 audit: BPF prog-id=69 op=LOAD Oct 2 19:08:01.799000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00031e628 items=0 ppid=2378 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731383863343030366131363534333464656635663731643734366366 Oct 2 19:08:01.799000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:08:01.799000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:08:01.801000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.801000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.801000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.801000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.801000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.801000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.801000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.801000 audit[2393]: AVC avc: denied { perfmon } for pid=2393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.801000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.801000 audit[2393]: AVC avc: denied { bpf } for pid=2393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.801000 audit: BPF prog-id=70 op=LOAD Oct 2 19:08:01.801000 audit[2393]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00031ea38 items=0 ppid=2378 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731383863343030366131363534333464656635663731643734366366 Oct 2 19:08:01.832897 kubelet[2281]: E1002 19:08:01.832839 2281 controller.go:144] failed to ensure lease exists, will retry in 1.6s, error: Get "https://172.31.17.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-17-113?timeout=10s": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:01.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.838000 audit: BPF prog-id=71 op=LOAD Oct 2 19:08:01.841834 kubelet[2281]: E1002 19:08:01.841177 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2360 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434396537303162623837303365363931303166303934306336623039 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2360 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434396537303162623837303365363931303166303934306336623039 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit: BPF prog-id=72 op=LOAD Oct 2 19:08:01.840000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00029a620 items=0 ppid=2360 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434396537303162623837303365363931303166303934306336623039 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.840000 audit: BPF prog-id=73 op=LOAD Oct 2 19:08:01.840000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00029a668 items=0 ppid=2360 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434396537303162623837303365363931303166303934306336623039 Oct 2 19:08:01.841000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:08:01.841000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:08:01.841000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.841000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.841000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.841000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.841000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.841000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.841000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.841000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.841000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.841000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.841000 audit: BPF prog-id=74 op=LOAD Oct 2 19:08:01.841000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00029aa78 items=0 ppid=2360 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434396537303162623837303365363931303166303934306336623039 Oct 2 19:08:01.848946 kubelet[2281]: W1002 19:08:01.848834 2281 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: Get "https://172.31.17.113:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:01.848946 kubelet[2281]: E1002 19:08:01.848907 2281 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.17.113:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:01.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.865000 audit: BPF prog-id=75 op=LOAD Oct 2 19:08:01.867000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.867000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2400 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613463313636333639626239663063396362333965333531633339 Oct 2 19:08:01.867000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.867000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2400 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613463313636333639626239663063396362333965333531633339 Oct 2 19:08:01.867000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.867000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.867000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.867000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.867000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.867000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.867000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.867000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.867000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.867000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.867000 audit: BPF prog-id=76 op=LOAD Oct 2 19:08:01.867000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024660 items=0 ppid=2400 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613463313636333639626239663063396362333965333531633339 Oct 2 19:08:01.868000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.868000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.868000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.868000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.868000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.868000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.868000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.868000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.868000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.868000 audit: BPF prog-id=77 op=LOAD Oct 2 19:08:01.868000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000246a8 items=0 ppid=2400 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613463313636333639626239663063396362333965333531633339 Oct 2 19:08:01.869000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:08:01.870000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:08:01.870000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.870000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.870000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.870000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.870000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.870000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.870000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.870000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.870000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.870000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.870000 audit: BPF prog-id=78 op=LOAD Oct 2 19:08:01.870000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024ab8 items=0 ppid=2400 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613463313636333639626239663063396362333965333531633339 Oct 2 19:08:01.876428 env[1632]: time="2023-10-02T19:08:01.876365639Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-17-113,Uid:6d5825b46983b93b995200a88430232c,Namespace:kube-system,Attempt:0,} returns sandbox id \"7188c4006a165434def5f71d746cf6536e298ceacbd4b4d183f97d3f62648061\"" Oct 2 19:08:01.884509 env[1632]: time="2023-10-02T19:08:01.884458359Z" level=info msg="CreateContainer within sandbox \"7188c4006a165434def5f71d746cf6536e298ceacbd4b4d183f97d3f62648061\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:08:01.908467 env[1632]: time="2023-10-02T19:08:01.908428901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-17-113,Uid:9f658ff3737bf7ee29ce94d7c59420a3,Namespace:kube-system,Attempt:0,} returns sandbox id \"449e701bb8703e69101f0940c6b0940756df1a1a1d4c86ec3a28c6d91180c936\"" Oct 2 19:08:01.909317 env[1632]: time="2023-10-02T19:08:01.909285549Z" level=info msg="CreateContainer within sandbox \"7188c4006a165434def5f71d746cf6536e298ceacbd4b4d183f97d3f62648061\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"63d0435c30824460291677875e22379e3b5787731a429aa8c1d7babc2324a876\"" Oct 2 19:08:01.910795 env[1632]: time="2023-10-02T19:08:01.910760462Z" level=info msg="StartContainer for \"63d0435c30824460291677875e22379e3b5787731a429aa8c1d7babc2324a876\"" Oct 2 19:08:01.914868 env[1632]: time="2023-10-02T19:08:01.914824613Z" level=info msg="CreateContainer within sandbox \"449e701bb8703e69101f0940c6b0940756df1a1a1d4c86ec3a28c6d91180c936\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:08:01.935284 env[1632]: time="2023-10-02T19:08:01.935103619Z" level=info msg="CreateContainer within sandbox \"449e701bb8703e69101f0940c6b0940756df1a1a1d4c86ec3a28c6d91180c936\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"84abc3225ad446c7b16b6a7a6a7a4a40840e374ea547e5cfa1f934e10cb1e026\"" Oct 2 19:08:01.936163 env[1632]: time="2023-10-02T19:08:01.936123744Z" level=info msg="StartContainer for \"84abc3225ad446c7b16b6a7a6a7a4a40840e374ea547e5cfa1f934e10cb1e026\"" Oct 2 19:08:01.941371 kubelet[2281]: E1002 19:08:01.941308 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:01.948013 systemd[1]: Started cri-containerd-63d0435c30824460291677875e22379e3b5787731a429aa8c1d7babc2324a876.scope. Oct 2 19:08:01.956992 kubelet[2281]: I1002 19:08:01.956523 2281 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-17-113" Oct 2 19:08:01.956992 kubelet[2281]: E1002 19:08:01.956965 2281 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.17.113:6443/api/v1/nodes\": dial tcp 172.31.17.113:6443: connect: connection refused" node="ip-172-31-17-113" Oct 2 19:08:01.963482 env[1632]: time="2023-10-02T19:08:01.963432317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-17-113,Uid:d9900b820b3b0fee9c46b00fcc94428f,Namespace:kube-system,Attempt:0,} returns sandbox id \"f2a4c166369bb9f0c9cb39e351c396a926e35d8864adf0cd2fb44defc7afe672\"" Oct 2 19:08:01.968912 env[1632]: time="2023-10-02T19:08:01.968865526Z" level=info msg="CreateContainer within sandbox \"f2a4c166369bb9f0c9cb39e351c396a926e35d8864adf0cd2fb44defc7afe672\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:08:01.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.977000 audit: BPF prog-id=79 op=LOAD Oct 2 19:08:01.985000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.985000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2378 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633643034333563333038323434363032393136373738373565323233 Oct 2 19:08:01.989000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.989000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=2378 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633643034333563333038323434363032393136373738373565323233 Oct 2 19:08:01.989000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.989000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.989000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.989000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.989000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.989000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.989000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.989000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.989000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.989000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.989000 audit: BPF prog-id=80 op=LOAD Oct 2 19:08:01.989000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000398a10 items=0 ppid=2378 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633643034333563333038323434363032393136373738373565323233 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit: BPF prog-id=81 op=LOAD Oct 2 19:08:01.990000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000398a58 items=0 ppid=2378 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633643034333563333038323434363032393136373738373565323233 Oct 2 19:08:01.990000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:08:01.990000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { perfmon } for pid=2480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit[2480]: AVC avc: denied { bpf } for pid=2480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:01.990000 audit: BPF prog-id=82 op=LOAD Oct 2 19:08:01.990000 audit[2480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000398e68 items=0 ppid=2378 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:01.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633643034333563333038323434363032393136373738373565323233 Oct 2 19:08:02.011041 env[1632]: time="2023-10-02T19:08:02.010983045Z" level=info msg="CreateContainer within sandbox \"f2a4c166369bb9f0c9cb39e351c396a926e35d8864adf0cd2fb44defc7afe672\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"3e9bc94037802e98a60c138142fa01b4692124583d7fc17780e2b15c455f9510\"" Oct 2 19:08:02.011846 env[1632]: time="2023-10-02T19:08:02.011812323Z" level=info msg="StartContainer for \"3e9bc94037802e98a60c138142fa01b4692124583d7fc17780e2b15c455f9510\"" Oct 2 19:08:02.033103 systemd[1]: Started cri-containerd-84abc3225ad446c7b16b6a7a6a7a4a40840e374ea547e5cfa1f934e10cb1e026.scope. Oct 2 19:08:02.041984 kubelet[2281]: E1002 19:08:02.041832 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:02.081018 systemd[1]: Started cri-containerd-3e9bc94037802e98a60c138142fa01b4692124583d7fc17780e2b15c455f9510.scope. Oct 2 19:08:02.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.093000 audit: BPF prog-id=83 op=LOAD Oct 2 19:08:02.095000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.095000 audit[2513]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2360 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:02.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834616263333232356164343436633762313662366137613661376134 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2360 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:02.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834616263333232356164343436633762313662366137613661376134 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit: BPF prog-id=84 op=LOAD Oct 2 19:08:02.096000 audit[2513]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000250a0 items=0 ppid=2360 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:02.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834616263333232356164343436633762313662366137613661376134 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.096000 audit: BPF prog-id=85 op=LOAD Oct 2 19:08:02.096000 audit[2513]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000250e8 items=0 ppid=2360 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:02.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834616263333232356164343436633762313662366137613661376134 Oct 2 19:08:02.097000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:08:02.097000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:08:02.097000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.097000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.097000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.097000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.097000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.097000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.097000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.097000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.097000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.097000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.097000 audit: BPF prog-id=86 op=LOAD Oct 2 19:08:02.097000 audit[2513]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000254f8 items=0 ppid=2360 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:02.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834616263333232356164343436633762313662366137613661376134 Oct 2 19:08:02.108401 env[1632]: time="2023-10-02T19:08:02.108344058Z" level=info msg="StartContainer for \"63d0435c30824460291677875e22379e3b5787731a429aa8c1d7babc2324a876\" returns successfully" Oct 2 19:08:02.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.116000 audit: BPF prog-id=87 op=LOAD Oct 2 19:08:02.117000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.117000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2400 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:02.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365396263393430333738303265393861363063313338313432666130 Oct 2 19:08:02.117000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.117000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=2400 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:02.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365396263393430333738303265393861363063313338313432666130 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit: BPF prog-id=88 op=LOAD Oct 2 19:08:02.118000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c0003b20c0 items=0 ppid=2400 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:02.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365396263393430333738303265393861363063313338313432666130 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.118000 audit: BPF prog-id=89 op=LOAD Oct 2 19:08:02.118000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0003b2108 items=0 ppid=2400 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:02.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365396263393430333738303265393861363063313338313432666130 Oct 2 19:08:02.119000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:08:02.119000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:08:02.119000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.119000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.119000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.119000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.119000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.119000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.119000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.119000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.119000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.119000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:02.119000 audit: BPF prog-id=90 op=LOAD Oct 2 19:08:02.119000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0003b2518 items=0 ppid=2400 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:02.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365396263393430333738303265393861363063313338313432666130 Oct 2 19:08:02.142150 kubelet[2281]: E1002 19:08:02.142105 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:02.166771 env[1632]: time="2023-10-02T19:08:02.166719182Z" level=info msg="StartContainer for \"84abc3225ad446c7b16b6a7a6a7a4a40840e374ea547e5cfa1f934e10cb1e026\" returns successfully" Oct 2 19:08:02.183687 env[1632]: time="2023-10-02T19:08:02.183608496Z" level=info msg="StartContainer for \"3e9bc94037802e98a60c138142fa01b4692124583d7fc17780e2b15c455f9510\" returns successfully" Oct 2 19:08:02.243155 kubelet[2281]: E1002 19:08:02.243018 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:02.343674 kubelet[2281]: E1002 19:08:02.343472 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:02.444362 kubelet[2281]: E1002 19:08:02.444314 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:02.545058 kubelet[2281]: E1002 19:08:02.544957 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:02.558342 kubelet[2281]: E1002 19:08:02.558309 2281 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.17.113:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.17.113:6443: connect: connection refused Oct 2 19:08:02.599618 kubelet[2281]: I1002 19:08:02.599199 2281 status_manager.go:667] "Failed to get status for pod" podUID=9f658ff3737bf7ee29ce94d7c59420a3 pod="kube-system/kube-controller-manager-ip-172-31-17-113" err="Get \"https://172.31.17.113:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-17-113\": dial tcp 172.31.17.113:6443: connect: connection refused" Oct 2 19:08:02.605900 kubelet[2281]: I1002 19:08:02.605873 2281 status_manager.go:667] "Failed to get status for pod" podUID=d9900b820b3b0fee9c46b00fcc94428f pod="kube-system/kube-scheduler-ip-172-31-17-113" err="Get \"https://172.31.17.113:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-17-113\": dial tcp 172.31.17.113:6443: connect: connection refused" Oct 2 19:08:02.609548 kubelet[2281]: I1002 19:08:02.609521 2281 status_manager.go:667] "Failed to get status for pod" podUID=6d5825b46983b93b995200a88430232c pod="kube-system/kube-apiserver-ip-172-31-17-113" err="Get \"https://172.31.17.113:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-17-113\": dial tcp 172.31.17.113:6443: connect: connection refused" Oct 2 19:08:02.645557 kubelet[2281]: E1002 19:08:02.645518 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:02.746354 kubelet[2281]: E1002 19:08:02.746319 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:02.846779 kubelet[2281]: E1002 19:08:02.846743 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:02.947623 kubelet[2281]: E1002 19:08:02.947505 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:03.048381 kubelet[2281]: E1002 19:08:03.048345 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:03.148841 kubelet[2281]: E1002 19:08:03.148804 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:03.249300 kubelet[2281]: E1002 19:08:03.249264 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:03.349745 kubelet[2281]: E1002 19:08:03.349708 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:03.450807 kubelet[2281]: E1002 19:08:03.450772 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:03.551999 kubelet[2281]: E1002 19:08:03.551890 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:03.558972 kubelet[2281]: I1002 19:08:03.558947 2281 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-17-113" Oct 2 19:08:03.653220 kubelet[2281]: E1002 19:08:03.653170 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:03.753348 kubelet[2281]: E1002 19:08:03.753304 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:03.813460 kernel: kauditd_printk_skb: 620 callbacks suppressed Oct 2 19:08:03.813706 kernel: audit: type=1400 audit(1696273683.804:737): avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:03.804000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:03.804000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0002f6300 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:08:03.823666 kernel: audit: type=1300 audit(1696273683.804:737): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0002f6300 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:08:03.804000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:03.840097 kernel: audit: type=1327 audit(1696273683.804:737): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:03.840246 kernel: audit: type=1400 audit(1696273683.813:738): avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:03.813000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:03.813000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b20180 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:08:03.813000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:03.855450 kernel: audit: type=1300 audit(1696273683.813:738): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b20180 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:08:03.855577 kernel: audit: type=1327 audit(1696273683.813:738): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:03.855612 kubelet[2281]: E1002 19:08:03.855542 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:03.956295 kubelet[2281]: E1002 19:08:03.956250 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:04.056916 kubelet[2281]: E1002 19:08:04.056878 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:04.158166 kubelet[2281]: E1002 19:08:04.158053 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:04.258400 kubelet[2281]: E1002 19:08:04.258365 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:04.359574 kubelet[2281]: E1002 19:08:04.359530 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:04.460713 kubelet[2281]: E1002 19:08:04.460577 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:04.561517 kubelet[2281]: E1002 19:08:04.561474 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:04.661972 kubelet[2281]: E1002 19:08:04.661830 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:04.762806 kubelet[2281]: E1002 19:08:04.762763 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:04.863530 kubelet[2281]: E1002 19:08:04.863490 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:04.965972 kubelet[2281]: E1002 19:08:04.964856 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:05.065825 kubelet[2281]: E1002 19:08:05.065701 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:05.166698 kubelet[2281]: E1002 19:08:05.166656 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:05.267772 kubelet[2281]: E1002 19:08:05.267728 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:05.368826 kubelet[2281]: E1002 19:08:05.368709 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:05.469316 kubelet[2281]: E1002 19:08:05.469273 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:05.515073 kubelet[2281]: E1002 19:08:05.515041 2281 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:08:05.570370 kubelet[2281]: E1002 19:08:05.570333 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:05.671689 kubelet[2281]: E1002 19:08:05.671576 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:05.773040 kubelet[2281]: E1002 19:08:05.772994 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:05.873795 kubelet[2281]: E1002 19:08:05.873758 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:05.974948 kubelet[2281]: E1002 19:08:05.974839 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:06.075906 kubelet[2281]: E1002 19:08:06.075858 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:06.176752 kubelet[2281]: E1002 19:08:06.176717 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:06.277710 kubelet[2281]: E1002 19:08:06.277674 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:06.378750 kubelet[2281]: E1002 19:08:06.378709 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:06.480214 kubelet[2281]: E1002 19:08:06.480175 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:06.523000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:06.525000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:06.538674 kernel: audit: type=1400 audit(1696273686.523:739): avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:06.538826 kernel: audit: type=1400 audit(1696273686.525:740): avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:06.548489 kernel: audit: type=1300 audit(1696273686.525:740): arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c002743410 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:08:06.525000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c002743410 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:08:06.525000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:06.523000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0021a3650 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:08:06.559775 kernel: audit: type=1327 audit(1696273686.525:740): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:06.523000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:06.525000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:06.525000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c0028cd6e0 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:08:06.525000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:06.526000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:06.526000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0021a38c0 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:08:06.526000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:06.540000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:06.540000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0028b21c0 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:08:06.540000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:06.540000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:06.540000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00288c7b0 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:08:06.540000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:06.584139 kubelet[2281]: E1002 19:08:06.583579 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:06.689822 kubelet[2281]: E1002 19:08:06.689781 2281 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:06.737015 kubelet[2281]: I1002 19:08:06.736988 2281 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-17-113" Oct 2 19:08:06.737784 kubelet[2281]: E1002 19:08:06.737764 2281 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-17-113\" not found" node="ip-172-31-17-113" Oct 2 19:08:06.799942 kubelet[2281]: E1002 19:08:06.799738 2281 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-17-113.178a5fecd1d32206", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-17-113", UID:"ip-172-31-17-113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-17-113"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 395608582, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 395608582, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:06.857426 kubelet[2281]: E1002 19:08:06.857307 2281 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-17-113.178a5fecd349296a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-17-113", UID:"ip-172-31-17-113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-17-113"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 420120938, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 420120938, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:06.944901 kubelet[2281]: E1002 19:08:06.941658 2281 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-17-113.178a5fecd651812d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-17-113", UID:"ip-172-31-17-113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-17-113 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-17-113"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 470999341, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 470999341, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:07.001396 kubelet[2281]: E1002 19:08:07.001227 2281 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-17-113.178a5fecd651982b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-17-113", UID:"ip-172-31-17-113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-17-113 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-17-113"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 471005227, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 471005227, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:07.058609 kubelet[2281]: E1002 19:08:07.058173 2281 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-17-113.178a5fecd651a384", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-17-113", UID:"ip-172-31-17-113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-17-113 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-17-113"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 471008132, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 471008132, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:07.133605 kubelet[2281]: E1002 19:08:07.133516 2281 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-17-113.178a5fecd8fb1ff2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-17-113", UID:"ip-172-31-17-113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-17-113"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 515670002, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 515670002, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:07.189621 kubelet[2281]: E1002 19:08:07.189520 2281 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-17-113.178a5fecd651812d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-17-113", UID:"ip-172-31-17-113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-17-113 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-17-113"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 470999341, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 526333459, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:07.246621 kubelet[2281]: E1002 19:08:07.246514 2281 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-17-113.178a5fecd651982b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-17-113", UID:"ip-172-31-17-113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-17-113 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-17-113"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 471005227, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 526340699, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:07.274981 kubelet[2281]: E1002 19:08:07.274948 2281 kubelet.go:1712] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-17-113\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ip-172-31-17-113" Oct 2 19:08:07.314889 kubelet[2281]: E1002 19:08:07.314697 2281 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-17-113.178a5fecd651a384", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-17-113", UID:"ip-172-31-17-113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-17-113 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-17-113"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 471008132, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 526345353, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:07.420289 kubelet[2281]: I1002 19:08:07.420252 2281 apiserver.go:52] "Watching apiserver" Oct 2 19:08:07.455264 kubelet[2281]: E1002 19:08:07.455162 2281 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-17-113.178a5fecd651812d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-17-113", UID:"ip-172-31-17-113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-17-113 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-17-113"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 470999341, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 687252461, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:07.490376 kubelet[2281]: I1002 19:08:07.490332 2281 reconciler.go:169] "Reconciler: start to sync state" Oct 2 19:08:07.855876 kubelet[2281]: E1002 19:08:07.855756 2281 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-17-113.178a5fecd651982b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-17-113", UID:"ip-172-31-17-113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-17-113 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-17-113"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 471005227, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 687260321, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:07.902845 update_engine[1617]: I1002 19:08:07.901105 1617 update_attempter.cc:505] Updating boot flags... Oct 2 19:08:08.297329 kubelet[2281]: E1002 19:08:08.297212 2281 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-17-113.178a5fecd651a384", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-17-113", UID:"ip-172-31-17-113", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-17-113 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-17-113"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 471008132, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 8, 0, 687264435, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:09.938572 systemd[1]: Reloading. Oct 2 19:08:10.091679 /usr/lib/systemd/system-generators/torcx-generator[2793]: time="2023-10-02T19:08:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:08:10.091717 /usr/lib/systemd/system-generators/torcx-generator[2793]: time="2023-10-02T19:08:10Z" level=info msg="torcx already run" Oct 2 19:08:10.190394 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:08:10.190418 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:08:10.214897 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:08:10.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.314196 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 19:08:10.314285 kernel: audit: type=1400 audit(1696273690.312:745): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.323673 kernel: audit: type=1400 audit(1696273690.312:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.328198 kernel: audit: type=1400 audit(1696273690.314:747): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.332989 kernel: audit: type=1400 audit(1696273690.314:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.337517 kernel: audit: type=1400 audit(1696273690.314:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.346674 kernel: audit: type=1400 audit(1696273690.314:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.346759 kernel: audit: type=1400 audit(1696273690.314:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.346810 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:08:10.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.351978 kernel: audit: type=1400 audit(1696273690.314:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.352048 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:08:10.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.318000 audit: BPF prog-id=91 op=LOAD Oct 2 19:08:10.318000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:08:10.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.323000 audit: BPF prog-id=92 op=LOAD Oct 2 19:08:10.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.323000 audit: BPF prog-id=93 op=LOAD Oct 2 19:08:10.323000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:08:10.323000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:08:10.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.332000 audit: BPF prog-id=94 op=LOAD Oct 2 19:08:10.332000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:08:10.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.337000 audit: BPF prog-id=95 op=LOAD Oct 2 19:08:10.337000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:08:10.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.342000 audit: BPF prog-id=96 op=LOAD Oct 2 19:08:10.342000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:08:10.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.353000 audit: BPF prog-id=97 op=LOAD Oct 2 19:08:10.353000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit: BPF prog-id=98 op=LOAD Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.354000 audit: BPF prog-id=99 op=LOAD Oct 2 19:08:10.354000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:08:10.354000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit: BPF prog-id=100 op=LOAD Oct 2 19:08:10.355000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit: BPF prog-id=101 op=LOAD Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit: BPF prog-id=103 op=LOAD Oct 2 19:08:10.356000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.356000 audit: BPF prog-id=104 op=LOAD Oct 2 19:08:10.356000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:08:10.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.360000 audit: BPF prog-id=105 op=LOAD Oct 2 19:08:10.360000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:08:10.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.361000 audit: BPF prog-id=106 op=LOAD Oct 2 19:08:10.361000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:08:10.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.364000 audit: BPF prog-id=107 op=LOAD Oct 2 19:08:10.364000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit: BPF prog-id=108 op=LOAD Oct 2 19:08:10.365000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit: BPF prog-id=109 op=LOAD Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.365000 audit: BPF prog-id=110 op=LOAD Oct 2 19:08:10.365000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:08:10.365000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:08:10.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.367000 audit: BPF prog-id=111 op=LOAD Oct 2 19:08:10.367000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:08:10.386031 kubelet[2281]: I1002 19:08:10.385129 2281 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:08:10.385203 systemd[1]: Stopping kubelet.service... Oct 2 19:08:10.408007 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:08:10.408252 systemd[1]: Stopped kubelet.service. Oct 2 19:08:10.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:10.408334 systemd[1]: kubelet.service: Consumed 1.087s CPU time. Oct 2 19:08:10.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:10.410611 systemd[1]: Started kubelet.service. Oct 2 19:08:10.521841 kubelet[2846]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 19:08:10.522244 kubelet[2846]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:08:10.522313 kubelet[2846]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:08:10.522530 kubelet[2846]: I1002 19:08:10.522494 2846 server.go:200] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:08:10.527345 kubelet[2846]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 19:08:10.527623 kubelet[2846]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:08:10.527721 kubelet[2846]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:08:10.534703 kubelet[2846]: I1002 19:08:10.534586 2846 server.go:413] "Kubelet version" kubeletVersion="v1.25.10" Oct 2 19:08:10.534703 kubelet[2846]: I1002 19:08:10.534619 2846 server.go:415] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:08:10.534983 kubelet[2846]: I1002 19:08:10.534943 2846 server.go:825] "Client rotation is on, will bootstrap in background" Oct 2 19:08:10.536498 kubelet[2846]: I1002 19:08:10.536469 2846 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:08:10.540124 kubelet[2846]: I1002 19:08:10.539857 2846 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:08:10.542024 kubelet[2846]: I1002 19:08:10.541242 2846 server.go:660] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:08:10.542024 kubelet[2846]: I1002 19:08:10.541684 2846 container_manager_linux.go:262] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:08:10.542024 kubelet[2846]: I1002 19:08:10.541854 2846 container_manager_linux.go:267] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] ExperimentalCPUManagerPolicy:none ExperimentalCPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container ExperimentalCPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none} Oct 2 19:08:10.542024 kubelet[2846]: I1002 19:08:10.541878 2846 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:08:10.542024 kubelet[2846]: I1002 19:08:10.541896 2846 container_manager_linux.go:302] "Creating device plugin manager" devicePluginEnabled=true Oct 2 19:08:10.542024 kubelet[2846]: I1002 19:08:10.541957 2846 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:08:10.547083 kubelet[2846]: I1002 19:08:10.546894 2846 kubelet.go:381] "Attempting to sync node with API server" Oct 2 19:08:10.547083 kubelet[2846]: I1002 19:08:10.546920 2846 kubelet.go:270] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:08:10.547083 kubelet[2846]: I1002 19:08:10.546947 2846 kubelet.go:281] "Adding apiserver pod source" Oct 2 19:08:10.547083 kubelet[2846]: I1002 19:08:10.546960 2846 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:08:10.551383 kubelet[2846]: I1002 19:08:10.551358 2846 kuberuntime_manager.go:240] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:08:10.557044 kubelet[2846]: I1002 19:08:10.556770 2846 server.go:1175] "Started kubelet" Oct 2 19:08:10.561000 audit[2846]: AVC avc: denied { mac_admin } for pid=2846 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.561000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:08:10.561000 audit[2846]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000da0b10 a1=c000dc04c8 a2=c000da0ae0 a3=25 items=0 ppid=1 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:10.561000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:08:10.563750 kubelet[2846]: I1002 19:08:10.563731 2846 kubelet.go:1274] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:08:10.563000 audit[2846]: AVC avc: denied { mac_admin } for pid=2846 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.563000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:08:10.563000 audit[2846]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d2e200 a1=c000af7320 a2=c000a8f440 a3=25 items=0 ppid=1 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:10.564339 kubelet[2846]: E1002 19:08:10.564324 2846 cri_stats_provider.go:452] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:08:10.564524 kubelet[2846]: E1002 19:08:10.564512 2846 kubelet.go:1317] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:08:10.563000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:08:10.568342 kubelet[2846]: I1002 19:08:10.568323 2846 server.go:155] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:08:10.569869 kubelet[2846]: I1002 19:08:10.569851 2846 server.go:438] "Adding debug handlers to kubelet server" Oct 2 19:08:10.574182 kubelet[2846]: I1002 19:08:10.572033 2846 kubelet.go:1278] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:08:10.574372 kubelet[2846]: I1002 19:08:10.574360 2846 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:08:10.581446 kubelet[2846]: I1002 19:08:10.581424 2846 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 19:08:10.581718 kubelet[2846]: I1002 19:08:10.581704 2846 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Oct 2 19:08:10.582899 kubelet[2846]: E1002 19:08:10.582882 2846 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:08:10.689806 kubelet[2846]: I1002 19:08:10.689676 2846 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:08:10.692753 kubelet[2846]: E1002 19:08:10.692715 2846 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-17-113\" not found" Oct 2 19:08:10.717502 kubelet[2846]: I1002 19:08:10.717478 2846 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-17-113" Oct 2 19:08:10.761977 kubelet[2846]: I1002 19:08:10.761945 2846 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-17-113" Oct 2 19:08:10.762133 kubelet[2846]: I1002 19:08:10.762031 2846 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-17-113" Oct 2 19:08:10.815994 kubelet[2846]: I1002 19:08:10.815890 2846 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:08:10.815994 kubelet[2846]: I1002 19:08:10.815924 2846 status_manager.go:161] "Starting to sync pod status with apiserver" Oct 2 19:08:10.815994 kubelet[2846]: I1002 19:08:10.815949 2846 kubelet.go:2010] "Starting kubelet main sync loop" Oct 2 19:08:10.820667 kubelet[2846]: E1002 19:08:10.819224 2846 kubelet.go:2034] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:08:10.836730 kubelet[2846]: I1002 19:08:10.836702 2846 cpu_manager.go:213] "Starting CPU manager" policy="none" Oct 2 19:08:10.836730 kubelet[2846]: I1002 19:08:10.836728 2846 cpu_manager.go:214] "Reconciling" reconcilePeriod="10s" Oct 2 19:08:10.836998 kubelet[2846]: I1002 19:08:10.836745 2846 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:08:10.838098 kubelet[2846]: I1002 19:08:10.838009 2846 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:08:10.838237 kubelet[2846]: I1002 19:08:10.838220 2846 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 19:08:10.838313 kubelet[2846]: I1002 19:08:10.838240 2846 policy_none.go:49] "None policy: Start" Oct 2 19:08:10.841113 kubelet[2846]: I1002 19:08:10.841088 2846 memory_manager.go:168] "Starting memorymanager" policy="None" Oct 2 19:08:10.841231 kubelet[2846]: I1002 19:08:10.841120 2846 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:08:10.842691 kubelet[2846]: I1002 19:08:10.842668 2846 state_mem.go:75] "Updated machine memory state" Oct 2 19:08:10.847916 kubelet[2846]: I1002 19:08:10.847890 2846 manager.go:447] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:08:10.848624 kubelet[2846]: I1002 19:08:10.848462 2846 server.go:86] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:08:10.847000 audit[2846]: AVC avc: denied { mac_admin } for pid=2846 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:10.847000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:08:10.847000 audit[2846]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001343650 a1=c001412228 a2=c001343620 a3=25 items=0 ppid=1 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:10.847000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:08:10.849174 kubelet[2846]: I1002 19:08:10.848817 2846 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:08:10.851000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:08:10.851000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e1be00 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:08:10.851000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:10.919582 kubelet[2846]: I1002 19:08:10.919549 2846 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:08:10.919901 kubelet[2846]: I1002 19:08:10.919885 2846 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:08:10.920036 kubelet[2846]: I1002 19:08:10.920025 2846 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:08:10.938068 kubelet[2846]: E1002 19:08:10.938042 2846 kubelet.go:1712] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-17-113\" already exists" pod="kube-system/kube-scheduler-ip-172-31-17-113" Oct 2 19:08:10.939000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:10.939000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c000efad40 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:08:10.939000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:10.942000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:10.942000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=11 a1=c000efaea0 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:08:10.942000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:10.943000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:10.943000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=15 a1=c000f6d9e0 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:08:10.943000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:10.946000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:10.946000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c000f6db40 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:08:10.946000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:10.995944 kubelet[2846]: I1002 19:08:10.995909 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9f658ff3737bf7ee29ce94d7c59420a3-ca-certs\") pod \"kube-controller-manager-ip-172-31-17-113\" (UID: \"9f658ff3737bf7ee29ce94d7c59420a3\") " pod="kube-system/kube-controller-manager-ip-172-31-17-113" Oct 2 19:08:10.996187 kubelet[2846]: I1002 19:08:10.996170 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9f658ff3737bf7ee29ce94d7c59420a3-k8s-certs\") pod \"kube-controller-manager-ip-172-31-17-113\" (UID: \"9f658ff3737bf7ee29ce94d7c59420a3\") " pod="kube-system/kube-controller-manager-ip-172-31-17-113" Oct 2 19:08:10.996309 kubelet[2846]: I1002 19:08:10.996301 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6d5825b46983b93b995200a88430232c-ca-certs\") pod \"kube-apiserver-ip-172-31-17-113\" (UID: \"6d5825b46983b93b995200a88430232c\") " pod="kube-system/kube-apiserver-ip-172-31-17-113" Oct 2 19:08:10.996483 kubelet[2846]: I1002 19:08:10.996468 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6d5825b46983b93b995200a88430232c-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-17-113\" (UID: \"6d5825b46983b93b995200a88430232c\") " pod="kube-system/kube-apiserver-ip-172-31-17-113" Oct 2 19:08:10.996628 kubelet[2846]: I1002 19:08:10.996619 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/9f658ff3737bf7ee29ce94d7c59420a3-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-17-113\" (UID: \"9f658ff3737bf7ee29ce94d7c59420a3\") " pod="kube-system/kube-controller-manager-ip-172-31-17-113" Oct 2 19:08:10.996759 kubelet[2846]: I1002 19:08:10.996750 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9f658ff3737bf7ee29ce94d7c59420a3-kubeconfig\") pod \"kube-controller-manager-ip-172-31-17-113\" (UID: \"9f658ff3737bf7ee29ce94d7c59420a3\") " pod="kube-system/kube-controller-manager-ip-172-31-17-113" Oct 2 19:08:10.996875 kubelet[2846]: I1002 19:08:10.996867 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9f658ff3737bf7ee29ce94d7c59420a3-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-17-113\" (UID: \"9f658ff3737bf7ee29ce94d7c59420a3\") " pod="kube-system/kube-controller-manager-ip-172-31-17-113" Oct 2 19:08:10.996986 kubelet[2846]: I1002 19:08:10.996979 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d9900b820b3b0fee9c46b00fcc94428f-kubeconfig\") pod \"kube-scheduler-ip-172-31-17-113\" (UID: \"d9900b820b3b0fee9c46b00fcc94428f\") " pod="kube-system/kube-scheduler-ip-172-31-17-113" Oct 2 19:08:10.997102 kubelet[2846]: I1002 19:08:10.997088 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6d5825b46983b93b995200a88430232c-k8s-certs\") pod \"kube-apiserver-ip-172-31-17-113\" (UID: \"6d5825b46983b93b995200a88430232c\") " pod="kube-system/kube-apiserver-ip-172-31-17-113" Oct 2 19:08:11.564464 kubelet[2846]: I1002 19:08:11.564302 2846 apiserver.go:52] "Watching apiserver" Oct 2 19:08:11.604661 kubelet[2846]: I1002 19:08:11.602226 2846 reconciler.go:169] "Reconciler: start to sync state" Oct 2 19:08:11.838423 kubelet[2846]: E1002 19:08:11.838260 2846 kubelet.go:1712] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-17-113\" already exists" pod="kube-system/kube-apiserver-ip-172-31-17-113" Oct 2 19:08:11.964116 kubelet[2846]: E1002 19:08:11.964063 2846 kubelet.go:1712] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-17-113\" already exists" pod="kube-system/kube-scheduler-ip-172-31-17-113" Oct 2 19:08:12.371837 kubelet[2846]: E1002 19:08:12.371791 2846 kubelet.go:1712] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ip-172-31-17-113\" already exists" pod="kube-system/kube-controller-manager-ip-172-31-17-113" Oct 2 19:08:15.849525 kubelet[2846]: E1002 19:08:15.849495 2846 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:08:16.351554 sudo[1887]: pam_unix(sudo:session): session closed for user root Oct 2 19:08:16.360036 kernel: kauditd_printk_skb: 281 callbacks suppressed Oct 2 19:08:16.360223 kernel: audit: type=1106 audit(1696273696.349:990): pid=1887 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.349000 audit[1887]: USER_END pid=1887 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.350000 audit[1887]: CRED_DISP pid=1887 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.373627 kernel: audit: type=1104 audit(1696273696.350:991): pid=1887 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.397662 sshd[1884]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:16.399000 audit[1884]: USER_END pid=1884 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:16.404106 systemd[1]: sshd@6-172.31.17.113:22-139.178.89.65:49172.service: Deactivated successfully. Oct 2 19:08:16.405839 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:08:16.406039 systemd[1]: session-7.scope: Consumed 4.744s CPU time. Oct 2 19:08:16.408420 systemd-logind[1616]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:08:16.411045 kernel: audit: type=1106 audit(1696273696.399:992): pid=1884 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:16.411120 kernel: audit: type=1104 audit(1696273696.399:993): pid=1884 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:16.399000 audit[1884]: CRED_DISP pid=1884 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:16.410552 systemd-logind[1616]: Removed session 7. Oct 2 19:08:16.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.17.113:22-139.178.89.65:49172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.417743 kernel: audit: type=1131 audit(1696273696.403:994): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.17.113:22-139.178.89.65:49172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:20.850982 kubelet[2846]: E1002 19:08:20.850948 2846 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:08:23.700443 kubelet[2846]: I1002 19:08:23.700406 2846 kuberuntime_manager.go:1050] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:08:23.701654 env[1632]: time="2023-10-02T19:08:23.701595136Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:08:23.702493 kubelet[2846]: I1002 19:08:23.702466 2846 kubelet_network.go:60] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:08:23.703212 kubelet[2846]: E1002 19:08:23.703193 2846 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:08:24.469245 kubelet[2846]: I1002 19:08:24.469209 2846 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:08:24.476813 systemd[1]: Created slice kubepods-besteffort-podb9f6c775_5342_433d_b81a_40e2c7d26108.slice. Oct 2 19:08:24.506381 kubelet[2846]: I1002 19:08:24.506339 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b9f6c775-5342-433d-b81a-40e2c7d26108-lib-modules\") pod \"kube-proxy-zst75\" (UID: \"b9f6c775-5342-433d-b81a-40e2c7d26108\") " pod="kube-system/kube-proxy-zst75" Oct 2 19:08:24.506564 kubelet[2846]: I1002 19:08:24.506395 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/b9f6c775-5342-433d-b81a-40e2c7d26108-kube-proxy\") pod \"kube-proxy-zst75\" (UID: \"b9f6c775-5342-433d-b81a-40e2c7d26108\") " pod="kube-system/kube-proxy-zst75" Oct 2 19:08:24.506564 kubelet[2846]: I1002 19:08:24.506430 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b9f6c775-5342-433d-b81a-40e2c7d26108-xtables-lock\") pod \"kube-proxy-zst75\" (UID: \"b9f6c775-5342-433d-b81a-40e2c7d26108\") " pod="kube-system/kube-proxy-zst75" Oct 2 19:08:24.506564 kubelet[2846]: I1002 19:08:24.506457 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-drkbw\" (UniqueName: \"kubernetes.io/projected/b9f6c775-5342-433d-b81a-40e2c7d26108-kube-api-access-drkbw\") pod \"kube-proxy-zst75\" (UID: \"b9f6c775-5342-433d-b81a-40e2c7d26108\") " pod="kube-system/kube-proxy-zst75" Oct 2 19:08:24.705182 kubelet[2846]: I1002 19:08:24.705137 2846 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:08:24.713023 systemd[1]: Created slice kubepods-besteffort-poda53a9fb9_c1f8_480a_8809_0c5b3fa0e0ba.slice. Oct 2 19:08:24.788047 env[1632]: time="2023-10-02T19:08:24.787998240Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-zst75,Uid:b9f6c775-5342-433d-b81a-40e2c7d26108,Namespace:kube-system,Attempt:0,}" Oct 2 19:08:24.808732 kubelet[2846]: I1002 19:08:24.808685 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a53a9fb9-c1f8-480a-8809-0c5b3fa0e0ba-var-lib-calico\") pod \"tigera-operator-64db64cb98-mdqmh\" (UID: \"a53a9fb9-c1f8-480a-8809-0c5b3fa0e0ba\") " pod="tigera-operator/tigera-operator-64db64cb98-mdqmh" Oct 2 19:08:24.808994 kubelet[2846]: I1002 19:08:24.808961 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rvkv8\" (UniqueName: \"kubernetes.io/projected/a53a9fb9-c1f8-480a-8809-0c5b3fa0e0ba-kube-api-access-rvkv8\") pod \"tigera-operator-64db64cb98-mdqmh\" (UID: \"a53a9fb9-c1f8-480a-8809-0c5b3fa0e0ba\") " pod="tigera-operator/tigera-operator-64db64cb98-mdqmh" Oct 2 19:08:24.826972 env[1632]: time="2023-10-02T19:08:24.825255312Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:24.826972 env[1632]: time="2023-10-02T19:08:24.826256148Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:24.826972 env[1632]: time="2023-10-02T19:08:24.826285332Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:24.832756 env[1632]: time="2023-10-02T19:08:24.830707079Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ae16b8a1649501f315bbbe9b210abd87d313a8e9f5d27fd1e333bd4c99c6ac6 pid=2959 runtime=io.containerd.runc.v2 Oct 2 19:08:24.874806 systemd[1]: Started cri-containerd-8ae16b8a1649501f315bbbe9b210abd87d313a8e9f5d27fd1e333bd4c99c6ac6.scope. Oct 2 19:08:24.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.902770 kernel: audit: type=1400 audit(1696273704.891:995): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.902904 kernel: audit: type=1400 audit(1696273704.891:996): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.907907 kernel: audit: type=1400 audit(1696273704.891:997): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.913780 kernel: audit: type=1400 audit(1696273704.891:998): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.926696 kernel: audit: type=1400 audit(1696273704.891:999): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.934682 kernel: audit: type=1400 audit(1696273704.891:1000): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.934863 kernel: audit: type=1400 audit(1696273704.891:1001): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.945701 kernel: audit: type=1400 audit(1696273704.891:1002): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.945812 kernel: audit: type=1400 audit(1696273704.891:1003): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.955328 env[1632]: time="2023-10-02T19:08:24.955279527Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-zst75,Uid:b9f6c775-5342-433d-b81a-40e2c7d26108,Namespace:kube-system,Attempt:0,} returns sandbox id \"8ae16b8a1649501f315bbbe9b210abd87d313a8e9f5d27fd1e333bd4c99c6ac6\"" Oct 2 19:08:24.955663 kernel: audit: type=1400 audit(1696273704.892:1004): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.892000 audit: BPF prog-id=112 op=LOAD Oct 2 19:08:24.892000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.892000 audit[2967]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2959 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:24.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861653136623861313634393530316633313562626265396232313061 Oct 2 19:08:24.892000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.892000 audit[2967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2959 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:24.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861653136623861313634393530316633313562626265396232313061 Oct 2 19:08:24.892000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.892000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.892000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.892000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.892000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.892000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.892000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.892000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.892000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.892000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.892000 audit: BPF prog-id=113 op=LOAD Oct 2 19:08:24.892000 audit[2967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ccc90 items=0 ppid=2959 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:24.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861653136623861313634393530316633313562626265396232313061 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit: BPF prog-id=114 op=LOAD Oct 2 19:08:24.897000 audit[2967]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003cccd8 items=0 ppid=2959 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:24.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861653136623861313634393530316633313562626265396232313061 Oct 2 19:08:24.897000 audit: BPF prog-id=114 op=UNLOAD Oct 2 19:08:24.897000 audit: BPF prog-id=113 op=UNLOAD Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.897000 audit: BPF prog-id=115 op=LOAD Oct 2 19:08:24.897000 audit[2967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003cd0e8 items=0 ppid=2959 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:24.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861653136623861313634393530316633313562626265396232313061 Oct 2 19:08:24.960733 env[1632]: time="2023-10-02T19:08:24.960693412Z" level=info msg="CreateContainer within sandbox \"8ae16b8a1649501f315bbbe9b210abd87d313a8e9f5d27fd1e333bd4c99c6ac6\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:08:24.981072 env[1632]: time="2023-10-02T19:08:24.981032162Z" level=info msg="CreateContainer within sandbox \"8ae16b8a1649501f315bbbe9b210abd87d313a8e9f5d27fd1e333bd4c99c6ac6\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"397a5a7434729f6e99507ee26f9848afcd4eb22d85271aefd7ab8b924ad5a80d\"" Oct 2 19:08:24.982213 env[1632]: time="2023-10-02T19:08:24.982179702Z" level=info msg="StartContainer for \"397a5a7434729f6e99507ee26f9848afcd4eb22d85271aefd7ab8b924ad5a80d\"" Oct 2 19:08:25.015117 systemd[1]: Started cri-containerd-397a5a7434729f6e99507ee26f9848afcd4eb22d85271aefd7ab8b924ad5a80d.scope. Oct 2 19:08:25.035340 env[1632]: time="2023-10-02T19:08:25.035293865Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-64db64cb98-mdqmh,Uid:a53a9fb9-c1f8-480a-8809-0c5b3fa0e0ba,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2959 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339376135613734333437323966366539393530376565323666393834 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit: BPF prog-id=116 op=LOAD Oct 2 19:08:25.047000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c0002c5a60 items=0 ppid=2959 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339376135613734333437323966366539393530376565323666393834 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.047000 audit: BPF prog-id=117 op=LOAD Oct 2 19:08:25.047000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0002c5aa8 items=0 ppid=2959 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339376135613734333437323966366539393530376565323666393834 Oct 2 19:08:25.047000 audit: BPF prog-id=117 op=UNLOAD Oct 2 19:08:25.051000 audit: BPF prog-id=116 op=UNLOAD Oct 2 19:08:25.051000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.051000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.051000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.051000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.051000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.051000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.051000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.051000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.051000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.051000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.051000 audit: BPF prog-id=118 op=LOAD Oct 2 19:08:25.051000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c0002c5b38 items=0 ppid=2959 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339376135613734333437323966366539393530376565323666393834 Oct 2 19:08:25.076602 env[1632]: time="2023-10-02T19:08:25.076506877Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:25.076902 env[1632]: time="2023-10-02T19:08:25.076866335Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:25.077023 env[1632]: time="2023-10-02T19:08:25.077003876Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:25.077883 env[1632]: time="2023-10-02T19:08:25.077585065Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3698f98886b8ed2acc70266dd80d8388701bd77bb1ab48d5d2b12b50ec8fc828 pid=3028 runtime=io.containerd.runc.v2 Oct 2 19:08:25.103392 env[1632]: time="2023-10-02T19:08:25.102968606Z" level=info msg="StartContainer for \"397a5a7434729f6e99507ee26f9848afcd4eb22d85271aefd7ab8b924ad5a80d\" returns successfully" Oct 2 19:08:25.130442 systemd[1]: Started cri-containerd-3698f98886b8ed2acc70266dd80d8388701bd77bb1ab48d5d2b12b50ec8fc828.scope. Oct 2 19:08:25.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.156000 audit: BPF prog-id=119 op=LOAD Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3028 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336393866393838383662386564326163633730323636646438306438 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3028 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336393866393838383662386564326163633730323636646438306438 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit: BPF prog-id=120 op=LOAD Oct 2 19:08:25.157000 audit[3042]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e27d0 items=0 ppid=3028 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336393866393838383662386564326163633730323636646438306438 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit: BPF prog-id=121 op=LOAD Oct 2 19:08:25.157000 audit[3042]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e2818 items=0 ppid=3028 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336393866393838383662386564326163633730323636646438306438 Oct 2 19:08:25.157000 audit: BPF prog-id=121 op=UNLOAD Oct 2 19:08:25.157000 audit: BPF prog-id=120 op=UNLOAD Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.157000 audit: BPF prog-id=122 op=LOAD Oct 2 19:08:25.157000 audit[3042]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e2c28 items=0 ppid=3028 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336393866393838383662386564326163633730323636646438306438 Oct 2 19:08:25.205474 env[1632]: time="2023-10-02T19:08:25.205424098Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-64db64cb98-mdqmh,Uid:a53a9fb9-c1f8-480a-8809-0c5b3fa0e0ba,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"3698f98886b8ed2acc70266dd80d8388701bd77bb1ab48d5d2b12b50ec8fc828\"" Oct 2 19:08:25.211888 env[1632]: time="2023-10-02T19:08:25.211849098Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:08:25.330696 kernel: IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP) Oct 2 19:08:25.330910 kernel: IPVS: Connection hash table configured (size=4096, memory=32Kbytes) Oct 2 19:08:25.330950 kernel: IPVS: ipvs loaded. Oct 2 19:08:25.344672 kernel: IPVS: [rr] scheduler registered. Oct 2 19:08:25.354825 kernel: IPVS: [wrr] scheduler registered. Oct 2 19:08:25.365682 kernel: IPVS: [sh] scheduler registered. Oct 2 19:08:25.450000 audit[3102]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=3102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.450000 audit[3102]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd5b56150 a2=0 a3=7fffd5b5613c items=0 ppid=3013 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.450000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:08:25.451000 audit[3103]: NETFILTER_CFG table=mangle:60 family=10 entries=1 op=nft_register_chain pid=3103 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.451000 audit[3103]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd547bddb0 a2=0 a3=7ffd547bdd9c items=0 ppid=3013 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:08:25.452000 audit[3104]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.452000 audit[3104]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc37f488a0 a2=0 a3=7ffc37f4888c items=0 ppid=3013 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:08:25.454000 audit[3105]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=3105 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.454000 audit[3106]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_chain pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.454000 audit[3106]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9dce8610 a2=0 a3=7ffc9dce85fc items=0 ppid=3013 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:08:25.454000 audit[3105]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0720f7f0 a2=0 a3=7ffc0720f7dc items=0 ppid=3013 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:08:25.460000 audit[3107]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=3107 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.460000 audit[3107]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9c937d60 a2=0 a3=7ffd9c937d4c items=0 ppid=3013 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:08:25.565000 audit[3108]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=3108 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.565000 audit[3108]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe99d7d9a0 a2=0 a3=7ffe99d7d98c items=0 ppid=3013 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:08:25.572000 audit[3110]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=3110 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.572000 audit[3110]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd805c26f0 a2=0 a3=7ffd805c26dc items=0 ppid=3013 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:08:25.579000 audit[3113]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.579000 audit[3113]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd42d2bd70 a2=0 a3=7ffd42d2bd5c items=0 ppid=3013 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:08:25.581000 audit[3114]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.581000 audit[3114]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff78ae5ba0 a2=0 a3=7fff78ae5b8c items=0 ppid=3013 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:08:25.584000 audit[3116]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.584000 audit[3116]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc72921ad0 a2=0 a3=7ffc72921abc items=0 ppid=3013 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:08:25.586000 audit[3117]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=3117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.586000 audit[3117]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd63a31e70 a2=0 a3=7ffd63a31e5c items=0 ppid=3013 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:08:25.591000 audit[3119]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.591000 audit[3119]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd5029f340 a2=0 a3=7ffd5029f32c items=0 ppid=3013 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:08:25.597000 audit[3122]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.597000 audit[3122]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc748a8f30 a2=0 a3=7ffc748a8f1c items=0 ppid=3013 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:08:25.599000 audit[3123]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=3123 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.599000 audit[3123]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4d1e7720 a2=0 a3=7ffd4d1e770c items=0 ppid=3013 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:08:25.603000 audit[3125]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.603000 audit[3125]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff64cd43c0 a2=0 a3=7fff64cd43ac items=0 ppid=3013 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:08:25.605000 audit[3126]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.605000 audit[3126]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff14bdb0f0 a2=0 a3=7fff14bdb0dc items=0 ppid=3013 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.605000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:08:25.608000 audit[3128]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.608000 audit[3128]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc04deb10 a2=0 a3=7ffdc04deafc items=0 ppid=3013 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.608000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:08:25.612000 audit[3131]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.612000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcac33be90 a2=0 a3=7ffcac33be7c items=0 ppid=3013 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.612000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:08:25.618000 audit[3134]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=3134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.618000 audit[3134]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd00832950 a2=0 a3=7ffd0083293c items=0 ppid=3013 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.618000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:08:25.619000 audit[3135]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=3135 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.619000 audit[3135]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcd86513b0 a2=0 a3=7ffcd865139c items=0 ppid=3013 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:08:25.626000 audit[3137]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=3137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.626000 audit[3137]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff89f76740 a2=0 a3=7fff89f7672c items=0 ppid=3013 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:08:25.636000 audit[3140]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=3140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:25.636000 audit[3140]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe5db56c70 a2=0 a3=7ffe5db56c5c items=0 ppid=3013 pid=3140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.636000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:08:25.644057 systemd[1]: run-containerd-runc-k8s.io-8ae16b8a1649501f315bbbe9b210abd87d313a8e9f5d27fd1e333bd4c99c6ac6-runc.VwtPoo.mount: Deactivated successfully. Oct 2 19:08:25.657000 audit[3144]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:25.657000 audit[3144]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffd18db4770 a2=0 a3=7ffd18db475c items=0 ppid=3013 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:25.664000 audit[3144]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:25.664000 audit[3144]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd18db4770 a2=0 a3=7ffd18db475c items=0 ppid=3013 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.664000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:25.666000 audit[3147]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3147 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.666000 audit[3147]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffed542a680 a2=0 a3=7ffed542a66c items=0 ppid=3013 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:08:25.670000 audit[3149]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=3149 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.670000 audit[3149]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffdab40fa0 a2=0 a3=7fffdab40f8c items=0 ppid=3013 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:08:25.674000 audit[3152]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=3152 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.674000 audit[3152]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff1d8ab890 a2=0 a3=7fff1d8ab87c items=0 ppid=3013 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:08:25.677000 audit[3153]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=3153 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.677000 audit[3153]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe05a5b470 a2=0 a3=7ffe05a5b45c items=0 ppid=3013 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:08:25.681000 audit[3155]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=3155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.681000 audit[3155]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca2dfcba0 a2=0 a3=7ffca2dfcb8c items=0 ppid=3013 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:08:25.683000 audit[3156]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=3156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.683000 audit[3156]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe460bf440 a2=0 a3=7ffe460bf42c items=0 ppid=3013 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:08:25.686000 audit[3158]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=3158 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.686000 audit[3158]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff843bbdc0 a2=0 a3=7fff843bbdac items=0 ppid=3013 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:08:25.694000 audit[3161]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=3161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.694000 audit[3161]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffae29d030 a2=0 a3=7fffae29d01c items=0 ppid=3013 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.694000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:08:25.695000 audit[3162]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=3162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.695000 audit[3162]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffceed1edb0 a2=0 a3=7ffceed1ed9c items=0 ppid=3013 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.695000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:08:25.709000 audit[3164]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=3164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.709000 audit[3164]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc7dd52560 a2=0 a3=7ffc7dd5254c items=0 ppid=3013 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.709000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:08:25.710000 audit[3165]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=3165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.710000 audit[3165]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8b0eba10 a2=0 a3=7ffe8b0eb9fc items=0 ppid=3013 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.710000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:08:25.714000 audit[3167]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=3167 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.714000 audit[3167]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8bb582b0 a2=0 a3=7ffd8bb5829c items=0 ppid=3013 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.714000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:08:25.719000 audit[3170]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=3170 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.719000 audit[3170]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3a8eb400 a2=0 a3=7ffc3a8eb3ec items=0 ppid=3013 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.719000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:08:25.728000 audit[3173]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=3173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.728000 audit[3173]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc1c93d920 a2=0 a3=7ffc1c93d90c items=0 ppid=3013 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.728000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:08:25.734000 audit[3174]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=3174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.734000 audit[3174]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcff103920 a2=0 a3=7ffcff10390c items=0 ppid=3013 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:08:25.745000 audit[3176]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=3176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.745000 audit[3176]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe1b0aa030 a2=0 a3=7ffe1b0aa01c items=0 ppid=3013 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.745000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:08:25.752000 audit[3179]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=3179 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:25.752000 audit[3179]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc03fbac90 a2=0 a3=7ffc03fbac7c items=0 ppid=3013 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:08:25.761000 audit[3183]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=3183 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:08:25.761000 audit[3183]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff908df860 a2=0 a3=7fff908df84c items=0 ppid=3013 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.761000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:25.762000 audit[3183]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=3183 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:08:25.762000 audit[3183]: SYSCALL arch=c000003e syscall=46 success=yes exit=1860 a0=3 a1=7fff908df860 a2=0 a3=7fff908df84c items=0 ppid=3013 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.762000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:25.852536 kubelet[2846]: E1002 19:08:25.852368 2846 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:08:26.107426 env[1632]: time="2023-10-02T19:08:26.107201627Z" level=error msg="PullImage \"quay.io/tigera/operator:v1.29.0\" failed" error="failed to pull and unpack image \"quay.io/tigera/operator:v1.29.0\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://cdn03.quay.io/sha256/34/343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAI5LUAQGPZRPNKSJA%2F20231002%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20231002T190826Z&X-Amz-Expires=600&X-Amz-SignedHeaders=host&X-Amz-Signature=68ac912161a45c97756061ff367ca60c16c763f505823e080ed69e0875457237&cf_sign=iRfKOlaxGmXgj74m6NrVO93wwkQE6YnJob64D84ubC81Z%2BbFssaeR%2BsoUDwr8jl0afz%2FjMHgA4xiyyO9zO2agLjCpw1cfywQ7KcwG0XDX5aqOb%2BANwd0fNqvN3nNEYdwTvcm4pDBidWNrsw2yRFKwWuI6PQdMCtWRjptS0O2OukKZdyQlXzYpepU7hScAS5Ve%2F1pnChMZNaqJXpnw3ydyqyYIjbWTITUN%2BUKv1DbUGUtyyae8mUUTgtU0m1d7fkitWWhPZBN194AgcKsBbUQn7r3w6sWR0MHFACVrwgprUPzFRhtOpe1O19o8IWAbifcJe9Nfvs%2Fu9qfi3IdV2weow%3D%3D&cf_expiry=1696274306®ion=us-east-1\": dial tcp: lookup cdn03.quay.io: no such host" Oct 2 19:08:26.108093 kubelet[2846]: E1002 19:08:26.108070 2846 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"quay.io/tigera/operator:v1.29.0\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://cdn03.quay.io/sha256/34/343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAI5LUAQGPZRPNKSJA%2F20231002%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20231002T190826Z&X-Amz-Expires=600&X-Amz-SignedHeaders=host&X-Amz-Signature=68ac912161a45c97756061ff367ca60c16c763f505823e080ed69e0875457237&cf_sign=iRfKOlaxGmXgj74m6NrVO93wwkQE6YnJob64D84ubC81Z%2BbFssaeR%2BsoUDwr8jl0afz%2FjMHgA4xiyyO9zO2agLjCpw1cfywQ7KcwG0XDX5aqOb%2BANwd0fNqvN3nNEYdwTvcm4pDBidWNrsw2yRFKwWuI6PQdMCtWRjptS0O2OukKZdyQlXzYpepU7hScAS5Ve%2F1pnChMZNaqJXpnw3ydyqyYIjbWTITUN%2BUKv1DbUGUtyyae8mUUTgtU0m1d7fkitWWhPZBN194AgcKsBbUQn7r3w6sWR0MHFACVrwgprUPzFRhtOpe1O19o8IWAbifcJe9Nfvs%2Fu9qfi3IdV2weow%3D%3D&cf_expiry=1696274306®ion=us-east-1\": dial tcp: lookup cdn03.quay.io: no such host" image="quay.io/tigera/operator:v1.29.0" Oct 2 19:08:26.108249 kubelet[2846]: E1002 19:08:26.108139 2846 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"quay.io/tigera/operator:v1.29.0\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://cdn03.quay.io/sha256/34/343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAI5LUAQGPZRPNKSJA%2F20231002%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20231002T190826Z&X-Amz-Expires=600&X-Amz-SignedHeaders=host&X-Amz-Signature=68ac912161a45c97756061ff367ca60c16c763f505823e080ed69e0875457237&cf_sign=iRfKOlaxGmXgj74m6NrVO93wwkQE6YnJob64D84ubC81Z%2BbFssaeR%2BsoUDwr8jl0afz%2FjMHgA4xiyyO9zO2agLjCpw1cfywQ7KcwG0XDX5aqOb%2BANwd0fNqvN3nNEYdwTvcm4pDBidWNrsw2yRFKwWuI6PQdMCtWRjptS0O2OukKZdyQlXzYpepU7hScAS5Ve%2F1pnChMZNaqJXpnw3ydyqyYIjbWTITUN%2BUKv1DbUGUtyyae8mUUTgtU0m1d7fkitWWhPZBN194AgcKsBbUQn7r3w6sWR0MHFACVrwgprUPzFRhtOpe1O19o8IWAbifcJe9Nfvs%2Fu9qfi3IdV2weow%3D%3D&cf_expiry=1696274306®ion=us-east-1\": dial tcp: lookup cdn03.quay.io: no such host" image="quay.io/tigera/operator:v1.29.0" Oct 2 19:08:26.108462 kubelet[2846]: E1002 19:08:26.108262 2846 kuberuntime_manager.go:862] container &Container{Name:tigera-operator,Image:quay.io/tigera/operator:v1.29.0,Command:[operator],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:WATCH_NAMESPACE,Value:,ValueFrom:nil,},EnvVar{Name:POD_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:metadata.name,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},EnvVar{Name:OPERATOR_NAME,Value:tigera-operator,ValueFrom:nil,},EnvVar{Name:TIGERA_OPERATOR_INIT_IMAGE_VERSION,Value:v1.29.0,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:var-lib-calico,ReadOnly:true,MountPath:/var/lib/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-rvkv8,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:nil,Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{EnvFromSource{Prefix:,ConfigMapRef:&ConfigMapEnvSource{LocalObjectReference:LocalObjectReference{Name:kubernetes-services-endpoint,},Optional:*true,},SecretRef:nil,},},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod tigera-operator-64db64cb98-mdqmh_tigera-operator(a53a9fb9-c1f8-480a-8809-0c5b3fa0e0ba): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "quay.io/tigera/operator:v1.29.0": failed to copy: httpReadSeeker: failed open: failed to do request: Get "https://cdn03.quay.io/sha256/34/343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAI5LUAQGPZRPNKSJA%2F20231002%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20231002T190826Z&X-Amz-Expires=600&X-Amz-SignedHeaders=host&X-Amz-Signature=68ac912161a45c97756061ff367ca60c16c763f505823e080ed69e0875457237&cf_sign=iRfKOlaxGmXgj74m6NrVO93wwkQE6YnJob64D84ubC81Z%2BbFssaeR%2BsoUDwr8jl0afz%2FjMHgA4xiyyO9zO2agLjCpw1cfywQ7KcwG0XDX5aqOb%2BANwd0fNqvN3nNEYdwTvcm4pDBidWNrsw2yRFKwWuI6PQdMCtWRjptS0O2OukKZdyQlXzYpepU7hScAS5Ve%2F1pnChMZNaqJXpnw3ydyqyYIjbWTITUN%2BUKv1DbUGUtyyae8mUUTgtU0m1d7fkitWWhPZBN194AgcKsBbUQn7r3w6sWR0MHFACVrwgprUPzFRhtOpe1O19o8IWAbifcJe9Nfvs%2Fu9qfi3IdV2weow%3D%3D&cf_expiry=1696274306®ion=us-east-1": dial tcp: lookup cdn03.quay.io: no such host Oct 2 19:08:26.108686 kubelet[2846]: E1002 19:08:26.108463 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"quay.io/tigera/operator:v1.29.0\\\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \\\"https://cdn03.quay.io/sha256/34/343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAI5LUAQGPZRPNKSJA%2F20231002%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20231002T190826Z&X-Amz-Expires=600&X-Amz-SignedHeaders=host&X-Amz-Signature=68ac912161a45c97756061ff367ca60c16c763f505823e080ed69e0875457237&cf_sign=iRfKOlaxGmXgj74m6NrVO93wwkQE6YnJob64D84ubC81Z%2BbFssaeR%2BsoUDwr8jl0afz%2FjMHgA4xiyyO9zO2agLjCpw1cfywQ7KcwG0XDX5aqOb%2BANwd0fNqvN3nNEYdwTvcm4pDBidWNrsw2yRFKwWuI6PQdMCtWRjptS0O2OukKZdyQlXzYpepU7hScAS5Ve%2F1pnChMZNaqJXpnw3ydyqyYIjbWTITUN%2BUKv1DbUGUtyyae8mUUTgtU0m1d7fkitWWhPZBN194AgcKsBbUQn7r3w6sWR0MHFACVrwgprUPzFRhtOpe1O19o8IWAbifcJe9Nfvs%2Fu9qfi3IdV2weow%3D%3D&cf_expiry=1696274306®ion=us-east-1\\\": dial tcp: lookup cdn03.quay.io: no such host\"" pod="tigera-operator/tigera-operator-64db64cb98-mdqmh" podUID=a53a9fb9-c1f8-480a-8809-0c5b3fa0e0ba Oct 2 19:08:26.870852 kubelet[2846]: E1002 19:08:26.870097 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with ImagePullBackOff: \"Back-off pulling image \\\"quay.io/tigera/operator:v1.29.0\\\"\"" pod="tigera-operator/tigera-operator-64db64cb98-mdqmh" podUID=a53a9fb9-c1f8-480a-8809-0c5b3fa0e0ba Oct 2 19:08:30.853589 kubelet[2846]: E1002 19:08:30.853558 2846 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:08:35.855092 kubelet[2846]: E1002 19:08:35.855059 2846 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:08:37.817585 env[1632]: time="2023-10-02T19:08:37.817541868Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:08:40.568097 env[1632]: time="2023-10-02T19:08:40.568044223Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:40.570896 env[1632]: time="2023-10-02T19:08:40.570850971Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:40.573365 env[1632]: time="2023-10-02T19:08:40.573310296Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:40.577852 env[1632]: time="2023-10-02T19:08:40.577809792Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:40.579247 env[1632]: time="2023-10-02T19:08:40.579195783Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:08:40.590211 env[1632]: time="2023-10-02T19:08:40.590151047Z" level=info msg="CreateContainer within sandbox \"3698f98886b8ed2acc70266dd80d8388701bd77bb1ab48d5d2b12b50ec8fc828\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:08:40.606380 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3687771724.mount: Deactivated successfully. Oct 2 19:08:40.617626 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount466630939.mount: Deactivated successfully. Oct 2 19:08:40.621790 env[1632]: time="2023-10-02T19:08:40.621747315Z" level=info msg="CreateContainer within sandbox \"3698f98886b8ed2acc70266dd80d8388701bd77bb1ab48d5d2b12b50ec8fc828\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"e57746eea906ecb6aeceec411fbc75cd6b476b353a375449a3cdf16356442472\"" Oct 2 19:08:40.622761 env[1632]: time="2023-10-02T19:08:40.622727555Z" level=info msg="StartContainer for \"e57746eea906ecb6aeceec411fbc75cd6b476b353a375449a3cdf16356442472\"" Oct 2 19:08:40.657158 systemd[1]: Started cri-containerd-e57746eea906ecb6aeceec411fbc75cd6b476b353a375449a3cdf16356442472.scope. Oct 2 19:08:40.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.688315 kernel: kauditd_printk_skb: 279 callbacks suppressed Oct 2 19:08:40.688537 kernel: audit: type=1400 audit(1696273720.680:1081): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.693732 kernel: audit: type=1400 audit(1696273720.680:1082): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.693775 kernel: audit: type=1400 audit(1696273720.680:1083): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.702591 kernel: audit: type=1400 audit(1696273720.680:1084): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.702717 kernel: audit: type=1400 audit(1696273720.680:1085): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.720983 kernel: audit: type=1400 audit(1696273720.680:1086): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.721113 kernel: audit: type=1400 audit(1696273720.680:1087): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.726816 kernel: audit: type=1400 audit(1696273720.680:1088): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.747968 kernel: audit: type=1400 audit(1696273720.680:1089): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.748174 kernel: audit: type=1400 audit(1696273720.680:1090): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.680000 audit: BPF prog-id=123 op=LOAD Oct 2 19:08:40.687000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.687000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3028 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:40.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535373734366565613930366563623661656365656334313166626337 Oct 2 19:08:40.687000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.687000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3028 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:40.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535373734366565613930366563623661656365656334313166626337 Oct 2 19:08:40.687000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.687000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.687000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.687000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.687000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.687000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.687000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.687000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.687000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.687000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.687000 audit: BPF prog-id=124 op=LOAD Oct 2 19:08:40.687000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000189350 items=0 ppid=3028 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:40.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535373734366565613930366563623661656365656334313166626337 Oct 2 19:08:40.696000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.696000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.696000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.696000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.696000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.696000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.696000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.696000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.696000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.696000 audit: BPF prog-id=125 op=LOAD Oct 2 19:08:40.696000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000189398 items=0 ppid=3028 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:40.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535373734366565613930366563623661656365656334313166626337 Oct 2 19:08:40.706000 audit: BPF prog-id=125 op=UNLOAD Oct 2 19:08:40.706000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:08:40.706000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.706000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.706000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.706000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.706000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.706000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.706000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.706000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.706000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.706000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.706000 audit: BPF prog-id=126 op=LOAD Oct 2 19:08:40.706000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001897a8 items=0 ppid=3028 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:40.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535373734366565613930366563623661656365656334313166626337 Oct 2 19:08:40.760159 env[1632]: time="2023-10-02T19:08:40.758443665Z" level=info msg="StartContainer for \"e57746eea906ecb6aeceec411fbc75cd6b476b353a375449a3cdf16356442472\" returns successfully" Oct 2 19:08:40.856321 kubelet[2846]: E1002 19:08:40.856205 2846 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:08:42.970000 audit[3250]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3250 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:42.970000 audit[3250]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fff3fae67c0 a2=0 a3=7fff3fae67ac items=0 ppid=3013 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:42.970000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:42.971000 audit[3250]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=3250 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:42.971000 audit[3250]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff3fae67c0 a2=0 a3=7fff3fae67ac items=0 ppid=3013 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:42.971000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:43.090000 audit[3276]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:43.090000 audit[3276]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffefa3522d0 a2=0 a3=7ffefa3522bc items=0 ppid=3013 pid=3276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:43.090000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:43.092000 audit[3276]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=3276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:43.092000 audit[3276]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffefa3522d0 a2=0 a3=7ffefa3522bc items=0 ppid=3013 pid=3276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:43.092000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:43.191411 kubelet[2846]: I1002 19:08:43.191378 2846 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:08:43.201194 systemd[1]: Created slice kubepods-besteffort-pod6e80fccb_b420_4416_b12c_ea705a28a82d.slice. Oct 2 19:08:43.230425 kubelet[2846]: I1002 19:08:43.230299 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/6e80fccb-b420-4416-b12c-ea705a28a82d-typha-certs\") pod \"calico-typha-8955644d4-xlfnk\" (UID: \"6e80fccb-b420-4416-b12c-ea705a28a82d\") " pod="calico-system/calico-typha-8955644d4-xlfnk" Oct 2 19:08:43.230425 kubelet[2846]: I1002 19:08:43.230363 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jgg52\" (UniqueName: \"kubernetes.io/projected/6e80fccb-b420-4416-b12c-ea705a28a82d-kube-api-access-jgg52\") pod \"calico-typha-8955644d4-xlfnk\" (UID: \"6e80fccb-b420-4416-b12c-ea705a28a82d\") " pod="calico-system/calico-typha-8955644d4-xlfnk" Oct 2 19:08:43.230425 kubelet[2846]: I1002 19:08:43.230399 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6e80fccb-b420-4416-b12c-ea705a28a82d-tigera-ca-bundle\") pod \"calico-typha-8955644d4-xlfnk\" (UID: \"6e80fccb-b420-4416-b12c-ea705a28a82d\") " pod="calico-system/calico-typha-8955644d4-xlfnk" Oct 2 19:08:43.314576 kubelet[2846]: I1002 19:08:43.314542 2846 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:08:43.325432 systemd[1]: Created slice kubepods-besteffort-pod72c65870_43c5_4a4b_af67_5d63e8539bda.slice. Oct 2 19:08:43.431743 kubelet[2846]: I1002 19:08:43.431705 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/72c65870-43c5-4a4b-af67-5d63e8539bda-tigera-ca-bundle\") pod \"calico-node-5l9wt\" (UID: \"72c65870-43c5-4a4b-af67-5d63e8539bda\") " pod="calico-system/calico-node-5l9wt" Oct 2 19:08:43.432063 kubelet[2846]: I1002 19:08:43.431761 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/72c65870-43c5-4a4b-af67-5d63e8539bda-node-certs\") pod \"calico-node-5l9wt\" (UID: \"72c65870-43c5-4a4b-af67-5d63e8539bda\") " pod="calico-system/calico-node-5l9wt" Oct 2 19:08:43.432063 kubelet[2846]: I1002 19:08:43.431887 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/72c65870-43c5-4a4b-af67-5d63e8539bda-var-run-calico\") pod \"calico-node-5l9wt\" (UID: \"72c65870-43c5-4a4b-af67-5d63e8539bda\") " pod="calico-system/calico-node-5l9wt" Oct 2 19:08:43.432063 kubelet[2846]: I1002 19:08:43.431959 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r8fx2\" (UniqueName: \"kubernetes.io/projected/72c65870-43c5-4a4b-af67-5d63e8539bda-kube-api-access-r8fx2\") pod \"calico-node-5l9wt\" (UID: \"72c65870-43c5-4a4b-af67-5d63e8539bda\") " pod="calico-system/calico-node-5l9wt" Oct 2 19:08:43.432063 kubelet[2846]: I1002 19:08:43.432028 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/72c65870-43c5-4a4b-af67-5d63e8539bda-cni-net-dir\") pod \"calico-node-5l9wt\" (UID: \"72c65870-43c5-4a4b-af67-5d63e8539bda\") " pod="calico-system/calico-node-5l9wt" Oct 2 19:08:43.432063 kubelet[2846]: I1002 19:08:43.432061 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/72c65870-43c5-4a4b-af67-5d63e8539bda-cni-log-dir\") pod \"calico-node-5l9wt\" (UID: \"72c65870-43c5-4a4b-af67-5d63e8539bda\") " pod="calico-system/calico-node-5l9wt" Oct 2 19:08:43.432761 kubelet[2846]: I1002 19:08:43.432126 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/72c65870-43c5-4a4b-af67-5d63e8539bda-flexvol-driver-host\") pod \"calico-node-5l9wt\" (UID: \"72c65870-43c5-4a4b-af67-5d63e8539bda\") " pod="calico-system/calico-node-5l9wt" Oct 2 19:08:43.432761 kubelet[2846]: I1002 19:08:43.432194 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/72c65870-43c5-4a4b-af67-5d63e8539bda-cni-bin-dir\") pod \"calico-node-5l9wt\" (UID: \"72c65870-43c5-4a4b-af67-5d63e8539bda\") " pod="calico-system/calico-node-5l9wt" Oct 2 19:08:43.432761 kubelet[2846]: I1002 19:08:43.432236 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/72c65870-43c5-4a4b-af67-5d63e8539bda-xtables-lock\") pod \"calico-node-5l9wt\" (UID: \"72c65870-43c5-4a4b-af67-5d63e8539bda\") " pod="calico-system/calico-node-5l9wt" Oct 2 19:08:43.432761 kubelet[2846]: I1002 19:08:43.432301 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/72c65870-43c5-4a4b-af67-5d63e8539bda-policysync\") pod \"calico-node-5l9wt\" (UID: \"72c65870-43c5-4a4b-af67-5d63e8539bda\") " pod="calico-system/calico-node-5l9wt" Oct 2 19:08:43.432761 kubelet[2846]: I1002 19:08:43.432574 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/72c65870-43c5-4a4b-af67-5d63e8539bda-lib-modules\") pod \"calico-node-5l9wt\" (UID: \"72c65870-43c5-4a4b-af67-5d63e8539bda\") " pod="calico-system/calico-node-5l9wt" Oct 2 19:08:43.432761 kubelet[2846]: I1002 19:08:43.432659 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/72c65870-43c5-4a4b-af67-5d63e8539bda-var-lib-calico\") pod \"calico-node-5l9wt\" (UID: \"72c65870-43c5-4a4b-af67-5d63e8539bda\") " pod="calico-system/calico-node-5l9wt" Oct 2 19:08:43.509945 env[1632]: time="2023-10-02T19:08:43.509719876Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8955644d4-xlfnk,Uid:6e80fccb-b420-4416-b12c-ea705a28a82d,Namespace:calico-system,Attempt:0,}" Oct 2 19:08:43.537851 kubelet[2846]: E1002 19:08:43.537704 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:43.537851 kubelet[2846]: W1002 19:08:43.537739 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:43.537851 kubelet[2846]: E1002 19:08:43.537776 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:43.538573 kubelet[2846]: E1002 19:08:43.538199 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:43.538573 kubelet[2846]: W1002 19:08:43.538212 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:43.538573 kubelet[2846]: E1002 19:08:43.538238 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:43.538573 kubelet[2846]: E1002 19:08:43.538535 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:43.538573 kubelet[2846]: W1002 19:08:43.538546 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:43.538573 kubelet[2846]: E1002 19:08:43.538564 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:43.538981 kubelet[2846]: E1002 19:08:43.538890 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:43.538981 kubelet[2846]: W1002 19:08:43.538904 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:43.539077 kubelet[2846]: E1002 19:08:43.539000 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:43.539550 kubelet[2846]: E1002 19:08:43.539178 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:43.539550 kubelet[2846]: W1002 19:08:43.539220 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:43.539550 kubelet[2846]: E1002 19:08:43.539235 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:43.539742 kubelet[2846]: E1002 19:08:43.539569 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:43.539742 kubelet[2846]: W1002 19:08:43.539580 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:43.539742 kubelet[2846]: E1002 19:08:43.539595 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:43.541965 kubelet[2846]: E1002 19:08:43.541890 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:43.542063 kubelet[2846]: W1002 19:08:43.541966 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:43.542063 kubelet[2846]: E1002 19:08:43.541990 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:43.542367 kubelet[2846]: E1002 19:08:43.542353 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:43.542516 kubelet[2846]: W1002 19:08:43.542368 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:43.542516 kubelet[2846]: E1002 19:08:43.542386 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:43.550447 kubelet[2846]: E1002 19:08:43.550425 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:43.554858 kubelet[2846]: W1002 19:08:43.554823 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:43.555063 kubelet[2846]: E1002 19:08:43.555049 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:43.558780 env[1632]: time="2023-10-02T19:08:43.555482982Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:43.558780 env[1632]: time="2023-10-02T19:08:43.555536758Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:43.558780 env[1632]: time="2023-10-02T19:08:43.555553345Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:43.558780 env[1632]: time="2023-10-02T19:08:43.557927628Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6bc0015ba44c5413a24154e179e6a863c316731ca775c07a41b00b42dfb747ca pid=3287 runtime=io.containerd.runc.v2 Oct 2 19:08:43.588080 kubelet[2846]: E1002 19:08:43.587961 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:43.588080 kubelet[2846]: W1002 19:08:43.587987 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:43.588283 kubelet[2846]: E1002 19:08:43.588091 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:43.600589 systemd[1]: Started cri-containerd-6bc0015ba44c5413a24154e179e6a863c316731ca775c07a41b00b42dfb747ca.scope. Oct 2 19:08:43.646767 env[1632]: time="2023-10-02T19:08:43.646718513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5l9wt,Uid:72c65870-43c5-4a4b-af67-5d63e8539bda,Namespace:calico-system,Attempt:0,}" Oct 2 19:08:43.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.678000 audit: BPF prog-id=127 op=LOAD Oct 2 19:08:43.680098 env[1632]: time="2023-10-02T19:08:43.678876209Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:43.680098 env[1632]: time="2023-10-02T19:08:43.678925448Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:43.680098 env[1632]: time="2023-10-02T19:08:43.678942631Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:43.680098 env[1632]: time="2023-10-02T19:08:43.679126971Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1ac9d886a703166f27b085c1f0060a5161103433385e48b31b041ef52240fc8e pid=3333 runtime=io.containerd.runc.v2 Oct 2 19:08:43.680000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.680000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3287 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:43.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662633030313562613434633534313361323431353465313739653661 Oct 2 19:08:43.680000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.680000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3287 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:43.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662633030313562613434633534313361323431353465313739653661 Oct 2 19:08:43.681000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.681000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.681000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.681000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.681000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.681000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.681000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.681000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.681000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.681000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.681000 audit: BPF prog-id=128 op=LOAD Oct 2 19:08:43.681000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003aa5a0 items=0 ppid=3287 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:43.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662633030313562613434633534313361323431353465313739653661 Oct 2 19:08:43.682000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.682000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.682000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.682000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.682000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.682000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.682000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.682000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.682000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.682000 audit: BPF prog-id=129 op=LOAD Oct 2 19:08:43.682000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003aa5e8 items=0 ppid=3287 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:43.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662633030313562613434633534313361323431353465313739653661 Oct 2 19:08:43.683000 audit: BPF prog-id=129 op=UNLOAD Oct 2 19:08:43.684000 audit: BPF prog-id=128 op=UNLOAD Oct 2 19:08:43.684000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.684000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.684000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.684000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.684000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.684000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.684000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.684000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.684000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.684000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.684000 audit: BPF prog-id=130 op=LOAD Oct 2 19:08:43.684000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003aa9f8 items=0 ppid=3287 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:43.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662633030313562613434633534313361323431353465313739653661 Oct 2 19:08:43.742274 systemd[1]: Started cri-containerd-1ac9d886a703166f27b085c1f0060a5161103433385e48b31b041ef52240fc8e.scope. Oct 2 19:08:43.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.777000 audit: BPF prog-id=131 op=LOAD Oct 2 19:08:43.781000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.781000 audit[3343]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3333 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:43.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161633964383836613730333136366632376230383563316630303630 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3333 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:43.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161633964383836613730333136366632376230383563316630303630 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit: BPF prog-id=132 op=LOAD Oct 2 19:08:43.782000 audit[3343]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00028ca00 items=0 ppid=3333 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:43.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161633964383836613730333136366632376230383563316630303630 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit: BPF prog-id=133 op=LOAD Oct 2 19:08:43.782000 audit[3343]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00028ca48 items=0 ppid=3333 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:43.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161633964383836613730333136366632376230383563316630303630 Oct 2 19:08:43.782000 audit: BPF prog-id=133 op=UNLOAD Oct 2 19:08:43.782000 audit: BPF prog-id=132 op=UNLOAD Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { perfmon } for pid=3343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit[3343]: AVC avc: denied { bpf } for pid=3343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:43.782000 audit: BPF prog-id=134 op=LOAD Oct 2 19:08:43.782000 audit[3343]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00028ce58 items=0 ppid=3333 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:43.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161633964383836613730333136366632376230383563316630303630 Oct 2 19:08:43.817665 env[1632]: time="2023-10-02T19:08:43.817599971Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8955644d4-xlfnk,Uid:6e80fccb-b420-4416-b12c-ea705a28a82d,Namespace:calico-system,Attempt:0,} returns sandbox id \"6bc0015ba44c5413a24154e179e6a863c316731ca775c07a41b00b42dfb747ca\"" Oct 2 19:08:43.819966 env[1632]: time="2023-10-02T19:08:43.819931117Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 19:08:43.822336 env[1632]: time="2023-10-02T19:08:43.822273629Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-5l9wt,Uid:72c65870-43c5-4a4b-af67-5d63e8539bda,Namespace:calico-system,Attempt:0,} returns sandbox id \"1ac9d886a703166f27b085c1f0060a5161103433385e48b31b041ef52240fc8e\"" Oct 2 19:08:44.196000 audit[3398]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=3398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:44.196000 audit[3398]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fffe1dd9ae0 a2=0 a3=7fffe1dd9acc items=0 ppid=3013 pid=3398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:44.197000 audit[3398]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=3398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:44.197000 audit[3398]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fffe1dd9ae0 a2=0 a3=7fffe1dd9acc items=0 ppid=3013 pid=3398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:44.197000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:45.100571 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2790464398.mount: Deactivated successfully. Oct 2 19:08:45.857316 kubelet[2846]: E1002 19:08:45.857286 2846 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:08:46.600773 env[1632]: time="2023-10-02T19:08:46.600720555Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:46.603669 env[1632]: time="2023-10-02T19:08:46.603613839Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:46.606754 env[1632]: time="2023-10-02T19:08:46.606712626Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:46.609454 env[1632]: time="2023-10-02T19:08:46.609411470Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:46.610286 env[1632]: time="2023-10-02T19:08:46.610246235Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\"" Oct 2 19:08:46.612312 env[1632]: time="2023-10-02T19:08:46.612281460Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:08:46.615431 env[1632]: time="2023-10-02T19:08:46.615396977Z" level=info msg="CreateContainer within sandbox \"6bc0015ba44c5413a24154e179e6a863c316731ca775c07a41b00b42dfb747ca\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 19:08:46.640633 env[1632]: time="2023-10-02T19:08:46.640560447Z" level=info msg="CreateContainer within sandbox \"6bc0015ba44c5413a24154e179e6a863c316731ca775c07a41b00b42dfb747ca\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"e41daec98a1d24add75c82341fa8452d60da5f7372e4097ad4699d6a3aac825b\"" Oct 2 19:08:46.645390 env[1632]: time="2023-10-02T19:08:46.644010193Z" level=info msg="StartContainer for \"e41daec98a1d24add75c82341fa8452d60da5f7372e4097ad4699d6a3aac825b\"" Oct 2 19:08:46.706815 systemd[1]: Started cri-containerd-e41daec98a1d24add75c82341fa8452d60da5f7372e4097ad4699d6a3aac825b.scope. Oct 2 19:08:46.745913 kernel: kauditd_printk_skb: 179 callbacks suppressed Oct 2 19:08:46.746061 kernel: audit: type=1400 audit(1696273726.739:1141): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.751187 kernel: audit: type=1400 audit(1696273726.739:1142): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.756962 kernel: audit: type=1400 audit(1696273726.739:1143): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.774568 kernel: audit: type=1400 audit(1696273726.739:1144): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.774761 kernel: audit: type=1400 audit(1696273726.739:1145): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.783717 kernel: audit: type=1400 audit(1696273726.739:1146): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.789761 kernel: audit: type=1400 audit(1696273726.739:1147): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.796789 kernel: audit: type=1400 audit(1696273726.739:1148): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.810022 kernel: audit: type=1400 audit(1696273726.739:1149): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.810164 kernel: audit: type=1400 audit(1696273726.745:1150): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.810284 env[1632]: time="2023-10-02T19:08:46.807936765Z" level=info msg="StartContainer for \"e41daec98a1d24add75c82341fa8452d60da5f7372e4097ad4699d6a3aac825b\" returns successfully" Oct 2 19:08:46.745000 audit: BPF prog-id=135 op=LOAD Oct 2 19:08:46.745000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.745000 audit[3407]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3287 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:46.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534316461656339386131643234616464373563383233343166613834 Oct 2 19:08:46.745000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.745000 audit[3407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3287 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:46.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534316461656339386131643234616464373563383233343166613834 Oct 2 19:08:46.746000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.746000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.746000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.746000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.746000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.746000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.746000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.746000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.746000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.746000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.746000 audit: BPF prog-id=136 op=LOAD Oct 2 19:08:46.746000 audit[3407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003aa080 items=0 ppid=3287 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:46.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534316461656339386131643234616464373563383233343166613834 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit: BPF prog-id=137 op=LOAD Oct 2 19:08:46.750000 audit[3407]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003aa0c8 items=0 ppid=3287 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:46.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534316461656339386131643234616464373563383233343166613834 Oct 2 19:08:46.750000 audit: BPF prog-id=137 op=UNLOAD Oct 2 19:08:46.750000 audit: BPF prog-id=136 op=UNLOAD Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { perfmon } for pid=3407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit[3407]: AVC avc: denied { bpf } for pid=3407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:46.750000 audit: BPF prog-id=138 op=LOAD Oct 2 19:08:46.750000 audit[3407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003aa4d8 items=0 ppid=3287 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:46.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534316461656339386131643234616464373563383233343166613834 Oct 2 19:08:47.033023 kubelet[2846]: E1002 19:08:47.032990 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.033023 kubelet[2846]: W1002 19:08:47.033016 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.033557 kubelet[2846]: E1002 19:08:47.033041 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.033557 kubelet[2846]: E1002 19:08:47.033342 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.033557 kubelet[2846]: W1002 19:08:47.033352 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.033557 kubelet[2846]: E1002 19:08:47.033377 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.033889 kubelet[2846]: E1002 19:08:47.033874 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.033976 kubelet[2846]: W1002 19:08:47.033891 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.033976 kubelet[2846]: E1002 19:08:47.033908 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.034418 kubelet[2846]: E1002 19:08:47.034393 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.034418 kubelet[2846]: W1002 19:08:47.034409 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.034562 kubelet[2846]: E1002 19:08:47.034426 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.034664 kubelet[2846]: E1002 19:08:47.034632 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.034664 kubelet[2846]: W1002 19:08:47.034659 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.034799 kubelet[2846]: E1002 19:08:47.034675 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.034888 kubelet[2846]: E1002 19:08:47.034860 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.034888 kubelet[2846]: W1002 19:08:47.034870 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.034888 kubelet[2846]: E1002 19:08:47.034884 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.035743 kubelet[2846]: E1002 19:08:47.035713 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.035743 kubelet[2846]: W1002 19:08:47.035729 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.035743 kubelet[2846]: E1002 19:08:47.035746 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.037982 kubelet[2846]: E1002 19:08:47.037038 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.037982 kubelet[2846]: W1002 19:08:47.037935 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.037982 kubelet[2846]: E1002 19:08:47.037961 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.039190 kubelet[2846]: E1002 19:08:47.039103 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.039190 kubelet[2846]: W1002 19:08:47.039114 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.039190 kubelet[2846]: E1002 19:08:47.039143 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.039719 kubelet[2846]: E1002 19:08:47.039684 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.039719 kubelet[2846]: W1002 19:08:47.039699 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.039719 kubelet[2846]: E1002 19:08:47.039715 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.039945 kubelet[2846]: E1002 19:08:47.039923 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.039945 kubelet[2846]: W1002 19:08:47.039936 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.040060 kubelet[2846]: E1002 19:08:47.039951 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.040142 kubelet[2846]: E1002 19:08:47.040123 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.040142 kubelet[2846]: W1002 19:08:47.040136 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.040142 kubelet[2846]: E1002 19:08:47.040153 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.075771 kubelet[2846]: E1002 19:08:47.075739 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.075771 kubelet[2846]: W1002 19:08:47.075762 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.076030 kubelet[2846]: E1002 19:08:47.075786 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.076146 kubelet[2846]: E1002 19:08:47.076129 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.076146 kubelet[2846]: W1002 19:08:47.076144 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.076265 kubelet[2846]: E1002 19:08:47.076165 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.077001 kubelet[2846]: E1002 19:08:47.076438 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.077001 kubelet[2846]: W1002 19:08:47.076451 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.077001 kubelet[2846]: E1002 19:08:47.076471 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.077001 kubelet[2846]: E1002 19:08:47.076749 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.077001 kubelet[2846]: W1002 19:08:47.076759 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.077001 kubelet[2846]: E1002 19:08:47.076778 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.077001 kubelet[2846]: E1002 19:08:47.076989 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.077001 kubelet[2846]: W1002 19:08:47.076999 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.077461 kubelet[2846]: E1002 19:08:47.077017 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.077461 kubelet[2846]: E1002 19:08:47.077215 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.077461 kubelet[2846]: W1002 19:08:47.077224 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.077461 kubelet[2846]: E1002 19:08:47.077303 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.077461 kubelet[2846]: E1002 19:08:47.077431 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.077461 kubelet[2846]: W1002 19:08:47.077439 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.077793 kubelet[2846]: E1002 19:08:47.077518 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.077793 kubelet[2846]: E1002 19:08:47.077666 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.077793 kubelet[2846]: W1002 19:08:47.077674 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.077793 kubelet[2846]: E1002 19:08:47.077782 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.077983 kubelet[2846]: E1002 19:08:47.077918 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.077983 kubelet[2846]: W1002 19:08:47.077926 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.077983 kubelet[2846]: E1002 19:08:47.077944 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.080713 kubelet[2846]: E1002 19:08:47.078455 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.080713 kubelet[2846]: W1002 19:08:47.078468 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.080713 kubelet[2846]: E1002 19:08:47.078489 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.080713 kubelet[2846]: E1002 19:08:47.078708 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.080713 kubelet[2846]: W1002 19:08:47.078719 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.080713 kubelet[2846]: E1002 19:08:47.078737 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.080713 kubelet[2846]: E1002 19:08:47.078934 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.080713 kubelet[2846]: W1002 19:08:47.078942 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.080713 kubelet[2846]: E1002 19:08:47.079019 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.080713 kubelet[2846]: E1002 19:08:47.079180 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.080713 kubelet[2846]: W1002 19:08:47.079189 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.080713 kubelet[2846]: E1002 19:08:47.079207 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.080713 kubelet[2846]: E1002 19:08:47.079436 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.080713 kubelet[2846]: W1002 19:08:47.079445 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.080713 kubelet[2846]: E1002 19:08:47.079465 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.080713 kubelet[2846]: E1002 19:08:47.079946 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.080713 kubelet[2846]: W1002 19:08:47.079956 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.080713 kubelet[2846]: E1002 19:08:47.079976 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.080713 kubelet[2846]: E1002 19:08:47.080425 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.080713 kubelet[2846]: W1002 19:08:47.080435 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.080713 kubelet[2846]: E1002 19:08:47.080512 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.081772 kubelet[2846]: E1002 19:08:47.080749 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.081772 kubelet[2846]: W1002 19:08:47.080759 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.081772 kubelet[2846]: E1002 19:08:47.080773 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.081772 kubelet[2846]: E1002 19:08:47.081389 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.081772 kubelet[2846]: W1002 19:08:47.081400 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.081772 kubelet[2846]: E1002 19:08:47.081416 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.916450 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3587286994.mount: Deactivated successfully. Oct 2 19:08:47.945968 kubelet[2846]: E1002 19:08:47.945625 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.945968 kubelet[2846]: W1002 19:08:47.945670 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.945968 kubelet[2846]: E1002 19:08:47.945694 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.946732 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.950679 kubelet[2846]: W1002 19:08:47.946746 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.946764 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.946956 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.950679 kubelet[2846]: W1002 19:08:47.946964 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.946978 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.948269 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.950679 kubelet[2846]: W1002 19:08:47.948281 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.948298 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.948485 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.950679 kubelet[2846]: W1002 19:08:47.948493 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.948507 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.948713 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.950679 kubelet[2846]: W1002 19:08:47.948722 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.948736 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.948980 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.950679 kubelet[2846]: W1002 19:08:47.949274 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.949295 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.949495 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.950679 kubelet[2846]: W1002 19:08:47.949504 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.949518 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.949712 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.950679 kubelet[2846]: W1002 19:08:47.949721 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.949735 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.949921 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.950679 kubelet[2846]: W1002 19:08:47.949929 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.949944 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.950110 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.950679 kubelet[2846]: W1002 19:08:47.950118 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.950279 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.950679 kubelet[2846]: E1002 19:08:47.950479 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.950679 kubelet[2846]: W1002 19:08:47.950488 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.952303 kubelet[2846]: E1002 19:08:47.950502 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.982291 kubelet[2846]: E1002 19:08:47.982260 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.982291 kubelet[2846]: W1002 19:08:47.982286 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.982493 kubelet[2846]: E1002 19:08:47.982313 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.983368 kubelet[2846]: E1002 19:08:47.983344 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.983368 kubelet[2846]: W1002 19:08:47.983366 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.983534 kubelet[2846]: E1002 19:08:47.983386 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.983758 kubelet[2846]: E1002 19:08:47.983743 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.983866 kubelet[2846]: W1002 19:08:47.983855 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.983975 kubelet[2846]: E1002 19:08:47.983965 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.984453 kubelet[2846]: E1002 19:08:47.984435 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.984453 kubelet[2846]: W1002 19:08:47.984453 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.984616 kubelet[2846]: E1002 19:08:47.984479 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.984755 kubelet[2846]: E1002 19:08:47.984739 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.984820 kubelet[2846]: W1002 19:08:47.984755 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.984882 kubelet[2846]: E1002 19:08:47.984843 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.984987 kubelet[2846]: E1002 19:08:47.984973 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.985044 kubelet[2846]: W1002 19:08:47.984988 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.985096 kubelet[2846]: E1002 19:08:47.985072 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.985222 kubelet[2846]: E1002 19:08:47.985208 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.985276 kubelet[2846]: W1002 19:08:47.985222 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.985276 kubelet[2846]: E1002 19:08:47.985241 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.985469 kubelet[2846]: E1002 19:08:47.985456 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.985528 kubelet[2846]: W1002 19:08:47.985470 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.985528 kubelet[2846]: E1002 19:08:47.985487 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.986668 kubelet[2846]: E1002 19:08:47.985725 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.986668 kubelet[2846]: W1002 19:08:47.985737 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.986668 kubelet[2846]: E1002 19:08:47.985756 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.986668 kubelet[2846]: E1002 19:08:47.985991 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.986668 kubelet[2846]: W1002 19:08:47.986000 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.986668 kubelet[2846]: E1002 19:08:47.986081 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.986668 kubelet[2846]: E1002 19:08:47.986596 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.986668 kubelet[2846]: W1002 19:08:47.986606 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.987207 kubelet[2846]: E1002 19:08:47.986713 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.987207 kubelet[2846]: E1002 19:08:47.986848 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.987207 kubelet[2846]: W1002 19:08:47.986857 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.987207 kubelet[2846]: E1002 19:08:47.986941 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.987207 kubelet[2846]: E1002 19:08:47.987138 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.987207 kubelet[2846]: W1002 19:08:47.987148 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.987207 kubelet[2846]: E1002 19:08:47.987168 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.987514 kubelet[2846]: E1002 19:08:47.987404 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.987514 kubelet[2846]: W1002 19:08:47.987413 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.987514 kubelet[2846]: E1002 19:08:47.987431 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.988842 kubelet[2846]: E1002 19:08:47.988820 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.988842 kubelet[2846]: W1002 19:08:47.988840 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.988987 kubelet[2846]: E1002 19:08:47.988930 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.989087 kubelet[2846]: E1002 19:08:47.989072 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.989087 kubelet[2846]: W1002 19:08:47.989087 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.989187 kubelet[2846]: E1002 19:08:47.989102 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.989331 kubelet[2846]: E1002 19:08:47.989316 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.989383 kubelet[2846]: W1002 19:08:47.989332 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.989383 kubelet[2846]: E1002 19:08:47.989346 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:47.989923 kubelet[2846]: E1002 19:08:47.989907 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:47.989923 kubelet[2846]: W1002 19:08:47.989922 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:47.990055 kubelet[2846]: E1002 19:08:47.989938 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.055000 audit[3526]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=3526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:48.055000 audit[3526]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffc5a9ce3c0 a2=0 a3=7ffc5a9ce3ac items=0 ppid=3013 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.055000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:48.057000 audit[3526]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=3526 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:48.057000 audit[3526]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffc5a9ce3c0 a2=0 a3=7ffc5a9ce3ac items=0 ppid=3013 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.057000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:48.917775 env[1632]: time="2023-10-02T19:08:48.917668234Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:48.920772 env[1632]: time="2023-10-02T19:08:48.920727197Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:48.931663 env[1632]: time="2023-10-02T19:08:48.931606059Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:48.932774 env[1632]: time="2023-10-02T19:08:48.932735844Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:48.933882 env[1632]: time="2023-10-02T19:08:48.933684238Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:08:48.939981 env[1632]: time="2023-10-02T19:08:48.939919452Z" level=info msg="CreateContainer within sandbox \"1ac9d886a703166f27b085c1f0060a5161103433385e48b31b041ef52240fc8e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:08:48.959104 kubelet[2846]: E1002 19:08:48.956714 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.959104 kubelet[2846]: W1002 19:08:48.956741 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.959104 kubelet[2846]: E1002 19:08:48.956769 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.959104 kubelet[2846]: E1002 19:08:48.956990 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.959104 kubelet[2846]: W1002 19:08:48.956999 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.959104 kubelet[2846]: E1002 19:08:48.957015 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.959104 kubelet[2846]: E1002 19:08:48.957275 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.959104 kubelet[2846]: W1002 19:08:48.957356 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.959104 kubelet[2846]: E1002 19:08:48.957377 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.959104 kubelet[2846]: E1002 19:08:48.957633 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.959104 kubelet[2846]: W1002 19:08:48.957812 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.959104 kubelet[2846]: E1002 19:08:48.957833 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.959104 kubelet[2846]: E1002 19:08:48.958625 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.959104 kubelet[2846]: W1002 19:08:48.958654 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.959104 kubelet[2846]: E1002 19:08:48.958672 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.959104 kubelet[2846]: E1002 19:08:48.958852 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.959104 kubelet[2846]: W1002 19:08:48.958859 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.959104 kubelet[2846]: E1002 19:08:48.958871 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.960189 kubelet[2846]: E1002 19:08:48.959143 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.960189 kubelet[2846]: W1002 19:08:48.959153 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.960189 kubelet[2846]: E1002 19:08:48.959169 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.960467 kubelet[2846]: E1002 19:08:48.960450 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.960467 kubelet[2846]: W1002 19:08:48.960467 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.960612 kubelet[2846]: E1002 19:08:48.960483 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.960901 kubelet[2846]: E1002 19:08:48.960886 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.960996 kubelet[2846]: W1002 19:08:48.960905 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.960996 kubelet[2846]: E1002 19:08:48.960922 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.961217 kubelet[2846]: E1002 19:08:48.961203 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.961304 kubelet[2846]: W1002 19:08:48.961218 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.961304 kubelet[2846]: E1002 19:08:48.961233 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.961523 kubelet[2846]: E1002 19:08:48.961510 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.961707 kubelet[2846]: W1002 19:08:48.961524 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.961707 kubelet[2846]: E1002 19:08:48.961540 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.961931 kubelet[2846]: E1002 19:08:48.961917 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.962004 kubelet[2846]: W1002 19:08:48.961932 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.962004 kubelet[2846]: E1002 19:08:48.961947 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.964952 env[1632]: time="2023-10-02T19:08:48.964907357Z" level=info msg="CreateContainer within sandbox \"1ac9d886a703166f27b085c1f0060a5161103433385e48b31b041ef52240fc8e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"58df9acd9d2c66cc61bfa6cb199a639967e196d4a1dbed2b00fed3c90ab80a76\"" Oct 2 19:08:48.968841 env[1632]: time="2023-10-02T19:08:48.965867376Z" level=info msg="StartContainer for \"58df9acd9d2c66cc61bfa6cb199a639967e196d4a1dbed2b00fed3c90ab80a76\"" Oct 2 19:08:48.989674 kubelet[2846]: E1002 19:08:48.989627 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.990074 kubelet[2846]: W1002 19:08:48.989874 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.990074 kubelet[2846]: E1002 19:08:48.989908 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.990390 kubelet[2846]: E1002 19:08:48.990203 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.990390 kubelet[2846]: W1002 19:08:48.990215 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.990390 kubelet[2846]: E1002 19:08:48.990382 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.990987 kubelet[2846]: E1002 19:08:48.990790 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.990987 kubelet[2846]: W1002 19:08:48.990803 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.990987 kubelet[2846]: E1002 19:08:48.990904 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.991506 kubelet[2846]: E1002 19:08:48.991489 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.991594 kubelet[2846]: W1002 19:08:48.991507 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.991594 kubelet[2846]: E1002 19:08:48.991530 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.991810 kubelet[2846]: E1002 19:08:48.991792 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.991810 kubelet[2846]: W1002 19:08:48.991807 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.992633 kubelet[2846]: E1002 19:08:48.991829 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.992773 kubelet[2846]: E1002 19:08:48.992748 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.992773 kubelet[2846]: W1002 19:08:48.992764 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.992903 kubelet[2846]: E1002 19:08:48.992856 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.993015 kubelet[2846]: E1002 19:08:48.993005 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.993142 kubelet[2846]: W1002 19:08:48.993017 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.993273 kubelet[2846]: E1002 19:08:48.993142 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.993379 kubelet[2846]: E1002 19:08:48.993360 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.993379 kubelet[2846]: W1002 19:08:48.993374 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.993502 kubelet[2846]: E1002 19:08:48.993491 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.994047 kubelet[2846]: E1002 19:08:48.993798 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.994047 kubelet[2846]: W1002 19:08:48.993812 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.994047 kubelet[2846]: E1002 19:08:48.993835 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.994261 kubelet[2846]: E1002 19:08:48.994093 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.994261 kubelet[2846]: W1002 19:08:48.994103 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.994261 kubelet[2846]: E1002 19:08:48.994123 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.994405 kubelet[2846]: E1002 19:08:48.994332 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.994405 kubelet[2846]: W1002 19:08:48.994341 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.994405 kubelet[2846]: E1002 19:08:48.994360 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.994718 kubelet[2846]: E1002 19:08:48.994692 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.994718 kubelet[2846]: W1002 19:08:48.994707 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:48.995357 kubelet[2846]: E1002 19:08:48.995334 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:48.996742 kubelet[2846]: E1002 19:08:48.996705 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:48.996742 kubelet[2846]: W1002 19:08:48.996721 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:49.012210 systemd[1]: Started cri-containerd-58df9acd9d2c66cc61bfa6cb199a639967e196d4a1dbed2b00fed3c90ab80a76.scope. Oct 2 19:08:49.016795 kubelet[2846]: E1002 19:08:49.013372 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:49.028139 kubelet[2846]: E1002 19:08:49.028109 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:49.032186 kubelet[2846]: W1002 19:08:49.032156 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:49.036875 kubelet[2846]: E1002 19:08:49.036851 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:49.037070 kubelet[2846]: W1002 19:08:49.037054 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:49.037334 kubelet[2846]: E1002 19:08:49.037319 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:49.037493 kubelet[2846]: E1002 19:08:49.037429 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:49.037857 kubelet[2846]: E1002 19:08:49.037413 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:49.038012 kubelet[2846]: W1002 19:08:49.037978 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:49.038123 kubelet[2846]: E1002 19:08:49.038113 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:49.038558 kubelet[2846]: E1002 19:08:49.038546 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:49.038928 kubelet[2846]: W1002 19:08:49.038912 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:49.039142 kubelet[2846]: E1002 19:08:49.039128 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:49.040296 kubelet[2846]: E1002 19:08:49.040282 2846 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:49.040425 kubelet[2846]: W1002 19:08:49.040413 2846 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:49.040525 kubelet[2846]: E1002 19:08:49.040516 2846 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:49.061000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.061000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3333 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:49.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646639616364396432633636636336316266613663623139396136 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit: BPF prog-id=139 op=LOAD Oct 2 19:08:49.062000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000239f90 items=0 ppid=3333 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:49.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646639616364396432633636636336316266613663623139396136 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit: BPF prog-id=140 op=LOAD Oct 2 19:08:49.062000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000239fd8 items=0 ppid=3333 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:49.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646639616364396432633636636336316266613663623139396136 Oct 2 19:08:49.062000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:08:49.062000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { perfmon } for pid=3548 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit[3548]: AVC avc: denied { bpf } for pid=3548 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:49.062000 audit: BPF prog-id=141 op=LOAD Oct 2 19:08:49.062000 audit[3548]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027a068 items=0 ppid=3333 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:49.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538646639616364396432633636636336316266613663623139396136 Oct 2 19:08:49.096793 env[1632]: time="2023-10-02T19:08:49.096739187Z" level=info msg="StartContainer for \"58df9acd9d2c66cc61bfa6cb199a639967e196d4a1dbed2b00fed3c90ab80a76\" returns successfully" Oct 2 19:08:49.109875 systemd[1]: cri-containerd-58df9acd9d2c66cc61bfa6cb199a639967e196d4a1dbed2b00fed3c90ab80a76.scope: Deactivated successfully. Oct 2 19:08:49.111000 audit: BPF prog-id=141 op=UNLOAD Oct 2 19:08:49.149099 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-58df9acd9d2c66cc61bfa6cb199a639967e196d4a1dbed2b00fed3c90ab80a76-rootfs.mount: Deactivated successfully. Oct 2 19:08:49.292618 env[1632]: time="2023-10-02T19:08:49.292559591Z" level=info msg="shim disconnected" id=58df9acd9d2c66cc61bfa6cb199a639967e196d4a1dbed2b00fed3c90ab80a76 Oct 2 19:08:49.292618 env[1632]: time="2023-10-02T19:08:49.292619459Z" level=warning msg="cleaning up after shim disconnected" id=58df9acd9d2c66cc61bfa6cb199a639967e196d4a1dbed2b00fed3c90ab80a76 namespace=k8s.io Oct 2 19:08:49.293477 env[1632]: time="2023-10-02T19:08:49.292631793Z" level=info msg="cleaning up dead shim" Oct 2 19:08:49.308499 env[1632]: time="2023-10-02T19:08:49.308446340Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:08:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3608 runtime=io.containerd.runc.v2\n" Oct 2 19:08:49.946705 env[1632]: time="2023-10-02T19:08:49.946544717Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:08:50.858836 kubelet[2846]: E1002 19:08:50.858806 2846 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:08:54.633630 env[1632]: time="2023-10-02T19:08:54.633581565Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:54.638630 env[1632]: time="2023-10-02T19:08:54.638587962Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:54.644255 env[1632]: time="2023-10-02T19:08:54.644199193Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:54.651603 env[1632]: time="2023-10-02T19:08:54.651555867Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:54.653900 env[1632]: time="2023-10-02T19:08:54.653808771Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:08:54.663979 env[1632]: time="2023-10-02T19:08:54.663020201Z" level=info msg="CreateContainer within sandbox \"1ac9d886a703166f27b085c1f0060a5161103433385e48b31b041ef52240fc8e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:08:54.695149 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4034703529.mount: Deactivated successfully. Oct 2 19:08:54.705558 env[1632]: time="2023-10-02T19:08:54.705462602Z" level=info msg="CreateContainer within sandbox \"1ac9d886a703166f27b085c1f0060a5161103433385e48b31b041ef52240fc8e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"dc9cfed727c563d5f9f52e9d9edb012a97ed4a85a9d20594d5d122391dc47ecb\"" Oct 2 19:08:54.706369 env[1632]: time="2023-10-02T19:08:54.706336865Z" level=info msg="StartContainer for \"dc9cfed727c563d5f9f52e9d9edb012a97ed4a85a9d20594d5d122391dc47ecb\"" Oct 2 19:08:54.767119 systemd[1]: Started cri-containerd-dc9cfed727c563d5f9f52e9d9edb012a97ed4a85a9d20594d5d122391dc47ecb.scope. Oct 2 19:08:54.792000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798872 kernel: kauditd_printk_skb: 97 callbacks suppressed Oct 2 19:08:54.799012 kernel: audit: type=1400 audit(1696273734.792:1168): avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.792000 audit[3633]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3333 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:54.808677 kernel: audit: type=1300 audit(1696273734.792:1168): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3333 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:54.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463396366656437323763353633643566396635326539643965646230 Oct 2 19:08:54.816680 kernel: audit: type=1327 audit(1696273734.792:1168): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463396366656437323763353633643566396635326539643965646230 Oct 2 19:08:54.792000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.830619 kernel: audit: type=1400 audit(1696273734.792:1169): avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.792000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.840790 kernel: audit: type=1400 audit(1696273734.792:1169): avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.792000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.854435 kernel: audit: type=1400 audit(1696273734.792:1169): avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.854621 kernel: audit: type=1400 audit(1696273734.792:1169): avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.792000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.792000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.861863 kernel: audit: type=1400 audit(1696273734.792:1169): avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.792000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.883229 kernel: audit: type=1400 audit(1696273734.792:1169): avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.883368 kernel: audit: type=1400 audit(1696273734.792:1169): avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.792000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.883804 env[1632]: time="2023-10-02T19:08:54.883704130Z" level=info msg="StartContainer for \"dc9cfed727c563d5f9f52e9d9edb012a97ed4a85a9d20594d5d122391dc47ecb\" returns successfully" Oct 2 19:08:54.792000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.792000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.792000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.792000 audit: BPF prog-id=142 op=LOAD Oct 2 19:08:54.792000 audit[3633]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0003dc280 items=0 ppid=3333 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:54.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463396366656437323763353633643566396635326539643965646230 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit: BPF prog-id=143 op=LOAD Oct 2 19:08:54.798000 audit[3633]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0003dc2c8 items=0 ppid=3333 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:54.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463396366656437323763353633643566396635326539643965646230 Oct 2 19:08:54.798000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:08:54.798000 audit: BPF prog-id=142 op=UNLOAD Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.798000 audit: BPF prog-id=144 op=LOAD Oct 2 19:08:54.798000 audit[3633]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0003dc358 items=0 ppid=3333 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:54.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463396366656437323763353633643566396635326539643965646230 Oct 2 19:08:55.860805 kubelet[2846]: E1002 19:08:55.860773 2846 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:08:55.884678 env[1632]: time="2023-10-02T19:08:55.884546750Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:08:55.888971 systemd[1]: cri-containerd-dc9cfed727c563d5f9f52e9d9edb012a97ed4a85a9d20594d5d122391dc47ecb.scope: Deactivated successfully. Oct 2 19:08:55.892000 audit: BPF prog-id=144 op=UNLOAD Oct 2 19:08:55.926156 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dc9cfed727c563d5f9f52e9d9edb012a97ed4a85a9d20594d5d122391dc47ecb-rootfs.mount: Deactivated successfully. Oct 2 19:08:55.946098 env[1632]: time="2023-10-02T19:08:55.946045685Z" level=info msg="shim disconnected" id=dc9cfed727c563d5f9f52e9d9edb012a97ed4a85a9d20594d5d122391dc47ecb Oct 2 19:08:55.946098 env[1632]: time="2023-10-02T19:08:55.946096241Z" level=warning msg="cleaning up after shim disconnected" id=dc9cfed727c563d5f9f52e9d9edb012a97ed4a85a9d20594d5d122391dc47ecb namespace=k8s.io Oct 2 19:08:55.946413 env[1632]: time="2023-10-02T19:08:55.946108621Z" level=info msg="cleaning up dead shim" Oct 2 19:08:55.969183 env[1632]: time="2023-10-02T19:08:55.969125606Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:08:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3683 runtime=io.containerd.runc.v2\n" Oct 2 19:08:56.965462 env[1632]: time="2023-10-02T19:08:56.965420893Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:09:02.145700 kubelet[2846]: I1002 19:09:02.145667 2846 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:09:02.168012 systemd[1]: Created slice kubepods-besteffort-poddd35c0b4_d11f_4953_830e_f95471013fde.slice. Oct 2 19:09:02.179464 kubelet[2846]: I1002 19:09:02.179427 2846 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:09:02.187590 kubelet[2846]: I1002 19:09:02.181630 2846 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:09:02.199377 kubelet[2846]: I1002 19:09:02.199350 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3ca5f076-0f37-4b7f-8d04-479ef03f9ef9-config-volume\") pod \"coredns-565d847f94-dknxd\" (UID: \"3ca5f076-0f37-4b7f-8d04-479ef03f9ef9\") " pod="kube-system/coredns-565d847f94-dknxd" Oct 2 19:09:02.199776 kubelet[2846]: I1002 19:09:02.199760 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9v4tr\" (UniqueName: \"kubernetes.io/projected/3ca5f076-0f37-4b7f-8d04-479ef03f9ef9-kube-api-access-9v4tr\") pod \"coredns-565d847f94-dknxd\" (UID: \"3ca5f076-0f37-4b7f-8d04-479ef03f9ef9\") " pod="kube-system/coredns-565d847f94-dknxd" Oct 2 19:09:02.200592 kubelet[2846]: I1002 19:09:02.200574 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jrjx4\" (UniqueName: \"kubernetes.io/projected/dd35c0b4-d11f-4953-830e-f95471013fde-kube-api-access-jrjx4\") pod \"calico-kube-controllers-69d9c784fb-bmkbn\" (UID: \"dd35c0b4-d11f-4953-830e-f95471013fde\") " pod="calico-system/calico-kube-controllers-69d9c784fb-bmkbn" Oct 2 19:09:02.217290 systemd[1]: Created slice kubepods-burstable-pod4e0c1ba1_5a22_48b1_aad1_a59226d05378.slice. Oct 2 19:09:02.241225 systemd[1]: Created slice kubepods-burstable-pod3ca5f076_0f37_4b7f_8d04_479ef03f9ef9.slice. Oct 2 19:09:02.258483 kubelet[2846]: I1002 19:09:02.258419 2846 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:09:02.292160 systemd[1]: Created slice kubepods-besteffort-podcff47e73_ed2e_4160_ad38_dacd3bd5bc49.slice. Oct 2 19:09:02.301313 kubelet[2846]: I1002 19:09:02.301275 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/4e0c1ba1-5a22-48b1-aad1-a59226d05378-config-volume\") pod \"coredns-565d847f94-9s8n2\" (UID: \"4e0c1ba1-5a22-48b1-aad1-a59226d05378\") " pod="kube-system/coredns-565d847f94-9s8n2" Oct 2 19:09:02.301796 kubelet[2846]: I1002 19:09:02.301775 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hkvjs\" (UniqueName: \"kubernetes.io/projected/4e0c1ba1-5a22-48b1-aad1-a59226d05378-kube-api-access-hkvjs\") pod \"coredns-565d847f94-9s8n2\" (UID: \"4e0c1ba1-5a22-48b1-aad1-a59226d05378\") " pod="kube-system/coredns-565d847f94-9s8n2" Oct 2 19:09:02.302017 kubelet[2846]: I1002 19:09:02.302003 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/cff47e73-ed2e-4160-ad38-dacd3bd5bc49-etccalico\") pod \"csi-node-driver-ms28b\" (UID: \"cff47e73-ed2e-4160-ad38-dacd3bd5bc49\") " pod="calico-system/csi-node-driver-ms28b" Oct 2 19:09:02.302374 kubelet[2846]: I1002 19:09:02.302357 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/cff47e73-ed2e-4160-ad38-dacd3bd5bc49-registration-dir\") pod \"csi-node-driver-ms28b\" (UID: \"cff47e73-ed2e-4160-ad38-dacd3bd5bc49\") " pod="calico-system/csi-node-driver-ms28b" Oct 2 19:09:02.302516 kubelet[2846]: I1002 19:09:02.302507 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/cff47e73-ed2e-4160-ad38-dacd3bd5bc49-kubelet-dir\") pod \"csi-node-driver-ms28b\" (UID: \"cff47e73-ed2e-4160-ad38-dacd3bd5bc49\") " pod="calico-system/csi-node-driver-ms28b" Oct 2 19:09:02.302630 kubelet[2846]: I1002 19:09:02.302622 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/cff47e73-ed2e-4160-ad38-dacd3bd5bc49-socket-dir\") pod \"csi-node-driver-ms28b\" (UID: \"cff47e73-ed2e-4160-ad38-dacd3bd5bc49\") " pod="calico-system/csi-node-driver-ms28b" Oct 2 19:09:02.302775 kubelet[2846]: I1002 19:09:02.302765 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hxbld\" (UniqueName: \"kubernetes.io/projected/cff47e73-ed2e-4160-ad38-dacd3bd5bc49-kube-api-access-hxbld\") pod \"csi-node-driver-ms28b\" (UID: \"cff47e73-ed2e-4160-ad38-dacd3bd5bc49\") " pod="calico-system/csi-node-driver-ms28b" Oct 2 19:09:02.302886 kubelet[2846]: I1002 19:09:02.302873 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/cff47e73-ed2e-4160-ad38-dacd3bd5bc49-varrun\") pod \"csi-node-driver-ms28b\" (UID: \"cff47e73-ed2e-4160-ad38-dacd3bd5bc49\") " pod="calico-system/csi-node-driver-ms28b" Oct 2 19:09:02.502712 env[1632]: time="2023-10-02T19:09:02.502664460Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69d9c784fb-bmkbn,Uid:dd35c0b4-d11f-4953-830e-f95471013fde,Namespace:calico-system,Attempt:0,}" Oct 2 19:09:02.572049 env[1632]: time="2023-10-02T19:09:02.571085836Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-dknxd,Uid:3ca5f076-0f37-4b7f-8d04-479ef03f9ef9,Namespace:kube-system,Attempt:0,}" Oct 2 19:09:02.617987 env[1632]: time="2023-10-02T19:09:02.617932996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ms28b,Uid:cff47e73-ed2e-4160-ad38-dacd3bd5bc49,Namespace:calico-system,Attempt:0,}" Oct 2 19:09:02.854883 env[1632]: time="2023-10-02T19:09:02.854004536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-9s8n2,Uid:4e0c1ba1-5a22-48b1-aad1-a59226d05378,Namespace:kube-system,Attempt:0,}" Oct 2 19:09:02.894384 env[1632]: time="2023-10-02T19:09:02.894319210Z" level=error msg="Failed to destroy network for sandbox \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:02.923093 env[1632]: time="2023-10-02T19:09:02.923016870Z" level=error msg="encountered an error cleaning up failed sandbox \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:02.924275 env[1632]: time="2023-10-02T19:09:02.924216924Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69d9c784fb-bmkbn,Uid:dd35c0b4-d11f-4953-830e-f95471013fde,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:02.927061 kubelet[2846]: E1002 19:09:02.927025 2846 remote_runtime.go:222] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:02.927908 kubelet[2846]: E1002 19:09:02.927805 2846 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69d9c784fb-bmkbn" Oct 2 19:09:02.927908 kubelet[2846]: E1002 19:09:02.927909 2846 kuberuntime_manager.go:772] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69d9c784fb-bmkbn" Oct 2 19:09:02.929218 kubelet[2846]: E1002 19:09:02.929194 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-69d9c784fb-bmkbn_calico-system(dd35c0b4-d11f-4953-830e-f95471013fde)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-69d9c784fb-bmkbn_calico-system(dd35c0b4-d11f-4953-830e-f95471013fde)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69d9c784fb-bmkbn" podUID=dd35c0b4-d11f-4953-830e-f95471013fde Oct 2 19:09:02.966816 env[1632]: time="2023-10-02T19:09:02.966750020Z" level=error msg="Failed to destroy network for sandbox \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:02.967351 env[1632]: time="2023-10-02T19:09:02.967249331Z" level=error msg="encountered an error cleaning up failed sandbox \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:02.967351 env[1632]: time="2023-10-02T19:09:02.967334018Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ms28b,Uid:cff47e73-ed2e-4160-ad38-dacd3bd5bc49,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:02.968220 kubelet[2846]: E1002 19:09:02.967895 2846 remote_runtime.go:222] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:02.968220 kubelet[2846]: E1002 19:09:02.967962 2846 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ms28b" Oct 2 19:09:02.968220 kubelet[2846]: E1002 19:09:02.967998 2846 kuberuntime_manager.go:772] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ms28b" Oct 2 19:09:02.968220 kubelet[2846]: E1002 19:09:02.968066 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-ms28b_calico-system(cff47e73-ed2e-4160-ad38-dacd3bd5bc49)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-ms28b_calico-system(cff47e73-ed2e-4160-ad38-dacd3bd5bc49)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ms28b" podUID=cff47e73-ed2e-4160-ad38-dacd3bd5bc49 Oct 2 19:09:02.995741 kubelet[2846]: I1002 19:09:02.995716 2846 pod_container_deletor.go:79] "Container not found in pod's containers" containerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Oct 2 19:09:02.997947 kubelet[2846]: I1002 19:09:02.997471 2846 pod_container_deletor.go:79] "Container not found in pod's containers" containerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Oct 2 19:09:03.010993 env[1632]: time="2023-10-02T19:09:03.010948662Z" level=info msg="StopPodSandbox for \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\"" Oct 2 19:09:03.031210 env[1632]: time="2023-10-02T19:09:03.031047260Z" level=info msg="StopPodSandbox for \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\"" Oct 2 19:09:03.073475 env[1632]: time="2023-10-02T19:09:03.073395452Z" level=error msg="Failed to destroy network for sandbox \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:03.080375 env[1632]: time="2023-10-02T19:09:03.079856405Z" level=error msg="encountered an error cleaning up failed sandbox \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:03.080375 env[1632]: time="2023-10-02T19:09:03.079947627Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-dknxd,Uid:3ca5f076-0f37-4b7f-8d04-479ef03f9ef9,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:03.081503 kubelet[2846]: E1002 19:09:03.081455 2846 remote_runtime.go:222] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:03.081627 kubelet[2846]: E1002 19:09:03.081550 2846 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-565d847f94-dknxd" Oct 2 19:09:03.081627 kubelet[2846]: E1002 19:09:03.081580 2846 kuberuntime_manager.go:772] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-565d847f94-dknxd" Oct 2 19:09:03.081759 kubelet[2846]: E1002 19:09:03.081722 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-565d847f94-dknxd_kube-system(3ca5f076-0f37-4b7f-8d04-479ef03f9ef9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-565d847f94-dknxd_kube-system(3ca5f076-0f37-4b7f-8d04-479ef03f9ef9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-565d847f94-dknxd" podUID=3ca5f076-0f37-4b7f-8d04-479ef03f9ef9 Oct 2 19:09:03.150114 env[1632]: time="2023-10-02T19:09:03.149979357Z" level=error msg="Failed to destroy network for sandbox \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:03.152077 env[1632]: time="2023-10-02T19:09:03.152013663Z" level=error msg="encountered an error cleaning up failed sandbox \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:03.152205 env[1632]: time="2023-10-02T19:09:03.152106935Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-9s8n2,Uid:4e0c1ba1-5a22-48b1-aad1-a59226d05378,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:03.152475 kubelet[2846]: E1002 19:09:03.152451 2846 remote_runtime.go:222] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:03.152861 kubelet[2846]: E1002 19:09:03.152542 2846 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-565d847f94-9s8n2" Oct 2 19:09:03.152861 kubelet[2846]: E1002 19:09:03.152581 2846 kuberuntime_manager.go:772] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-565d847f94-9s8n2" Oct 2 19:09:03.152861 kubelet[2846]: E1002 19:09:03.152688 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-565d847f94-9s8n2_kube-system(4e0c1ba1-5a22-48b1-aad1-a59226d05378)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-565d847f94-9s8n2_kube-system(4e0c1ba1-5a22-48b1-aad1-a59226d05378)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-565d847f94-9s8n2" podUID=4e0c1ba1-5a22-48b1-aad1-a59226d05378 Oct 2 19:09:03.208076 env[1632]: time="2023-10-02T19:09:03.208012430Z" level=error msg="StopPodSandbox for \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\" failed" error="failed to destroy network for sandbox \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:03.208889 kubelet[2846]: E1002 19:09:03.208573 2846 remote_runtime.go:269] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Oct 2 19:09:03.208889 kubelet[2846]: E1002 19:09:03.208652 2846 kuberuntime_manager.go:954] "Failed to stop sandbox" podSandboxID={Type:containerd ID:1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847} Oct 2 19:09:03.208889 kubelet[2846]: E1002 19:09:03.208803 2846 kuberuntime_manager.go:695] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dd35c0b4-d11f-4953-830e-f95471013fde\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:09:03.208889 kubelet[2846]: E1002 19:09:03.208863 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dd35c0b4-d11f-4953-830e-f95471013fde\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69d9c784fb-bmkbn" podUID=dd35c0b4-d11f-4953-830e-f95471013fde Oct 2 19:09:03.209377 env[1632]: time="2023-10-02T19:09:03.209326233Z" level=error msg="StopPodSandbox for \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\" failed" error="failed to destroy network for sandbox \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:03.209548 kubelet[2846]: E1002 19:09:03.209516 2846 remote_runtime.go:269] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Oct 2 19:09:03.209629 kubelet[2846]: E1002 19:09:03.209553 2846 kuberuntime_manager.go:954] "Failed to stop sandbox" podSandboxID={Type:containerd ID:569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5} Oct 2 19:09:03.209629 kubelet[2846]: E1002 19:09:03.209603 2846 kuberuntime_manager.go:695] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cff47e73-ed2e-4160-ad38-dacd3bd5bc49\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:09:03.209808 kubelet[2846]: E1002 19:09:03.209675 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cff47e73-ed2e-4160-ad38-dacd3bd5bc49\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ms28b" podUID=cff47e73-ed2e-4160-ad38-dacd3bd5bc49 Oct 2 19:09:03.363546 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847-shm.mount: Deactivated successfully. Oct 2 19:09:03.828275 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:09:03.828444 kernel: audit: type=1400 audit(1696273743.814:1175): avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:03.814000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:03.828038 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2395197853.mount: Deactivated successfully. Oct 2 19:09:03.814000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c001550640 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:09:03.848965 kernel: audit: type=1300 audit(1696273743.814:1175): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c001550640 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:09:03.849277 kernel: audit: type=1327 audit(1696273743.814:1175): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:03.814000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:03.857383 kernel: audit: type=1400 audit(1696273743.814:1176): avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:03.814000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:03.866026 kernel: audit: type=1300 audit(1696273743.814:1176): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c0015b0e70 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:09:03.814000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c0015b0e70 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:09:03.883274 kernel: audit: type=1327 audit(1696273743.814:1176): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:03.814000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:03.929593 env[1632]: time="2023-10-02T19:09:03.929541065Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:03.932021 env[1632]: time="2023-10-02T19:09:03.931974643Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:03.936276 env[1632]: time="2023-10-02T19:09:03.936229577Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:03.942594 env[1632]: time="2023-10-02T19:09:03.942040320Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:09:03.943825 env[1632]: time="2023-10-02T19:09:03.943780236Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:03.949410 env[1632]: time="2023-10-02T19:09:03.949366298Z" level=info msg="CreateContainer within sandbox \"1ac9d886a703166f27b085c1f0060a5161103433385e48b31b041ef52240fc8e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:09:03.965019 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount16026820.mount: Deactivated successfully. Oct 2 19:09:03.981965 env[1632]: time="2023-10-02T19:09:03.981907750Z" level=info msg="CreateContainer within sandbox \"1ac9d886a703166f27b085c1f0060a5161103433385e48b31b041ef52240fc8e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4\"" Oct 2 19:09:03.984171 env[1632]: time="2023-10-02T19:09:03.982862019Z" level=info msg="StartContainer for \"7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4\"" Oct 2 19:09:04.006506 kubelet[2846]: I1002 19:09:04.005771 2846 pod_container_deletor.go:79] "Container not found in pod's containers" containerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Oct 2 19:09:04.006910 env[1632]: time="2023-10-02T19:09:04.006882843Z" level=info msg="StopPodSandbox for \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\"" Oct 2 19:09:04.026584 kubelet[2846]: I1002 19:09:04.024788 2846 pod_container_deletor.go:79] "Container not found in pod's containers" containerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Oct 2 19:09:04.027044 systemd[1]: Started cri-containerd-7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4.scope. Oct 2 19:09:04.035360 env[1632]: time="2023-10-02T19:09:04.035288858Z" level=info msg="StopPodSandbox for \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\"" Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.137929 kernel: audit: type=1400 audit(1696273744.119:1177): avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.149671 kernel: audit: type=1300 audit(1696273744.119:1177): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3333 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:04.119000 audit[3879]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3333 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:04.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762336561353732653030376632616434313532343034323065303063 Oct 2 19:09:04.160111 kernel: audit: type=1327 audit(1696273744.119:1177): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762336561353732653030376632616434313532343034323065303063 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.168160 kernel: audit: type=1400 audit(1696273744.119:1178): avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit: BPF prog-id=145 op=LOAD Oct 2 19:09:04.119000 audit[3879]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00032dc00 items=0 ppid=3333 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:04.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762336561353732653030376632616434313532343034323065303063 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.119000 audit: BPF prog-id=146 op=LOAD Oct 2 19:09:04.119000 audit[3879]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00032dc48 items=0 ppid=3333 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:04.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762336561353732653030376632616434313532343034323065303063 Oct 2 19:09:04.138000 audit: BPF prog-id=146 op=UNLOAD Oct 2 19:09:04.138000 audit: BPF prog-id=145 op=UNLOAD Oct 2 19:09:04.138000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.138000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.138000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.138000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.138000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.138000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.138000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.138000 audit[3879]: AVC avc: denied { perfmon } for pid=3879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.138000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.138000 audit[3879]: AVC avc: denied { bpf } for pid=3879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:04.138000 audit: BPF prog-id=147 op=LOAD Oct 2 19:09:04.138000 audit[3879]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000202ad8 items=0 ppid=3333 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:04.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762336561353732653030376632616434313532343034323065303063 Oct 2 19:09:04.195628 env[1632]: time="2023-10-02T19:09:04.195567273Z" level=error msg="StopPodSandbox for \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\" failed" error="failed to destroy network for sandbox \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:04.196249 kubelet[2846]: E1002 19:09:04.196089 2846 remote_runtime.go:269] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Oct 2 19:09:04.196249 kubelet[2846]: E1002 19:09:04.196135 2846 kuberuntime_manager.go:954] "Failed to stop sandbox" podSandboxID={Type:containerd ID:678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5} Oct 2 19:09:04.196249 kubelet[2846]: E1002 19:09:04.196205 2846 kuberuntime_manager.go:695] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3ca5f076-0f37-4b7f-8d04-479ef03f9ef9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:09:04.205570 kubelet[2846]: E1002 19:09:04.196258 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3ca5f076-0f37-4b7f-8d04-479ef03f9ef9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-565d847f94-dknxd" podUID=3ca5f076-0f37-4b7f-8d04-479ef03f9ef9 Oct 2 19:09:04.211803 env[1632]: time="2023-10-02T19:09:04.211680777Z" level=info msg="StartContainer for \"7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4\" returns successfully" Oct 2 19:09:04.229815 env[1632]: time="2023-10-02T19:09:04.229756316Z" level=error msg="StopPodSandbox for \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\" failed" error="failed to destroy network for sandbox \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:09:04.230577 kubelet[2846]: E1002 19:09:04.230046 2846 remote_runtime.go:269] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Oct 2 19:09:04.230577 kubelet[2846]: E1002 19:09:04.230126 2846 kuberuntime_manager.go:954] "Failed to stop sandbox" podSandboxID={Type:containerd ID:10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6} Oct 2 19:09:04.230577 kubelet[2846]: E1002 19:09:04.230196 2846 kuberuntime_manager.go:695] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4e0c1ba1-5a22-48b1-aad1-a59226d05378\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:09:04.230577 kubelet[2846]: E1002 19:09:04.230256 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4e0c1ba1-5a22-48b1-aad1-a59226d05378\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-565d847f94-9s8n2" podUID=4e0c1ba1-5a22-48b1-aad1-a59226d05378 Oct 2 19:09:04.347013 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:09:04.347185 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:09:05.067579 systemd[1]: run-containerd-runc-k8s.io-7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4-runc.hH3uOY.mount: Deactivated successfully. Oct 2 19:09:06.073795 systemd[1]: run-containerd-runc-k8s.io-7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4-runc.vOYuMI.mount: Deactivated successfully. Oct 2 19:09:06.106000 audit[4059]: AVC avc: denied { write } for pid=4059 comm="tee" name="fd" dev="proc" ino=24925 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:06.106000 audit[4059]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc29108976 a2=241 a3=1b6 items=1 ppid=4011 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.106000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:09:06.106000 audit: PATH item=0 name="/dev/fd/63" inode=24167 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:06.106000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:06.117000 audit[4061]: AVC avc: denied { write } for pid=4061 comm="tee" name="fd" dev="proc" ino=24933 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:06.117000 audit[4061]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2304d975 a2=241 a3=1b6 items=1 ppid=4022 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.117000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:09:06.117000 audit: PATH item=0 name="/dev/fd/63" inode=24170 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:06.117000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:06.128000 audit[4051]: AVC avc: denied { write } for pid=4051 comm="tee" name="fd" dev="proc" ino=24940 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:06.142000 audit[4054]: AVC avc: denied { write } for pid=4054 comm="tee" name="fd" dev="proc" ino=24960 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:06.142000 audit[4054]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7e5e1985 a2=241 a3=1b6 items=1 ppid=4009 pid=4054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.142000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:09:06.142000 audit: PATH item=0 name="/dev/fd/63" inode=24906 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:06.142000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:06.128000 audit[4051]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3f27e986 a2=241 a3=1b6 items=1 ppid=4024 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.128000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:09:06.128000 audit: PATH item=0 name="/dev/fd/63" inode=24905 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:06.128000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:06.150000 audit[4082]: AVC avc: denied { write } for pid=4082 comm="tee" name="fd" dev="proc" ino=24193 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:06.150000 audit[4082]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff793f4987 a2=241 a3=1b6 items=1 ppid=4020 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.150000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:09:06.150000 audit: PATH item=0 name="/dev/fd/63" inode=24930 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:06.150000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:06.155000 audit[4089]: AVC avc: denied { write } for pid=4089 comm="tee" name="fd" dev="proc" ino=24203 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:06.155000 audit[4089]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe557db985 a2=241 a3=1b6 items=1 ppid=4015 pid=4089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.155000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:09:06.155000 audit: PATH item=0 name="/dev/fd/63" inode=24183 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:06.155000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:06.164000 audit[4099]: AVC avc: denied { write } for pid=4099 comm="tee" name="fd" dev="proc" ino=24207 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:09:06.164000 audit[4099]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6fc07985 a2=241 a3=1b6 items=1 ppid=4017 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.164000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:09:06.164000 audit: PATH item=0 name="/dev/fd/63" inode=24190 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:09:06.164000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:09:06.528000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:06.528000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:06.528000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0130d15c0 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:09:06.528000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:06.528000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:06.528000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0130d15f0 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:09:06.528000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:06.528000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c013843a10 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:09:06.536000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:06.536000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0118e2ea0 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:09:06.536000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:06.528000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:06.541000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:06.541000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0130d1950 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:09:06.541000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:06.541000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:06.541000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00df10540 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:09:06.541000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:06.729369 (udev-worker)[3953]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:09:06.730967 (udev-worker)[4172]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:09:06.734000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.734000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.734000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.734000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.734000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.734000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.734000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.734000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.734000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.734000 audit: BPF prog-id=148 op=LOAD Oct 2 19:09:06.734000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff488226f0 a2=70 a3=7f79bad6f000 items=0 ppid=4018 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:06.735000 audit: BPF prog-id=148 op=UNLOAD Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit: BPF prog-id=149 op=LOAD Oct 2 19:09:06.735000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff488226f0 a2=70 a3=6e items=0 ppid=4018 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.735000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:06.735000 audit: BPF prog-id=149 op=UNLOAD Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff488226a0 a2=70 a3=7fff488226f0 items=0 ppid=4018 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.735000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit: BPF prog-id=150 op=LOAD Oct 2 19:09:06.735000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff48822680 a2=70 a3=7fff488226f0 items=0 ppid=4018 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.735000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:06.735000 audit: BPF prog-id=150 op=UNLOAD Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff48822760 a2=70 a3=0 items=0 ppid=4018 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.735000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff48822750 a2=70 a3=0 items=0 ppid=4018 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.735000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:06.735000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.735000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff48822790 a2=70 a3=0 items=0 ppid=4018 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.735000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:06.736000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.736000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.736000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.736000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.736000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.736000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.736000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.736000 audit[4174]: AVC avc: denied { perfmon } for pid=4174 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.736000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.736000 audit[4174]: AVC avc: denied { bpf } for pid=4174 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.736000 audit: BPF prog-id=151 op=LOAD Oct 2 19:09:06.736000 audit[4174]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff488226b0 a2=70 a3=ffffffff items=0 ppid=4018 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.736000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:09:06.747000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.747000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff04a3aff0 a2=70 a3=fff80800 items=0 ppid=4018 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.747000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:09:06.747000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:06.747000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff04a3aec0 a2=70 a3=3 items=0 ppid=4018 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.747000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:09:06.754000 audit: BPF prog-id=151 op=UNLOAD Oct 2 19:09:06.846000 audit[4199]: NETFILTER_CFG table=raw:111 family=2 entries=19 op=nft_register_chain pid=4199 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:06.846000 audit[4199]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffce04159d0 a2=0 a3=7ffce04159bc items=0 ppid=4018 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.846000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:06.857000 audit[4200]: NETFILTER_CFG table=nat:112 family=2 entries=16 op=nft_register_chain pid=4200 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:06.857000 audit[4200]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fff8314fd10 a2=0 a3=7fff8314fcfc items=0 ppid=4018 pid=4200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.857000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:06.859000 audit[4203]: NETFILTER_CFG table=mangle:113 family=2 entries=19 op=nft_register_chain pid=4203 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:06.859000 audit[4203]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff58443fd0 a2=0 a3=7fff58443fbc items=0 ppid=4018 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.859000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:06.862000 audit[4202]: NETFILTER_CFG table=filter:114 family=2 entries=39 op=nft_register_chain pid=4202 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:06.862000 audit[4202]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffeefcb37a0 a2=0 a3=55d24283b000 items=0 ppid=4018 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.862000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:07.635170 systemd-networkd[1443]: vxlan.calico: Link UP Oct 2 19:09:07.635181 systemd-networkd[1443]: vxlan.calico: Gained carrier Oct 2 19:09:08.926514 systemd-networkd[1443]: vxlan.calico: Gained IPv6LL Oct 2 19:09:10.945000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:10.948906 kernel: kauditd_printk_skb: 175 callbacks suppressed Oct 2 19:09:10.949130 kernel: audit: type=1400 audit(1696273750.945:1215): avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:10.945000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:10.965018 kernel: audit: type=1400 audit(1696273750.945:1214): avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:10.945000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=f a1=c000f6d160 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:09:10.976618 kernel: audit: type=1300 audit(1696273750.945:1215): arch=c000003e syscall=254 success=no exit=-13 a0=f a1=c000f6d160 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:09:10.945000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:10.945000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c001551c40 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:09:11.001214 kernel: audit: type=1327 audit(1696273750.945:1215): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:11.001438 kernel: audit: type=1300 audit(1696273750.945:1214): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c001551c40 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:09:11.001513 kernel: audit: type=1327 audit(1696273750.945:1214): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:10.945000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:10.945000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:11.020179 kernel: audit: type=1400 audit(1696273750.945:1216): avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:11.020417 kernel: audit: type=1300 audit(1696273750.945:1216): arch=c000003e syscall=254 success=no exit=-13 a0=11 a1=c001551c80 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:09:10.945000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=11 a1=c001551c80 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:09:10.945000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:11.050124 kernel: audit: type=1327 audit(1696273750.945:1216): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:11.050248 kernel: audit: type=1400 audit(1696273750.945:1217): avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:10.945000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:10.945000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=11 a1=c001551ce0 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:09:10.945000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:12.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.17.113:22-139.178.89.65:40558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:12.818280 systemd[1]: Started sshd@7-172.31.17.113:22-139.178.89.65:40558.service. Oct 2 19:09:13.017000 audit[4245]: USER_ACCT pid=4245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:13.019012 sshd[4245]: Accepted publickey for core from 139.178.89.65 port 40558 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:13.018000 audit[4245]: CRED_ACQ pid=4245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:13.018000 audit[4245]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9e783c50 a2=3 a3=0 items=0 ppid=1 pid=4245 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:13.018000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:13.021510 sshd[4245]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:13.029866 systemd[1]: Started session-8.scope. Oct 2 19:09:13.030416 systemd-logind[1616]: New session 8 of user core. Oct 2 19:09:13.039000 audit[4245]: USER_START pid=4245 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:13.040000 audit[4247]: CRED_ACQ pid=4247 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:13.412227 sshd[4245]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:13.416000 audit[4245]: USER_END pid=4245 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:13.416000 audit[4245]: CRED_DISP pid=4245 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:13.420385 systemd[1]: sshd@7-172.31.17.113:22-139.178.89.65:40558.service: Deactivated successfully. Oct 2 19:09:13.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.17.113:22-139.178.89.65:40558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:13.421592 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:09:13.422543 systemd-logind[1616]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:09:13.423995 systemd-logind[1616]: Removed session 8. Oct 2 19:09:13.693493 systemd[1]: run-containerd-runc-k8s.io-7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4-runc.jAMntg.mount: Deactivated successfully. Oct 2 19:09:14.820192 env[1632]: time="2023-10-02T19:09:14.820142309Z" level=info msg="StopPodSandbox for \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\"" Oct 2 19:09:15.069270 env[1632]: 2023-10-02 19:09:14.919 [INFO][4292] k8s.go 576: Cleaning up netns ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Oct 2 19:09:15.069270 env[1632]: 2023-10-02 19:09:14.920 [INFO][4292] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" iface="eth0" netns="/var/run/netns/cni-4db3cac0-6dc7-5c5f-f5c6-24473a579dd6" Oct 2 19:09:15.069270 env[1632]: 2023-10-02 19:09:14.921 [INFO][4292] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" iface="eth0" netns="/var/run/netns/cni-4db3cac0-6dc7-5c5f-f5c6-24473a579dd6" Oct 2 19:09:15.069270 env[1632]: 2023-10-02 19:09:14.922 [INFO][4292] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" iface="eth0" netns="/var/run/netns/cni-4db3cac0-6dc7-5c5f-f5c6-24473a579dd6" Oct 2 19:09:15.069270 env[1632]: 2023-10-02 19:09:14.922 [INFO][4292] k8s.go 583: Releasing IP address(es) ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Oct 2 19:09:15.069270 env[1632]: 2023-10-02 19:09:14.922 [INFO][4292] utils.go 196: Calico CNI releasing IP address ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Oct 2 19:09:15.069270 env[1632]: 2023-10-02 19:09:15.046 [INFO][4306] ipam_plugin.go 416: Releasing address using handleID ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" HandleID="k8s-pod-network.10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:09:15.069270 env[1632]: time="2023-10-02T19:09:15Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:15.069270 env[1632]: time="2023-10-02T19:09:15Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:15.069270 env[1632]: 2023-10-02 19:09:15.063 [WARNING][4306] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" HandleID="k8s-pod-network.10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:09:15.069270 env[1632]: 2023-10-02 19:09:15.063 [INFO][4306] ipam_plugin.go 444: Releasing address using workloadID ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" HandleID="k8s-pod-network.10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:09:15.069270 env[1632]: time="2023-10-02T19:09:15Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:15.069270 env[1632]: 2023-10-02 19:09:15.067 [INFO][4292] k8s.go 589: Teardown processing complete. ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Oct 2 19:09:15.071921 systemd[1]: run-netns-cni\x2d4db3cac0\x2d6dc7\x2d5c5f\x2df5c6\x2d24473a579dd6.mount: Deactivated successfully. Oct 2 19:09:15.074017 env[1632]: time="2023-10-02T19:09:15.073218072Z" level=info msg="TearDown network for sandbox \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\" successfully" Oct 2 19:09:15.074017 env[1632]: time="2023-10-02T19:09:15.073266705Z" level=info msg="StopPodSandbox for \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\" returns successfully" Oct 2 19:09:15.074500 env[1632]: time="2023-10-02T19:09:15.074460136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-9s8n2,Uid:4e0c1ba1-5a22-48b1-aad1-a59226d05378,Namespace:kube-system,Attempt:1,}" Oct 2 19:09:15.280859 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:09:15.281009 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6a92ae42c68: link becomes ready Oct 2 19:09:15.290509 systemd-networkd[1443]: cali6a92ae42c68: Link UP Oct 2 19:09:15.290518 systemd-networkd[1443]: cali6a92ae42c68: Gained carrier Oct 2 19:09:15.296426 (udev-worker)[4332]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.167 [INFO][4314] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0 coredns-565d847f94- kube-system 4e0c1ba1-5a22-48b1-aad1-a59226d05378 724 0 2023-10-02 19:08:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:565d847f94 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-17-113 coredns-565d847f94-9s8n2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6a92ae42c68 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" Namespace="kube-system" Pod="coredns-565d847f94-9s8n2" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-" Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.168 [INFO][4314] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" Namespace="kube-system" Pod="coredns-565d847f94-9s8n2" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.206 [INFO][4325] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" HandleID="k8s-pod-network.e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.223 [INFO][4325] ipam_plugin.go 269: Auto assigning IP ContainerID="e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" HandleID="k8s-pod-network.e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004dd40), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-17-113", "pod":"coredns-565d847f94-9s8n2", "timestamp":"2023-10-02 19:09:15.206660141 +0000 UTC"}, Hostname:"ip-172-31-17-113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:09:15.308254 env[1632]: time="2023-10-02T19:09:15Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:15.308254 env[1632]: time="2023-10-02T19:09:15Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.223 [INFO][4325] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-17-113' Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.230 [INFO][4325] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" host="ip-172-31-17-113" Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.239 [INFO][4325] ipam.go 372: Looking up existing affinities for host host="ip-172-31-17-113" Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.247 [INFO][4325] ipam.go 489: Trying affinity for 192.168.58.128/26 host="ip-172-31-17-113" Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.251 [INFO][4325] ipam.go 155: Attempting to load block cidr=192.168.58.128/26 host="ip-172-31-17-113" Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.256 [INFO][4325] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.58.128/26 host="ip-172-31-17-113" Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.256 [INFO][4325] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.58.128/26 handle="k8s-pod-network.e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" host="ip-172-31-17-113" Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.259 [INFO][4325] ipam.go 1682: Creating new handle: k8s-pod-network.e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.268 [INFO][4325] ipam.go 1203: Writing block in order to claim IPs block=192.168.58.128/26 handle="k8s-pod-network.e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" host="ip-172-31-17-113" Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.273 [INFO][4325] ipam.go 1216: Successfully claimed IPs: [192.168.58.129/26] block=192.168.58.128/26 handle="k8s-pod-network.e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" host="ip-172-31-17-113" Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.273 [INFO][4325] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.58.129/26] handle="k8s-pod-network.e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" host="ip-172-31-17-113" Oct 2 19:09:15.308254 env[1632]: time="2023-10-02T19:09:15Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:15.308254 env[1632]: 2023-10-02 19:09:15.273 [INFO][4325] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.58.129/26] IPv6=[] ContainerID="e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" HandleID="k8s-pod-network.e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:09:15.309850 env[1632]: 2023-10-02 19:09:15.277 [INFO][4314] k8s.go 383: Populated endpoint ContainerID="e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" Namespace="kube-system" Pod="coredns-565d847f94-9s8n2" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"4e0c1ba1-5a22-48b1-aad1-a59226d05378", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"", Pod:"coredns-565d847f94-9s8n2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.58.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6a92ae42c68", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:15.309850 env[1632]: 2023-10-02 19:09:15.277 [INFO][4314] k8s.go 384: Calico CNI using IPs: [192.168.58.129/32] ContainerID="e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" Namespace="kube-system" Pod="coredns-565d847f94-9s8n2" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:09:15.309850 env[1632]: 2023-10-02 19:09:15.277 [INFO][4314] dataplane_linux.go 68: Setting the host side veth name to cali6a92ae42c68 ContainerID="e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" Namespace="kube-system" Pod="coredns-565d847f94-9s8n2" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:09:15.309850 env[1632]: 2023-10-02 19:09:15.283 [INFO][4314] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" Namespace="kube-system" Pod="coredns-565d847f94-9s8n2" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:09:15.309850 env[1632]: 2023-10-02 19:09:15.291 [INFO][4314] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" Namespace="kube-system" Pod="coredns-565d847f94-9s8n2" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"4e0c1ba1-5a22-48b1-aad1-a59226d05378", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca", Pod:"coredns-565d847f94-9s8n2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.58.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6a92ae42c68", MAC:"92:aa:cc:0c:6e:b6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:15.309850 env[1632]: 2023-10-02 19:09:15.305 [INFO][4314] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca" Namespace="kube-system" Pod="coredns-565d847f94-9s8n2" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:09:15.359504 env[1632]: time="2023-10-02T19:09:15.356018507Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:15.359827 env[1632]: time="2023-10-02T19:09:15.359773655Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:15.360064 env[1632]: time="2023-10-02T19:09:15.360032138Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:15.361995 env[1632]: time="2023-10-02T19:09:15.361920242Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca pid=4352 runtime=io.containerd.runc.v2 Oct 2 19:09:15.372000 audit[4365]: NETFILTER_CFG table=filter:115 family=2 entries=36 op=nft_register_chain pid=4365 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:15.372000 audit[4365]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffffb7e4770 a2=0 a3=7ffffb7e475c items=0 ppid=4018 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:15.372000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:15.405835 systemd[1]: Started cri-containerd-e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca.scope. Oct 2 19:09:15.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.423000 audit: BPF prog-id=152 op=LOAD Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4352 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:15.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535633237643439613830636661663936336566313263373365656561 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4352 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:15.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535633237643439613830636661663936336566313263373365656561 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit: BPF prog-id=153 op=LOAD Oct 2 19:09:15.424000 audit[4364]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000280350 items=0 ppid=4352 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:15.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535633237643439613830636661663936336566313263373365656561 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit: BPF prog-id=154 op=LOAD Oct 2 19:09:15.424000 audit[4364]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000280398 items=0 ppid=4352 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:15.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535633237643439613830636661663936336566313263373365656561 Oct 2 19:09:15.424000 audit: BPF prog-id=154 op=UNLOAD Oct 2 19:09:15.424000 audit: BPF prog-id=153 op=UNLOAD Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.424000 audit: BPF prog-id=155 op=LOAD Oct 2 19:09:15.424000 audit[4364]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002807a8 items=0 ppid=4352 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:15.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535633237643439613830636661663936336566313263373365656561 Oct 2 19:09:15.464500 env[1632]: time="2023-10-02T19:09:15.464450027Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-9s8n2,Uid:4e0c1ba1-5a22-48b1-aad1-a59226d05378,Namespace:kube-system,Attempt:1,} returns sandbox id \"e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca\"" Oct 2 19:09:15.470636 env[1632]: time="2023-10-02T19:09:15.470595760Z" level=info msg="CreateContainer within sandbox \"e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:09:15.490795 env[1632]: time="2023-10-02T19:09:15.490748373Z" level=info msg="CreateContainer within sandbox \"e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"de04e210dca4e28caed3043ca7f690d626bbc4a799f94be9ee40f81c8d27ca39\"" Oct 2 19:09:15.496176 env[1632]: time="2023-10-02T19:09:15.496131241Z" level=info msg="StartContainer for \"de04e210dca4e28caed3043ca7f690d626bbc4a799f94be9ee40f81c8d27ca39\"" Oct 2 19:09:15.523599 systemd[1]: Started cri-containerd-de04e210dca4e28caed3043ca7f690d626bbc4a799f94be9ee40f81c8d27ca39.scope. Oct 2 19:09:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.544000 audit: BPF prog-id=156 op=LOAD Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4352 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:15.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465303465323130646361346532386361656433303433636137663639 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4352 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:15.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465303465323130646361346532386361656433303433636137663639 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit: BPF prog-id=157 op=LOAD Oct 2 19:09:15.545000 audit[4395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000258e90 items=0 ppid=4352 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:15.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465303465323130646361346532386361656433303433636137663639 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit: BPF prog-id=158 op=LOAD Oct 2 19:09:15.545000 audit[4395]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000258ed8 items=0 ppid=4352 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:15.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465303465323130646361346532386361656433303433636137663639 Oct 2 19:09:15.545000 audit: BPF prog-id=158 op=UNLOAD Oct 2 19:09:15.545000 audit: BPF prog-id=157 op=UNLOAD Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:15.545000 audit: BPF prog-id=159 op=LOAD Oct 2 19:09:15.545000 audit[4395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002592e8 items=0 ppid=4352 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:15.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465303465323130646361346532386361656433303433636137663639 Oct 2 19:09:15.568719 env[1632]: time="2023-10-02T19:09:15.568675624Z" level=info msg="StartContainer for \"de04e210dca4e28caed3043ca7f690d626bbc4a799f94be9ee40f81c8d27ca39\" returns successfully" Oct 2 19:09:15.820986 env[1632]: time="2023-10-02T19:09:15.820943817Z" level=info msg="StopPodSandbox for \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\"" Oct 2 19:09:15.936688 env[1632]: 2023-10-02 19:09:15.896 [INFO][4436] k8s.go 576: Cleaning up netns ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Oct 2 19:09:15.936688 env[1632]: 2023-10-02 19:09:15.896 [INFO][4436] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" iface="eth0" netns="/var/run/netns/cni-173a56ae-790a-fade-163a-3eb46fcf4f0e" Oct 2 19:09:15.936688 env[1632]: 2023-10-02 19:09:15.897 [INFO][4436] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" iface="eth0" netns="/var/run/netns/cni-173a56ae-790a-fade-163a-3eb46fcf4f0e" Oct 2 19:09:15.936688 env[1632]: 2023-10-02 19:09:15.897 [INFO][4436] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" iface="eth0" netns="/var/run/netns/cni-173a56ae-790a-fade-163a-3eb46fcf4f0e" Oct 2 19:09:15.936688 env[1632]: 2023-10-02 19:09:15.897 [INFO][4436] k8s.go 583: Releasing IP address(es) ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Oct 2 19:09:15.936688 env[1632]: 2023-10-02 19:09:15.897 [INFO][4436] utils.go 196: Calico CNI releasing IP address ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Oct 2 19:09:15.936688 env[1632]: 2023-10-02 19:09:15.924 [INFO][4447] ipam_plugin.go 416: Releasing address using handleID ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" HandleID="k8s-pod-network.678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:09:15.936688 env[1632]: time="2023-10-02T19:09:15Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:15.936688 env[1632]: time="2023-10-02T19:09:15Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:15.936688 env[1632]: 2023-10-02 19:09:15.931 [WARNING][4447] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" HandleID="k8s-pod-network.678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:09:15.936688 env[1632]: 2023-10-02 19:09:15.931 [INFO][4447] ipam_plugin.go 444: Releasing address using workloadID ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" HandleID="k8s-pod-network.678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:09:15.936688 env[1632]: time="2023-10-02T19:09:15Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:15.936688 env[1632]: 2023-10-02 19:09:15.935 [INFO][4436] k8s.go 589: Teardown processing complete. ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Oct 2 19:09:15.937467 env[1632]: time="2023-10-02T19:09:15.937427022Z" level=info msg="TearDown network for sandbox \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\" successfully" Oct 2 19:09:15.937567 env[1632]: time="2023-10-02T19:09:15.937551447Z" level=info msg="StopPodSandbox for \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\" returns successfully" Oct 2 19:09:15.938388 env[1632]: time="2023-10-02T19:09:15.938365285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-dknxd,Uid:3ca5f076-0f37-4b7f-8d04-479ef03f9ef9,Namespace:kube-system,Attempt:1,}" Oct 2 19:09:16.090787 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2984407970.mount: Deactivated successfully. Oct 2 19:09:16.091163 systemd[1]: run-netns-cni\x2d173a56ae\x2d790a\x2dfade\x2d163a\x2d3eb46fcf4f0e.mount: Deactivated successfully. Oct 2 19:09:16.181793 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibff1f4bc3bd: link becomes ready Oct 2 19:09:16.190542 systemd-networkd[1443]: calibff1f4bc3bd: Link UP Oct 2 19:09:16.190553 systemd-networkd[1443]: calibff1f4bc3bd: Gained carrier Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.011 [INFO][4454] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0 coredns-565d847f94- kube-system 3ca5f076-0f37-4b7f-8d04-479ef03f9ef9 734 0 2023-10-02 19:08:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:565d847f94 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-17-113 coredns-565d847f94-dknxd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calibff1f4bc3bd [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" Namespace="kube-system" Pod="coredns-565d847f94-dknxd" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-" Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.012 [INFO][4454] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" Namespace="kube-system" Pod="coredns-565d847f94-dknxd" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.058 [INFO][4465] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" HandleID="k8s-pod-network.f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.102 [INFO][4465] ipam_plugin.go 269: Auto assigning IP ContainerID="f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" HandleID="k8s-pod-network.f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004de90), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-17-113", "pod":"coredns-565d847f94-dknxd", "timestamp":"2023-10-02 19:09:16.058103625 +0000 UTC"}, Hostname:"ip-172-31-17-113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:09:16.227310 env[1632]: time="2023-10-02T19:09:16Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:16.227310 env[1632]: time="2023-10-02T19:09:16Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.103 [INFO][4465] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-17-113' Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.108 [INFO][4465] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" host="ip-172-31-17-113" Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.127 [INFO][4465] ipam.go 372: Looking up existing affinities for host host="ip-172-31-17-113" Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.140 [INFO][4465] ipam.go 489: Trying affinity for 192.168.58.128/26 host="ip-172-31-17-113" Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.145 [INFO][4465] ipam.go 155: Attempting to load block cidr=192.168.58.128/26 host="ip-172-31-17-113" Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.153 [INFO][4465] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.58.128/26 host="ip-172-31-17-113" Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.153 [INFO][4465] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.58.128/26 handle="k8s-pod-network.f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" host="ip-172-31-17-113" Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.156 [INFO][4465] ipam.go 1682: Creating new handle: k8s-pod-network.f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5 Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.164 [INFO][4465] ipam.go 1203: Writing block in order to claim IPs block=192.168.58.128/26 handle="k8s-pod-network.f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" host="ip-172-31-17-113" Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.173 [INFO][4465] ipam.go 1216: Successfully claimed IPs: [192.168.58.130/26] block=192.168.58.128/26 handle="k8s-pod-network.f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" host="ip-172-31-17-113" Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.173 [INFO][4465] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.58.130/26] handle="k8s-pod-network.f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" host="ip-172-31-17-113" Oct 2 19:09:16.227310 env[1632]: time="2023-10-02T19:09:16Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:16.227310 env[1632]: 2023-10-02 19:09:16.173 [INFO][4465] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.58.130/26] IPv6=[] ContainerID="f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" HandleID="k8s-pod-network.f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:09:16.228276 env[1632]: 2023-10-02 19:09:16.176 [INFO][4454] k8s.go 383: Populated endpoint ContainerID="f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" Namespace="kube-system" Pod="coredns-565d847f94-dknxd" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"3ca5f076-0f37-4b7f-8d04-479ef03f9ef9", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"", Pod:"coredns-565d847f94-dknxd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.58.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibff1f4bc3bd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:16.228276 env[1632]: 2023-10-02 19:09:16.177 [INFO][4454] k8s.go 384: Calico CNI using IPs: [192.168.58.130/32] ContainerID="f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" Namespace="kube-system" Pod="coredns-565d847f94-dknxd" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:09:16.228276 env[1632]: 2023-10-02 19:09:16.177 [INFO][4454] dataplane_linux.go 68: Setting the host side veth name to calibff1f4bc3bd ContainerID="f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" Namespace="kube-system" Pod="coredns-565d847f94-dknxd" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:09:16.228276 env[1632]: 2023-10-02 19:09:16.181 [INFO][4454] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" Namespace="kube-system" Pod="coredns-565d847f94-dknxd" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:09:16.228276 env[1632]: 2023-10-02 19:09:16.186 [INFO][4454] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" Namespace="kube-system" Pod="coredns-565d847f94-dknxd" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"3ca5f076-0f37-4b7f-8d04-479ef03f9ef9", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5", Pod:"coredns-565d847f94-dknxd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.58.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibff1f4bc3bd", MAC:"3a:bd:2e:f3:43:b8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:16.228276 env[1632]: 2023-10-02 19:09:16.223 [INFO][4454] k8s.go 489: Wrote updated endpoint to datastore ContainerID="f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5" Namespace="kube-system" Pod="coredns-565d847f94-dknxd" WorkloadEndpoint="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:09:16.255216 env[1632]: time="2023-10-02T19:09:16.254876462Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:16.255216 env[1632]: time="2023-10-02T19:09:16.254948692Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:16.255216 env[1632]: time="2023-10-02T19:09:16.254966775Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:16.256691 env[1632]: time="2023-10-02T19:09:16.255619694Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5 pid=4511 runtime=io.containerd.runc.v2 Oct 2 19:09:16.287000 audit[4532]: NETFILTER_CFG table=filter:116 family=2 entries=12 op=nft_register_rule pid=4532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:16.290761 kernel: kauditd_printk_skb: 130 callbacks suppressed Oct 2 19:09:16.291329 kernel: audit: type=1325 audit(1696273756.287:1264): table=filter:116 family=2 entries=12 op=nft_register_rule pid=4532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:16.287000 audit[4532]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fff5d487520 a2=0 a3=7fff5d48750c items=0 ppid=3013 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.302434 kernel: audit: type=1300 audit(1696273756.287:1264): arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fff5d487520 a2=0 a3=7fff5d48750c items=0 ppid=3013 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.308736 kernel: audit: type=1327 audit(1696273756.287:1264): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:16.287000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:16.313047 systemd[1]: Started cri-containerd-f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5.scope. Oct 2 19:09:16.287000 audit[4532]: NETFILTER_CFG table=nat:117 family=2 entries=30 op=nft_register_rule pid=4532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:16.320837 kernel: audit: type=1325 audit(1696273756.287:1265): table=nat:117 family=2 entries=30 op=nft_register_rule pid=4532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:16.287000 audit[4532]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fff5d487520 a2=0 a3=7fff5d48750c items=0 ppid=3013 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.334714 kernel: audit: type=1300 audit(1696273756.287:1265): arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fff5d487520 a2=0 a3=7fff5d48750c items=0 ppid=3013 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.339685 kernel: audit: type=1327 audit(1696273756.287:1265): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:16.287000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:16.333000 audit[4534]: NETFILTER_CFG table=filter:118 family=2 entries=30 op=nft_register_chain pid=4534 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:16.357321 kernel: audit: type=1325 audit(1696273756.333:1266): table=filter:118 family=2 entries=30 op=nft_register_chain pid=4534 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:16.358084 kernel: audit: type=1300 audit(1696273756.333:1266): arch=c000003e syscall=46 success=yes exit=16712 a0=3 a1=7ffce9ad3e10 a2=0 a3=7ffce9ad3dfc items=0 ppid=4018 pid=4534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.333000 audit[4534]: SYSCALL arch=c000003e syscall=46 success=yes exit=16712 a0=3 a1=7ffce9ad3e10 a2=0 a3=7ffce9ad3dfc items=0 ppid=4018 pid=4534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.333000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:16.368940 kernel: audit: type=1327 audit(1696273756.333:1266): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:16.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383861 kernel: audit: type=1400 audit(1696273756.375:1267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.375000 audit: BPF prog-id=160 op=LOAD Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4511 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638363737643837666663666138663733316134646166386134306632 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4511 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638363737643837666663666138663733316134646166386134306632 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit: BPF prog-id=161 op=LOAD Oct 2 19:09:16.383000 audit[4523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c6160 items=0 ppid=4511 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638363737643837666663666138663733316134646166386134306632 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit: BPF prog-id=162 op=LOAD Oct 2 19:09:16.383000 audit[4523]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c61a8 items=0 ppid=4511 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638363737643837666663666138663733316134646166386134306632 Oct 2 19:09:16.383000 audit: BPF prog-id=162 op=UNLOAD Oct 2 19:09:16.383000 audit: BPF prog-id=161 op=UNLOAD Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { perfmon } for pid=4523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit[4523]: AVC avc: denied { bpf } for pid=4523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.383000 audit: BPF prog-id=163 op=LOAD Oct 2 19:09:16.383000 audit[4523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c65b8 items=0 ppid=4511 pid=4523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638363737643837666663666138663733316134646166386134306632 Oct 2 19:09:16.445401 env[1632]: time="2023-10-02T19:09:16.445274002Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-dknxd,Uid:3ca5f076-0f37-4b7f-8d04-479ef03f9ef9,Namespace:kube-system,Attempt:1,} returns sandbox id \"f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5\"" Oct 2 19:09:16.445000 audit[4572]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:16.445000 audit[4572]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe8ea14ff0 a2=0 a3=7ffe8ea14fdc items=0 ppid=3013 pid=4572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:16.451935 env[1632]: time="2023-10-02T19:09:16.451895147Z" level=info msg="CreateContainer within sandbox \"f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:09:16.452000 audit[4572]: NETFILTER_CFG table=nat:120 family=2 entries=51 op=nft_register_chain pid=4572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:16.452000 audit[4572]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffe8ea14ff0 a2=0 a3=7ffe8ea14fdc items=0 ppid=3013 pid=4572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:16.477287 env[1632]: time="2023-10-02T19:09:16.477229229Z" level=info msg="CreateContainer within sandbox \"f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"503627f36e1bf3b2a2c35117ef6fa24eb6f17ee7e5cfbceb2bf55756272bb7d6\"" Oct 2 19:09:16.478149 env[1632]: time="2023-10-02T19:09:16.478115008Z" level=info msg="StartContainer for \"503627f36e1bf3b2a2c35117ef6fa24eb6f17ee7e5cfbceb2bf55756272bb7d6\"" Oct 2 19:09:16.501704 systemd[1]: Started cri-containerd-503627f36e1bf3b2a2c35117ef6fa24eb6f17ee7e5cfbceb2bf55756272bb7d6.scope. Oct 2 19:09:16.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.517000 audit: BPF prog-id=164 op=LOAD Oct 2 19:09:16.518000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.518000 audit[4580]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4511 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530333632376633366531626633623261326333353131376566366661 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4511 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530333632376633366531626633623261326333353131376566366661 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit: BPF prog-id=165 op=LOAD Oct 2 19:09:16.519000 audit[4580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00033f220 items=0 ppid=4511 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530333632376633366531626633623261326333353131376566366661 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.519000 audit: BPF prog-id=166 op=LOAD Oct 2 19:09:16.519000 audit[4580]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00033f268 items=0 ppid=4511 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530333632376633366531626633623261326333353131376566366661 Oct 2 19:09:16.521000 audit: BPF prog-id=166 op=UNLOAD Oct 2 19:09:16.521000 audit: BPF prog-id=165 op=UNLOAD Oct 2 19:09:16.521000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.521000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.521000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.521000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.521000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.521000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.521000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.521000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.521000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.521000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:16.521000 audit: BPF prog-id=167 op=LOAD Oct 2 19:09:16.521000 audit[4580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00033f678 items=0 ppid=4511 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:16.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530333632376633366531626633623261326333353131376566366661 Oct 2 19:09:16.543685 env[1632]: time="2023-10-02T19:09:16.541867331Z" level=info msg="StartContainer for \"503627f36e1bf3b2a2c35117ef6fa24eb6f17ee7e5cfbceb2bf55756272bb7d6\" returns successfully" Oct 2 19:09:16.818785 env[1632]: time="2023-10-02T19:09:16.818740392Z" level=info msg="StopPodSandbox for \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\"" Oct 2 19:09:16.819621 env[1632]: time="2023-10-02T19:09:16.819064670Z" level=info msg="StopPodSandbox for \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\"" Oct 2 19:09:16.912989 systemd-networkd[1443]: cali6a92ae42c68: Gained IPv6LL Oct 2 19:09:17.171214 env[1632]: 2023-10-02 19:09:17.031 [INFO][4643] k8s.go 576: Cleaning up netns ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Oct 2 19:09:17.171214 env[1632]: 2023-10-02 19:09:17.032 [INFO][4643] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" iface="eth0" netns="/var/run/netns/cni-ca033992-493e-df19-32a8-487eaf5054c9" Oct 2 19:09:17.171214 env[1632]: 2023-10-02 19:09:17.032 [INFO][4643] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" iface="eth0" netns="/var/run/netns/cni-ca033992-493e-df19-32a8-487eaf5054c9" Oct 2 19:09:17.171214 env[1632]: 2023-10-02 19:09:17.033 [INFO][4643] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" iface="eth0" netns="/var/run/netns/cni-ca033992-493e-df19-32a8-487eaf5054c9" Oct 2 19:09:17.171214 env[1632]: 2023-10-02 19:09:17.033 [INFO][4643] k8s.go 583: Releasing IP address(es) ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Oct 2 19:09:17.171214 env[1632]: 2023-10-02 19:09:17.033 [INFO][4643] utils.go 196: Calico CNI releasing IP address ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Oct 2 19:09:17.171214 env[1632]: 2023-10-02 19:09:17.098 [INFO][4652] ipam_plugin.go 416: Releasing address using handleID ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" HandleID="k8s-pod-network.1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Workload="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:09:17.171214 env[1632]: time="2023-10-02T19:09:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:17.171214 env[1632]: time="2023-10-02T19:09:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:17.171214 env[1632]: 2023-10-02 19:09:17.154 [WARNING][4652] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" HandleID="k8s-pod-network.1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Workload="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:09:17.171214 env[1632]: 2023-10-02 19:09:17.154 [INFO][4652] ipam_plugin.go 444: Releasing address using workloadID ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" HandleID="k8s-pod-network.1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Workload="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:09:17.171214 env[1632]: time="2023-10-02T19:09:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:17.171214 env[1632]: 2023-10-02 19:09:17.165 [INFO][4643] k8s.go 589: Teardown processing complete. ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Oct 2 19:09:17.170425 systemd[1]: run-netns-cni\x2dca033992\x2d493e\x2ddf19\x2d32a8\x2d487eaf5054c9.mount: Deactivated successfully. Oct 2 19:09:17.172474 env[1632]: time="2023-10-02T19:09:17.171212632Z" level=info msg="TearDown network for sandbox \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\" successfully" Oct 2 19:09:17.172474 env[1632]: time="2023-10-02T19:09:17.171255239Z" level=info msg="StopPodSandbox for \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\" returns successfully" Oct 2 19:09:17.172474 env[1632]: time="2023-10-02T19:09:17.171986606Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69d9c784fb-bmkbn,Uid:dd35c0b4-d11f-4953-830e-f95471013fde,Namespace:calico-system,Attempt:1,}" Oct 2 19:09:17.212158 env[1632]: 2023-10-02 19:09:17.027 [INFO][4635] k8s.go 576: Cleaning up netns ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Oct 2 19:09:17.212158 env[1632]: 2023-10-02 19:09:17.027 [INFO][4635] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" iface="eth0" netns="/var/run/netns/cni-ca8aeca4-03ac-4cc1-2481-d82e75f33621" Oct 2 19:09:17.212158 env[1632]: 2023-10-02 19:09:17.028 [INFO][4635] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" iface="eth0" netns="/var/run/netns/cni-ca8aeca4-03ac-4cc1-2481-d82e75f33621" Oct 2 19:09:17.212158 env[1632]: 2023-10-02 19:09:17.028 [INFO][4635] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" iface="eth0" netns="/var/run/netns/cni-ca8aeca4-03ac-4cc1-2481-d82e75f33621" Oct 2 19:09:17.212158 env[1632]: 2023-10-02 19:09:17.028 [INFO][4635] k8s.go 583: Releasing IP address(es) ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Oct 2 19:09:17.212158 env[1632]: 2023-10-02 19:09:17.028 [INFO][4635] utils.go 196: Calico CNI releasing IP address ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Oct 2 19:09:17.212158 env[1632]: 2023-10-02 19:09:17.111 [INFO][4651] ipam_plugin.go 416: Releasing address using handleID ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" HandleID="k8s-pod-network.569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Workload="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:09:17.212158 env[1632]: time="2023-10-02T19:09:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:17.212158 env[1632]: time="2023-10-02T19:09:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:17.212158 env[1632]: 2023-10-02 19:09:17.185 [WARNING][4651] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" HandleID="k8s-pod-network.569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Workload="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:09:17.212158 env[1632]: 2023-10-02 19:09:17.186 [INFO][4651] ipam_plugin.go 444: Releasing address using workloadID ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" HandleID="k8s-pod-network.569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Workload="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:09:17.212158 env[1632]: time="2023-10-02T19:09:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:17.212158 env[1632]: 2023-10-02 19:09:17.209 [INFO][4635] k8s.go 589: Teardown processing complete. ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Oct 2 19:09:17.215664 systemd[1]: run-netns-cni\x2dca8aeca4\x2d03ac\x2d4cc1\x2d2481\x2dd82e75f33621.mount: Deactivated successfully. Oct 2 19:09:17.217049 env[1632]: time="2023-10-02T19:09:17.216801711Z" level=info msg="TearDown network for sandbox \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\" successfully" Oct 2 19:09:17.217049 env[1632]: time="2023-10-02T19:09:17.216862472Z" level=info msg="StopPodSandbox for \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\" returns successfully" Oct 2 19:09:17.218025 env[1632]: time="2023-10-02T19:09:17.217993632Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ms28b,Uid:cff47e73-ed2e-4160-ad38-dacd3bd5bc49,Namespace:calico-system,Attempt:1,}" Oct 2 19:09:17.375000 audit[4710]: NETFILTER_CFG table=filter:121 family=2 entries=6 op=nft_register_rule pid=4710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:17.375000 audit[4710]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc49c03b60 a2=0 a3=7ffc49c03b4c items=0 ppid=3013 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:17.375000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:17.386000 audit[4710]: NETFILTER_CFG table=nat:122 family=2 entries=60 op=nft_register_rule pid=4710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:17.386000 audit[4710]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffc49c03b60 a2=0 a3=7ffc49c03b4c items=0 ppid=3013 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:17.386000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:17.420798 systemd-networkd[1443]: calibff1f4bc3bd: Gained IPv6LL Oct 2 19:09:17.579618 systemd-networkd[1443]: cali50e8ba27932: Link UP Oct 2 19:09:17.579627 systemd-networkd[1443]: cali50e8ba27932: Gained carrier Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.345 [INFO][4665] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0 calico-kube-controllers-69d9c784fb- calico-system dd35c0b4-d11f-4953-830e-f95471013fde 753 0 2023-10-02 19:08:43 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:69d9c784fb projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-17-113 calico-kube-controllers-69d9c784fb-bmkbn eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali50e8ba27932 [] []}} ContainerID="1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bmkbn" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-" Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.346 [INFO][4665] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bmkbn" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.506 [INFO][4714] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" HandleID="k8s-pod-network.1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" Workload="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.526 [INFO][4714] ipam_plugin.go 269: Auto assigning IP ContainerID="1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" HandleID="k8s-pod-network.1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" Workload="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004d600), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-17-113", "pod":"calico-kube-controllers-69d9c784fb-bmkbn", "timestamp":"2023-10-02 19:09:17.506406918 +0000 UTC"}, Hostname:"ip-172-31-17-113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:09:17.600690 env[1632]: time="2023-10-02T19:09:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:17.600690 env[1632]: time="2023-10-02T19:09:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.527 [INFO][4714] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-17-113' Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.531 [INFO][4714] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" host="ip-172-31-17-113" Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.537 [INFO][4714] ipam.go 372: Looking up existing affinities for host host="ip-172-31-17-113" Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.545 [INFO][4714] ipam.go 489: Trying affinity for 192.168.58.128/26 host="ip-172-31-17-113" Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.549 [INFO][4714] ipam.go 155: Attempting to load block cidr=192.168.58.128/26 host="ip-172-31-17-113" Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.552 [INFO][4714] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.58.128/26 host="ip-172-31-17-113" Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.552 [INFO][4714] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.58.128/26 handle="k8s-pod-network.1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" host="ip-172-31-17-113" Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.554 [INFO][4714] ipam.go 1682: Creating new handle: k8s-pod-network.1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.559 [INFO][4714] ipam.go 1203: Writing block in order to claim IPs block=192.168.58.128/26 handle="k8s-pod-network.1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" host="ip-172-31-17-113" Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.569 [INFO][4714] ipam.go 1216: Successfully claimed IPs: [192.168.58.131/26] block=192.168.58.128/26 handle="k8s-pod-network.1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" host="ip-172-31-17-113" Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.569 [INFO][4714] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.58.131/26] handle="k8s-pod-network.1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" host="ip-172-31-17-113" Oct 2 19:09:17.600690 env[1632]: time="2023-10-02T19:09:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:17.600690 env[1632]: 2023-10-02 19:09:17.569 [INFO][4714] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.58.131/26] IPv6=[] ContainerID="1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" HandleID="k8s-pod-network.1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" Workload="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:09:17.601330 env[1632]: 2023-10-02 19:09:17.572 [INFO][4665] k8s.go 383: Populated endpoint ContainerID="1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bmkbn" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0", GenerateName:"calico-kube-controllers-69d9c784fb-", Namespace:"calico-system", SelfLink:"", UID:"dd35c0b4-d11f-4953-830e-f95471013fde", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69d9c784fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"", Pod:"calico-kube-controllers-69d9c784fb-bmkbn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.58.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali50e8ba27932", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:17.601330 env[1632]: 2023-10-02 19:09:17.572 [INFO][4665] k8s.go 384: Calico CNI using IPs: [192.168.58.131/32] ContainerID="1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bmkbn" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:09:17.601330 env[1632]: 2023-10-02 19:09:17.572 [INFO][4665] dataplane_linux.go 68: Setting the host side veth name to cali50e8ba27932 ContainerID="1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bmkbn" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:09:17.601330 env[1632]: 2023-10-02 19:09:17.574 [INFO][4665] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bmkbn" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:09:17.601330 env[1632]: 2023-10-02 19:09:17.579 [INFO][4665] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bmkbn" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0", GenerateName:"calico-kube-controllers-69d9c784fb-", Namespace:"calico-system", SelfLink:"", UID:"dd35c0b4-d11f-4953-830e-f95471013fde", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69d9c784fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db", Pod:"calico-kube-controllers-69d9c784fb-bmkbn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.58.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali50e8ba27932", MAC:"e2:9b:6a:06:6e:50", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:17.601330 env[1632]: 2023-10-02 19:09:17.597 [INFO][4665] k8s.go 489: Wrote updated endpoint to datastore ContainerID="1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-bmkbn" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:09:17.627424 env[1632]: time="2023-10-02T19:09:17.627068814Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:17.627424 env[1632]: time="2023-10-02T19:09:17.627124755Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:17.627424 env[1632]: time="2023-10-02T19:09:17.627139568Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:17.627424 env[1632]: time="2023-10-02T19:09:17.627363130Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db pid=4743 runtime=io.containerd.runc.v2 Oct 2 19:09:17.643762 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali11a9cf841f1: link becomes ready Oct 2 19:09:17.657301 systemd-networkd[1443]: cali11a9cf841f1: Link UP Oct 2 19:09:17.657311 systemd-networkd[1443]: cali11a9cf841f1: Gained carrier Oct 2 19:09:17.679756 systemd[1]: Started cri-containerd-1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db.scope. Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.392 [INFO][4681] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0 csi-node-driver- calico-system cff47e73-ed2e-4160-ad38-dacd3bd5bc49 752 0 2023-10-02 19:09:02 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:fd56fb8dc k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-17-113 csi-node-driver-ms28b eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali11a9cf841f1 [] []}} ContainerID="9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" Namespace="calico-system" Pod="csi-node-driver-ms28b" WorkloadEndpoint="ip--172--31--17--113-k8s-csi--node--driver--ms28b-" Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.392 [INFO][4681] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" Namespace="calico-system" Pod="csi-node-driver-ms28b" WorkloadEndpoint="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.548 [INFO][4720] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" HandleID="k8s-pod-network.9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" Workload="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.563 [INFO][4720] ipam_plugin.go 269: Auto assigning IP ContainerID="9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" HandleID="k8s-pod-network.9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" Workload="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010bbd0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-17-113", "pod":"csi-node-driver-ms28b", "timestamp":"2023-10-02 19:09:17.548038109 +0000 UTC"}, Hostname:"ip-172-31-17-113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:09:17.683620 env[1632]: time="2023-10-02T19:09:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:17.683620 env[1632]: time="2023-10-02T19:09:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.569 [INFO][4720] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-17-113' Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.572 [INFO][4720] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" host="ip-172-31-17-113" Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.585 [INFO][4720] ipam.go 372: Looking up existing affinities for host host="ip-172-31-17-113" Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.602 [INFO][4720] ipam.go 489: Trying affinity for 192.168.58.128/26 host="ip-172-31-17-113" Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.604 [INFO][4720] ipam.go 155: Attempting to load block cidr=192.168.58.128/26 host="ip-172-31-17-113" Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.608 [INFO][4720] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.58.128/26 host="ip-172-31-17-113" Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.608 [INFO][4720] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.58.128/26 handle="k8s-pod-network.9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" host="ip-172-31-17-113" Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.610 [INFO][4720] ipam.go 1682: Creating new handle: k8s-pod-network.9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2 Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.618 [INFO][4720] ipam.go 1203: Writing block in order to claim IPs block=192.168.58.128/26 handle="k8s-pod-network.9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" host="ip-172-31-17-113" Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.632 [INFO][4720] ipam.go 1216: Successfully claimed IPs: [192.168.58.132/26] block=192.168.58.128/26 handle="k8s-pod-network.9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" host="ip-172-31-17-113" Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.632 [INFO][4720] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.58.132/26] handle="k8s-pod-network.9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" host="ip-172-31-17-113" Oct 2 19:09:17.683620 env[1632]: time="2023-10-02T19:09:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:17.683620 env[1632]: 2023-10-02 19:09:17.632 [INFO][4720] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.58.132/26] IPv6=[] ContainerID="9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" HandleID="k8s-pod-network.9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" Workload="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:09:17.684571 env[1632]: 2023-10-02 19:09:17.636 [INFO][4681] k8s.go 383: Populated endpoint ContainerID="9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" Namespace="calico-system" Pod="csi-node-driver-ms28b" WorkloadEndpoint="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cff47e73-ed2e-4160-ad38-dacd3bd5bc49", ResourceVersion:"752", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"", Pod:"csi-node-driver-ms28b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.58.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali11a9cf841f1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:17.684571 env[1632]: 2023-10-02 19:09:17.636 [INFO][4681] k8s.go 384: Calico CNI using IPs: [192.168.58.132/32] ContainerID="9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" Namespace="calico-system" Pod="csi-node-driver-ms28b" WorkloadEndpoint="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:09:17.684571 env[1632]: 2023-10-02 19:09:17.637 [INFO][4681] dataplane_linux.go 68: Setting the host side veth name to cali11a9cf841f1 ContainerID="9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" Namespace="calico-system" Pod="csi-node-driver-ms28b" WorkloadEndpoint="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:09:17.684571 env[1632]: 2023-10-02 19:09:17.643 [INFO][4681] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" Namespace="calico-system" Pod="csi-node-driver-ms28b" WorkloadEndpoint="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:09:17.684571 env[1632]: 2023-10-02 19:09:17.658 [INFO][4681] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" Namespace="calico-system" Pod="csi-node-driver-ms28b" WorkloadEndpoint="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cff47e73-ed2e-4160-ad38-dacd3bd5bc49", ResourceVersion:"752", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2", Pod:"csi-node-driver-ms28b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.58.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali11a9cf841f1", MAC:"ca:61:a9:c3:72:bb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:17.684571 env[1632]: 2023-10-02 19:09:17.679 [INFO][4681] k8s.go 489: Wrote updated endpoint to datastore ContainerID="9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2" Namespace="calico-system" Pod="csi-node-driver-ms28b" WorkloadEndpoint="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:09:17.705547 env[1632]: time="2023-10-02T19:09:17.705464262Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:17.705801 env[1632]: time="2023-10-02T19:09:17.705769242Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:17.705927 env[1632]: time="2023-10-02T19:09:17.705902481Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:17.706542 env[1632]: time="2023-10-02T19:09:17.706483997Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2 pid=4780 runtime=io.containerd.runc.v2 Oct 2 19:09:17.728491 systemd[1]: Started cri-containerd-9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2.scope. Oct 2 19:09:17.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.765000 audit: BPF prog-id=168 op=LOAD Oct 2 19:09:17.766000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.766000 audit[4751]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4743 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:17.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166633739626165633232626164666663333833343839616365333736 Oct 2 19:09:17.766000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.766000 audit[4751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4743 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:17.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166633739626165633232626164666663333833343839616365333736 Oct 2 19:09:17.767000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.767000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.767000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.767000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.767000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.767000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.767000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.767000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.767000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.767000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.767000 audit: BPF prog-id=169 op=LOAD Oct 2 19:09:17.767000 audit[4751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003dc6f0 items=0 ppid=4743 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:17.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166633739626165633232626164666663333833343839616365333736 Oct 2 19:09:17.768000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.768000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.768000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.768000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.768000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.768000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.768000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.768000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.768000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.768000 audit: BPF prog-id=170 op=LOAD Oct 2 19:09:17.768000 audit[4751]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003dc738 items=0 ppid=4743 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:17.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166633739626165633232626164666663333833343839616365333736 Oct 2 19:09:17.768000 audit: BPF prog-id=170 op=UNLOAD Oct 2 19:09:17.768000 audit: BPF prog-id=169 op=UNLOAD Oct 2 19:09:17.769000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.769000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.769000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.769000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.769000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.769000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.769000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.769000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.769000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.769000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.769000 audit: BPF prog-id=171 op=LOAD Oct 2 19:09:17.769000 audit[4751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dcb48 items=0 ppid=4743 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:17.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166633739626165633232626164666663333833343839616365333736 Oct 2 19:09:17.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.777000 audit: BPF prog-id=172 op=LOAD Oct 2 19:09:17.778000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.778000 audit[4792]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4780 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:17.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353039343663306561373064643866643763666435356638646531 Oct 2 19:09:17.778000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.778000 audit[4792]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4780 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:17.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353039343663306561373064643866643763666435356638646531 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit: BPF prog-id=173 op=LOAD Oct 2 19:09:17.779000 audit[4792]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003184a0 items=0 ppid=4780 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:17.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353039343663306561373064643866643763666435356638646531 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.779000 audit: BPF prog-id=174 op=LOAD Oct 2 19:09:17.779000 audit[4792]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003184e8 items=0 ppid=4780 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:17.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353039343663306561373064643866643763666435356638646531 Oct 2 19:09:17.780000 audit: BPF prog-id=174 op=UNLOAD Oct 2 19:09:17.780000 audit: BPF prog-id=173 op=UNLOAD Oct 2 19:09:17.780000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.780000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.780000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.780000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.780000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.780000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.780000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.780000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.780000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.780000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:17.780000 audit: BPF prog-id=175 op=LOAD Oct 2 19:09:17.780000 audit[4792]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003188f8 items=0 ppid=4780 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:17.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933353039343663306561373064643866643763666435356638646531 Oct 2 19:09:17.793000 audit[4819]: NETFILTER_CFG table=filter:123 family=2 entries=44 op=nft_register_chain pid=4819 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:17.793000 audit[4819]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7ffeabec1740 a2=0 a3=7ffeabec172c items=0 ppid=4018 pid=4819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:17.793000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:17.808556 env[1632]: time="2023-10-02T19:09:17.808510315Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ms28b,Uid:cff47e73-ed2e-4160-ad38-dacd3bd5bc49,Namespace:calico-system,Attempt:1,} returns sandbox id \"9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2\"" Oct 2 19:09:17.810628 env[1632]: time="2023-10-02T19:09:17.810596913Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:09:17.869406 env[1632]: time="2023-10-02T19:09:17.869359355Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69d9c784fb-bmkbn,Uid:dd35c0b4-d11f-4953-830e-f95471013fde,Namespace:calico-system,Attempt:1,} returns sandbox id \"1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db\"" Oct 2 19:09:17.885000 audit[4839]: NETFILTER_CFG table=filter:124 family=2 entries=42 op=nft_register_chain pid=4839 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:17.885000 audit[4839]: SYSCALL arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7ffd81f75f50 a2=0 a3=7ffd81f75f3c items=0 ppid=4018 pid=4839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:17.885000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:18.022870 env[1632]: time="2023-10-02T19:09:18.022801712Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:18.024033 env[1632]: time="2023-10-02T19:09:18.023987318Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:18.026436 kubelet[2846]: E1002 19:09:18.026400 2846 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:09:18.026933 kubelet[2846]: E1002 19:09:18.026457 2846 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:09:18.026933 kubelet[2846]: E1002 19:09:18.026745 2846 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-hxbld,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-ms28b_calico-system(cff47e73-ed2e-4160-ad38-dacd3bd5bc49): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:18.027446 env[1632]: time="2023-10-02T19:09:18.027412827Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:09:18.430000 audit[4865]: NETFILTER_CFG table=filter:125 family=2 entries=6 op=nft_register_rule pid=4865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:18.430000 audit[4865]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff853d0ab0 a2=0 a3=7fff853d0a9c items=0 ppid=3013 pid=4865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:18.430000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:18.452000 audit[4865]: NETFILTER_CFG table=nat:126 family=2 entries=72 op=nft_register_chain pid=4865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:18.452000 audit[4865]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff853d0ab0 a2=0 a3=7fff853d0a9c items=0 ppid=3013 pid=4865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:18.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:18.626178 systemd-networkd[1443]: cali50e8ba27932: Gained IPv6LL Oct 2 19:09:19.585858 systemd-networkd[1443]: cali11a9cf841f1: Gained IPv6LL Oct 2 19:09:21.339018 env[1632]: time="2023-10-02T19:09:21.338883955Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:21.348038 env[1632]: time="2023-10-02T19:09:21.347977903Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:21.358407 env[1632]: time="2023-10-02T19:09:21.358362350Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:21.360996 env[1632]: time="2023-10-02T19:09:21.360951841Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:21.362418 env[1632]: time="2023-10-02T19:09:21.362375518Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 19:09:21.366685 env[1632]: time="2023-10-02T19:09:21.364732840Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:09:21.369596 env[1632]: time="2023-10-02T19:09:21.369550592Z" level=info msg="CreateContainer within sandbox \"1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:09:21.389406 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2755286310.mount: Deactivated successfully. Oct 2 19:09:21.399060 env[1632]: time="2023-10-02T19:09:21.398972574Z" level=info msg="CreateContainer within sandbox \"1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1\"" Oct 2 19:09:21.402419 env[1632]: time="2023-10-02T19:09:21.401496094Z" level=info msg="StartContainer for \"9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1\"" Oct 2 19:09:21.452938 systemd[1]: Started cri-containerd-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1.scope. Oct 2 19:09:21.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.495004 kernel: kauditd_printk_skb: 251 callbacks suppressed Oct 2 19:09:21.495358 kernel: audit: type=1400 audit(1696273761.481:1347): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.495435 kernel: audit: type=1400 audit(1696273761.481:1348): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.508226 kernel: audit: type=1400 audit(1696273761.481:1349): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.508389 kernel: audit: type=1400 audit(1696273761.481:1350): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.508748 kernel: audit: type=1400 audit(1696273761.481:1351): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.518227 kernel: audit: type=1400 audit(1696273761.481:1352): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.534680 kernel: audit: type=1400 audit(1696273761.481:1353): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.545803 kernel: audit: type=1400 audit(1696273761.481:1354): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.545937 kernel: audit: type=1400 audit(1696273761.481:1355): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.551196 kernel: audit: type=1400 audit(1696273761.481:1356): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.481000 audit: BPF prog-id=176 op=LOAD Oct 2 19:09:21.482000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.482000 audit[4879]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4743 pid=4879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:21.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962613934326639336536666266646338633730313762353132303032 Oct 2 19:09:21.482000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.482000 audit[4879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4743 pid=4879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:21.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962613934326639336536666266646338633730313762353132303032 Oct 2 19:09:21.482000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.482000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.482000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.482000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.482000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.482000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.482000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.482000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.482000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.482000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.482000 audit: BPF prog-id=177 op=LOAD Oct 2 19:09:21.482000 audit[4879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00037c290 items=0 ppid=4743 pid=4879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:21.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962613934326639336536666266646338633730313762353132303032 Oct 2 19:09:21.483000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.483000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.483000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.483000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.483000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.483000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.483000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.483000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.483000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.483000 audit: BPF prog-id=178 op=LOAD Oct 2 19:09:21.483000 audit[4879]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00037c2d8 items=0 ppid=4743 pid=4879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:21.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962613934326639336536666266646338633730313762353132303032 Oct 2 19:09:21.493000 audit: BPF prog-id=178 op=UNLOAD Oct 2 19:09:21.493000 audit: BPF prog-id=177 op=UNLOAD Oct 2 19:09:21.493000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.493000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.493000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.493000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.493000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.493000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.493000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.493000 audit[4879]: AVC avc: denied { perfmon } for pid=4879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.493000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.493000 audit[4879]: AVC avc: denied { bpf } for pid=4879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:21.493000 audit: BPF prog-id=179 op=LOAD Oct 2 19:09:21.493000 audit[4879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00037c6e8 items=0 ppid=4743 pid=4879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:21.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962613934326639336536666266646338633730313762353132303032 Oct 2 19:09:21.559519 env[1632]: time="2023-10-02T19:09:21.559465391Z" level=info msg="StartContainer for \"9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1\" returns successfully" Oct 2 19:09:21.700366 env[1632]: time="2023-10-02T19:09:21.700111262Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:21.704677 env[1632]: time="2023-10-02T19:09:21.704589265Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:21.706856 kubelet[2846]: E1002 19:09:21.705702 2846 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:21.706856 kubelet[2846]: E1002 19:09:21.706114 2846 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:21.706856 kubelet[2846]: E1002 19:09:21.706389 2846 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-hxbld,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-ms28b_calico-system(cff47e73-ed2e-4160-ad38-dacd3bd5bc49): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:21.706856 kubelet[2846]: E1002 19:09:21.706565 2846 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-ms28b" podUID=cff47e73-ed2e-4160-ad38-dacd3bd5bc49 Oct 2 19:09:22.125712 kubelet[2846]: E1002 19:09:22.125689 2846 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-ms28b" podUID=cff47e73-ed2e-4160-ad38-dacd3bd5bc49 Oct 2 19:09:22.383808 systemd[1]: run-containerd-runc-k8s.io-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1-runc.pQ3D8z.mount: Deactivated successfully. Oct 2 19:09:23.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.17.113:22-139.178.89.65:39048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:23.436894 systemd[1]: Started sshd@8-172.31.17.113:22-139.178.89.65:39048.service. Oct 2 19:09:23.626000 audit[4962]: USER_ACCT pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:23.628167 sshd[4962]: Accepted publickey for core from 139.178.89.65 port 39048 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:23.627000 audit[4962]: CRED_ACQ pid=4962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:23.628000 audit[4962]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc60bd9510 a2=3 a3=0 items=0 ppid=1 pid=4962 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:23.628000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:23.630864 sshd[4962]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:23.640151 systemd[1]: Started session-9.scope. Oct 2 19:09:23.642276 systemd-logind[1616]: New session 9 of user core. Oct 2 19:09:23.655000 audit[4962]: USER_START pid=4962 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:23.658000 audit[4970]: CRED_ACQ pid=4970 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:23.683483 systemd[1]: run-containerd-runc-k8s.io-7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4-runc.RvCcXM.mount: Deactivated successfully. Oct 2 19:09:24.017337 sshd[4962]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:24.017000 audit[4962]: USER_END pid=4962 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:24.017000 audit[4962]: CRED_DISP pid=4962 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:24.021917 systemd-logind[1616]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:09:24.022150 systemd[1]: sshd@8-172.31.17.113:22-139.178.89.65:39048.service: Deactivated successfully. Oct 2 19:09:24.024088 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:09:24.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.17.113:22-139.178.89.65:39048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:24.026077 systemd-logind[1616]: Removed session 9. Oct 2 19:09:33.701935 systemd[1]: run-containerd-runc-k8s.io-7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4-runc.CYY2w8.mount: Deactivated successfully. Oct 2 19:09:34.057954 systemd[1]: Started sshd@9-172.31.17.113:22-139.178.89.65:35470.service. Oct 2 19:09:34.073411 kernel: kauditd_printk_skb: 58 callbacks suppressed Oct 2 19:09:34.074128 kernel: audit: type=1130 audit(1696273774.056:1374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.17.113:22-139.178.89.65:35470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:34.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.17.113:22-139.178.89.65:35470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:34.251000 audit[5069]: USER_ACCT pid=5069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:34.253810 sshd[5069]: Accepted publickey for core from 139.178.89.65 port 35470 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:34.259673 kernel: audit: type=1101 audit(1696273774.251:1375): pid=5069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:34.259000 audit[5069]: CRED_ACQ pid=5069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:34.261490 sshd[5069]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:34.270175 kernel: audit: type=1103 audit(1696273774.259:1376): pid=5069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:34.270276 kernel: audit: type=1006 audit(1696273774.259:1377): pid=5069 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 19:09:34.270318 kernel: audit: type=1300 audit(1696273774.259:1377): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd18aa2a40 a2=3 a3=0 items=0 ppid=1 pid=5069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.259000 audit[5069]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd18aa2a40 a2=3 a3=0 items=0 ppid=1 pid=5069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.272144 systemd[1]: Started session-10.scope. Oct 2 19:09:34.273075 systemd-logind[1616]: New session 10 of user core. Oct 2 19:09:34.259000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:34.279688 kernel: audit: type=1327 audit(1696273774.259:1377): proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:34.279000 audit[5069]: USER_START pid=5069 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:34.292679 kernel: audit: type=1105 audit(1696273774.279:1378): pid=5069 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:34.292921 kernel: audit: type=1103 audit(1696273774.279:1379): pid=5071 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:34.279000 audit[5071]: CRED_ACQ pid=5071 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:34.485479 sshd[5069]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:34.487000 audit[5069]: USER_END pid=5069 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:34.491000 audit[5069]: CRED_DISP pid=5069 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:34.499367 systemd[1]: sshd@9-172.31.17.113:22-139.178.89.65:35470.service: Deactivated successfully. Oct 2 19:09:34.500453 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:09:34.502158 systemd-logind[1616]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:09:34.503603 kernel: audit: type=1106 audit(1696273774.487:1380): pid=5069 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:34.503928 kernel: audit: type=1104 audit(1696273774.491:1381): pid=5069 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:34.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.17.113:22-139.178.89.65:35470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:34.508823 systemd-logind[1616]: Removed session 10. Oct 2 19:09:34.511359 systemd[1]: Started sshd@10-172.31.17.113:22-139.178.89.65:35472.service. Oct 2 19:09:34.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.17.113:22-139.178.89.65:35472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:34.682000 audit[5082]: USER_ACCT pid=5082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:34.684611 sshd[5082]: Accepted publickey for core from 139.178.89.65 port 35472 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:34.684000 audit[5082]: CRED_ACQ pid=5082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:34.684000 audit[5082]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb2e4cfe0 a2=3 a3=0 items=0 ppid=1 pid=5082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:34.684000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:34.686490 sshd[5082]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:34.694114 systemd-logind[1616]: New session 11 of user core. Oct 2 19:09:34.694800 systemd[1]: Started session-11.scope. Oct 2 19:09:34.701000 audit[5082]: USER_START pid=5082 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:34.703000 audit[5084]: CRED_ACQ pid=5084 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:36.461762 sshd[5082]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:36.465000 audit[5082]: USER_END pid=5082 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:36.465000 audit[5082]: CRED_DISP pid=5082 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:36.474723 systemd[1]: sshd@10-172.31.17.113:22-139.178.89.65:35472.service: Deactivated successfully. Oct 2 19:09:36.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.17.113:22-139.178.89.65:35472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:36.477212 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:09:36.478433 systemd-logind[1616]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:09:36.479847 systemd-logind[1616]: Removed session 11. Oct 2 19:09:36.494214 systemd[1]: Started sshd@11-172.31.17.113:22-139.178.89.65:55614.service. Oct 2 19:09:36.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.17.113:22-139.178.89.65:55614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:36.695000 audit[5092]: USER_ACCT pid=5092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:36.697429 sshd[5092]: Accepted publickey for core from 139.178.89.65 port 55614 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:36.697000 audit[5092]: CRED_ACQ pid=5092 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:36.697000 audit[5092]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe23e4cd40 a2=3 a3=0 items=0 ppid=1 pid=5092 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:36.697000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:36.698431 sshd[5092]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:36.706001 systemd[1]: Started session-12.scope. Oct 2 19:09:36.706526 systemd-logind[1616]: New session 12 of user core. Oct 2 19:09:36.713000 audit[5092]: USER_START pid=5092 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:36.715000 audit[5094]: CRED_ACQ pid=5094 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:36.821260 env[1632]: time="2023-10-02T19:09:36.820749101Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:09:37.020287 sshd[5092]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:37.021000 audit[5092]: USER_END pid=5092 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:37.021000 audit[5092]: CRED_DISP pid=5092 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:37.024434 systemd[1]: sshd@11-172.31.17.113:22-139.178.89.65:55614.service: Deactivated successfully. Oct 2 19:09:37.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.17.113:22-139.178.89.65:55614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:37.025619 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:09:37.027005 systemd-logind[1616]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:09:37.028302 systemd-logind[1616]: Removed session 12. Oct 2 19:09:37.030272 env[1632]: time="2023-10-02T19:09:37.030033311Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:37.031409 env[1632]: time="2023-10-02T19:09:37.031288314Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:37.031688 kubelet[2846]: E1002 19:09:37.031626 2846 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:09:37.032101 kubelet[2846]: E1002 19:09:37.031711 2846 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:09:37.032101 kubelet[2846]: E1002 19:09:37.031857 2846 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-hxbld,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-ms28b_calico-system(cff47e73-ed2e-4160-ad38-dacd3bd5bc49): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:37.034946 env[1632]: time="2023-10-02T19:09:37.034670737Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:09:37.236671 env[1632]: time="2023-10-02T19:09:37.236566430Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:37.237975 env[1632]: time="2023-10-02T19:09:37.237926601Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:37.238377 kubelet[2846]: E1002 19:09:37.238341 2846 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:37.238486 kubelet[2846]: E1002 19:09:37.238402 2846 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:37.238941 kubelet[2846]: E1002 19:09:37.238919 2846 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-hxbld,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-ms28b_calico-system(cff47e73-ed2e-4160-ad38-dacd3bd5bc49): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:37.239187 kubelet[2846]: E1002 19:09:37.239000 2846 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-ms28b" podUID=cff47e73-ed2e-4160-ad38-dacd3bd5bc49 Oct 2 19:09:43.672734 systemd[1]: run-containerd-runc-k8s.io-7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4-runc.Uuwon5.mount: Deactivated successfully. Oct 2 19:09:47.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.17.113:22-139.178.89.65:36374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:47.048198 systemd[1]: Started sshd@12-172.31.17.113:22-139.178.89.65:36374.service. Oct 2 19:09:47.049764 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:09:47.049873 kernel: audit: type=1130 audit(1696273787.047:1401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.17.113:22-139.178.89.65:36374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:47.230000 audit[5179]: USER_ACCT pid=5179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:47.239367 sshd[5179]: Accepted publickey for core from 139.178.89.65 port 36374 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:47.239826 kernel: audit: type=1101 audit(1696273787.230:1402): pid=5179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:47.242810 sshd[5179]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:47.239000 audit[5179]: CRED_ACQ pid=5179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:47.254450 kernel: audit: type=1103 audit(1696273787.239:1403): pid=5179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:47.254571 kernel: audit: type=1006 audit(1696273787.240:1404): pid=5179 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 2 19:09:47.250280 systemd[1]: Started session-13.scope. Oct 2 19:09:47.252923 systemd-logind[1616]: New session 13 of user core. Oct 2 19:09:47.240000 audit[5179]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd559b9830 a2=3 a3=0 items=0 ppid=1 pid=5179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:47.240000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:47.273983 kernel: audit: type=1300 audit(1696273787.240:1404): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd559b9830 a2=3 a3=0 items=0 ppid=1 pid=5179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:47.274091 kernel: audit: type=1327 audit(1696273787.240:1404): proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:47.274132 kernel: audit: type=1105 audit(1696273787.271:1405): pid=5179 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:47.271000 audit[5179]: USER_START pid=5179 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:47.274000 audit[5181]: CRED_ACQ pid=5181 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:47.286608 kernel: audit: type=1103 audit(1696273787.274:1406): pid=5181 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:47.496140 sshd[5179]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:47.497000 audit[5179]: USER_END pid=5179 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:47.501221 systemd[1]: sshd@12-172.31.17.113:22-139.178.89.65:36374.service: Deactivated successfully. Oct 2 19:09:47.503975 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:09:47.507098 systemd-logind[1616]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:09:47.509275 kernel: audit: type=1106 audit(1696273787.497:1407): pid=5179 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:47.510464 kernel: audit: type=1104 audit(1696273787.497:1408): pid=5179 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:47.497000 audit[5179]: CRED_DISP pid=5179 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:47.509740 systemd-logind[1616]: Removed session 13. Oct 2 19:09:47.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.17.113:22-139.178.89.65:36374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:48.820084 kubelet[2846]: E1002 19:09:48.820055 2846 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-ms28b" podUID=cff47e73-ed2e-4160-ad38-dacd3bd5bc49 Oct 2 19:09:52.534780 systemd[1]: run-containerd-runc-k8s.io-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1-runc.EBeyLD.mount: Deactivated successfully. Oct 2 19:09:52.615089 systemd[1]: run-containerd-runc-k8s.io-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1-runc.u7mNAQ.mount: Deactivated successfully. Oct 2 19:09:53.006939 kubelet[2846]: I1002 19:09:53.006907 2846 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:09:53.016744 systemd[1]: Created slice kubepods-besteffort-podb3148ab2_b339_4838_af2b_9b1a504b7544.slice. Oct 2 19:09:53.142100 kubelet[2846]: I1002 19:09:53.142061 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b3148ab2-b339-4838-af2b-9b1a504b7544-calico-apiserver-certs\") pod \"calico-apiserver-75b9cbccd6-5sch6\" (UID: \"b3148ab2-b339-4838-af2b-9b1a504b7544\") " pod="calico-apiserver/calico-apiserver-75b9cbccd6-5sch6" Oct 2 19:09:53.142296 kubelet[2846]: I1002 19:09:53.142141 2846 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pwnzg\" (UniqueName: \"kubernetes.io/projected/b3148ab2-b339-4838-af2b-9b1a504b7544-kube-api-access-pwnzg\") pod \"calico-apiserver-75b9cbccd6-5sch6\" (UID: \"b3148ab2-b339-4838-af2b-9b1a504b7544\") " pod="calico-apiserver/calico-apiserver-75b9cbccd6-5sch6" Oct 2 19:09:53.188725 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:09:53.188886 kernel: audit: type=1325 audit(1696273793.182:1410): table=filter:127 family=2 entries=7 op=nft_register_rule pid=5259 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:53.182000 audit[5259]: NETFILTER_CFG table=filter:127 family=2 entries=7 op=nft_register_rule pid=5259 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:53.196581 kernel: audit: type=1300 audit(1696273793.182:1410): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc6fa74300 a2=0 a3=7ffc6fa742ec items=0 ppid=3013 pid=5259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:53.182000 audit[5259]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc6fa74300 a2=0 a3=7ffc6fa742ec items=0 ppid=3013 pid=5259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:53.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:53.202759 kernel: audit: type=1327 audit(1696273793.182:1410): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:53.203000 audit[5259]: NETFILTER_CFG table=nat:128 family=2 entries=78 op=nft_register_rule pid=5259 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:53.209794 kernel: audit: type=1325 audit(1696273793.203:1411): table=nat:128 family=2 entries=78 op=nft_register_rule pid=5259 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:53.203000 audit[5259]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc6fa74300 a2=0 a3=7ffc6fa742ec items=0 ppid=3013 pid=5259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:53.219866 kernel: audit: type=1300 audit(1696273793.203:1411): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc6fa74300 a2=0 a3=7ffc6fa742ec items=0 ppid=3013 pid=5259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:53.203000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:53.226673 kernel: audit: type=1327 audit(1696273793.203:1411): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:53.244611 kubelet[2846]: E1002 19:09:53.244578 2846 secret.go:192] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Oct 2 19:09:53.246633 kubelet[2846]: E1002 19:09:53.246603 2846 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/b3148ab2-b339-4838-af2b-9b1a504b7544-calico-apiserver-certs podName:b3148ab2-b339-4838-af2b-9b1a504b7544 nodeName:}" failed. No retries permitted until 2023-10-02 19:09:53.744908843 +0000 UTC m=+103.324625309 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/b3148ab2-b339-4838-af2b-9b1a504b7544-calico-apiserver-certs") pod "calico-apiserver-75b9cbccd6-5sch6" (UID: "b3148ab2-b339-4838-af2b-9b1a504b7544") : secret "calico-apiserver-certs" not found Oct 2 19:09:53.412000 audit[5286]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=5286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:53.417678 kernel: audit: type=1325 audit(1696273793.412:1412): table=filter:129 family=2 entries=8 op=nft_register_rule pid=5286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:53.412000 audit[5286]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffcffb69960 a2=0 a3=7ffcffb6994c items=0 ppid=3013 pid=5286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:53.425687 kernel: audit: type=1300 audit(1696273793.412:1412): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffcffb69960 a2=0 a3=7ffcffb6994c items=0 ppid=3013 pid=5286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:53.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:53.427000 audit[5286]: NETFILTER_CFG table=nat:130 family=2 entries=78 op=nft_register_rule pid=5286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:53.434667 kernel: audit: type=1327 audit(1696273793.412:1412): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:53.434807 kernel: audit: type=1325 audit(1696273793.427:1413): table=nat:130 family=2 entries=78 op=nft_register_rule pid=5286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:53.427000 audit[5286]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffcffb69960 a2=0 a3=7ffcffb6994c items=0 ppid=3013 pid=5286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:53.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:53.672143 systemd[1]: run-containerd-runc-k8s.io-7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4-runc.sinKnM.mount: Deactivated successfully. Oct 2 19:09:53.921765 env[1632]: time="2023-10-02T19:09:53.921676338Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75b9cbccd6-5sch6,Uid:b3148ab2-b339-4838-af2b-9b1a504b7544,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:09:54.137956 systemd-networkd[1443]: calicad23bbf32c: Link UP Oct 2 19:09:54.137967 systemd-networkd[1443]: calicad23bbf32c: Gained carrier Oct 2 19:09:54.148496 (udev-worker)[5329]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.006 [INFO][5310] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--17--113-k8s-calico--apiserver--75b9cbccd6--5sch6-eth0 calico-apiserver-75b9cbccd6- calico-apiserver b3148ab2-b339-4838-af2b-9b1a504b7544 1015 0 2023-10-02 19:09:52 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75b9cbccd6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-17-113 calico-apiserver-75b9cbccd6-5sch6 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calicad23bbf32c [] []}} ContainerID="cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-5sch6" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--apiserver--75b9cbccd6--5sch6-" Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.006 [INFO][5310] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-5sch6" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--apiserver--75b9cbccd6--5sch6-eth0" Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.045 [INFO][5322] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" HandleID="k8s-pod-network.cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" Workload="ip--172--31--17--113-k8s-calico--apiserver--75b9cbccd6--5sch6-eth0" Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.069 [INFO][5322] ipam_plugin.go 269: Auto assigning IP ContainerID="cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" HandleID="k8s-pod-network.cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" Workload="ip--172--31--17--113-k8s-calico--apiserver--75b9cbccd6--5sch6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000421fb0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-17-113", "pod":"calico-apiserver-75b9cbccd6-5sch6", "timestamp":"2023-10-02 19:09:54.045581849 +0000 UTC"}, Hostname:"ip-172-31-17-113", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:09:54.173593 env[1632]: time="2023-10-02T19:09:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:54.173593 env[1632]: time="2023-10-02T19:09:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.070 [INFO][5322] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-17-113' Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.074 [INFO][5322] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" host="ip-172-31-17-113" Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.082 [INFO][5322] ipam.go 372: Looking up existing affinities for host host="ip-172-31-17-113" Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.096 [INFO][5322] ipam.go 489: Trying affinity for 192.168.58.128/26 host="ip-172-31-17-113" Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.102 [INFO][5322] ipam.go 155: Attempting to load block cidr=192.168.58.128/26 host="ip-172-31-17-113" Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.109 [INFO][5322] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.58.128/26 host="ip-172-31-17-113" Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.109 [INFO][5322] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.58.128/26 handle="k8s-pod-network.cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" host="ip-172-31-17-113" Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.112 [INFO][5322] ipam.go 1682: Creating new handle: k8s-pod-network.cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.117 [INFO][5322] ipam.go 1203: Writing block in order to claim IPs block=192.168.58.128/26 handle="k8s-pod-network.cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" host="ip-172-31-17-113" Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.125 [INFO][5322] ipam.go 1216: Successfully claimed IPs: [192.168.58.133/26] block=192.168.58.128/26 handle="k8s-pod-network.cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" host="ip-172-31-17-113" Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.125 [INFO][5322] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.58.133/26] handle="k8s-pod-network.cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" host="ip-172-31-17-113" Oct 2 19:09:54.173593 env[1632]: time="2023-10-02T19:09:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:54.173593 env[1632]: 2023-10-02 19:09:54.126 [INFO][5322] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.58.133/26] IPv6=[] ContainerID="cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" HandleID="k8s-pod-network.cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" Workload="ip--172--31--17--113-k8s-calico--apiserver--75b9cbccd6--5sch6-eth0" Oct 2 19:09:54.175404 env[1632]: 2023-10-02 19:09:54.129 [INFO][5310] k8s.go 383: Populated endpoint ContainerID="cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-5sch6" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--apiserver--75b9cbccd6--5sch6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-calico--apiserver--75b9cbccd6--5sch6-eth0", GenerateName:"calico-apiserver-75b9cbccd6-", Namespace:"calico-apiserver", SelfLink:"", UID:"b3148ab2-b339-4838-af2b-9b1a504b7544", ResourceVersion:"1015", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75b9cbccd6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"", Pod:"calico-apiserver-75b9cbccd6-5sch6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.58.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicad23bbf32c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:54.175404 env[1632]: 2023-10-02 19:09:54.130 [INFO][5310] k8s.go 384: Calico CNI using IPs: [192.168.58.133/32] ContainerID="cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-5sch6" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--apiserver--75b9cbccd6--5sch6-eth0" Oct 2 19:09:54.175404 env[1632]: 2023-10-02 19:09:54.130 [INFO][5310] dataplane_linux.go 68: Setting the host side veth name to calicad23bbf32c ContainerID="cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-5sch6" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--apiserver--75b9cbccd6--5sch6-eth0" Oct 2 19:09:54.175404 env[1632]: 2023-10-02 19:09:54.131 [INFO][5310] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-5sch6" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--apiserver--75b9cbccd6--5sch6-eth0" Oct 2 19:09:54.175404 env[1632]: 2023-10-02 19:09:54.137 [INFO][5310] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-5sch6" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--apiserver--75b9cbccd6--5sch6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-calico--apiserver--75b9cbccd6--5sch6-eth0", GenerateName:"calico-apiserver-75b9cbccd6-", Namespace:"calico-apiserver", SelfLink:"", UID:"b3148ab2-b339-4838-af2b-9b1a504b7544", ResourceVersion:"1015", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75b9cbccd6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd", Pod:"calico-apiserver-75b9cbccd6-5sch6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.58.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicad23bbf32c", MAC:"32:eb:ba:3d:fa:5b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:54.175404 env[1632]: 2023-10-02 19:09:54.160 [INFO][5310] k8s.go 489: Wrote updated endpoint to datastore ContainerID="cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd" Namespace="calico-apiserver" Pod="calico-apiserver-75b9cbccd6-5sch6" WorkloadEndpoint="ip--172--31--17--113-k8s-calico--apiserver--75b9cbccd6--5sch6-eth0" Oct 2 19:09:54.207858 env[1632]: time="2023-10-02T19:09:54.207777400Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:54.207858 env[1632]: time="2023-10-02T19:09:54.207825054Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:54.207858 env[1632]: time="2023-10-02T19:09:54.207839781Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:54.208371 env[1632]: time="2023-10-02T19:09:54.208317667Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd pid=5354 runtime=io.containerd.runc.v2 Oct 2 19:09:54.232533 systemd[1]: Started cri-containerd-cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd.scope. Oct 2 19:09:54.264000 audit[5372]: NETFILTER_CFG table=filter:131 family=2 entries=59 op=nft_register_chain pid=5372 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:54.264000 audit[5372]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffda3ec9fd0 a2=0 a3=7ffda3ec9fbc items=0 ppid=4018 pid=5372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:54.264000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:54.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.281000 audit: BPF prog-id=180 op=LOAD Oct 2 19:09:54.282000 audit[5363]: AVC avc: denied { bpf } for pid=5363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.282000 audit[5363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5354 pid=5363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:54.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363353031313565653939636266356334323636326462303831343334 Oct 2 19:09:54.282000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.282000 audit[5363]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5354 pid=5363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:54.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363353031313565653939636266356334323636326462303831343334 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { bpf } for pid=5363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { bpf } for pid=5363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { bpf } for pid=5363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { bpf } for pid=5363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { bpf } for pid=5363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit: BPF prog-id=181 op=LOAD Oct 2 19:09:54.283000 audit[5363]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000290620 items=0 ppid=5354 pid=5363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:54.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363353031313565653939636266356334323636326462303831343334 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { bpf } for pid=5363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { bpf } for pid=5363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { bpf } for pid=5363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { bpf } for pid=5363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit: BPF prog-id=182 op=LOAD Oct 2 19:09:54.283000 audit[5363]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000290668 items=0 ppid=5354 pid=5363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:54.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363353031313565653939636266356334323636326462303831343334 Oct 2 19:09:54.283000 audit: BPF prog-id=182 op=UNLOAD Oct 2 19:09:54.283000 audit: BPF prog-id=181 op=UNLOAD Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { bpf } for pid=5363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { bpf } for pid=5363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { bpf } for pid=5363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { perfmon } for pid=5363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { bpf } for pid=5363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit[5363]: AVC avc: denied { bpf } for pid=5363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:54.283000 audit: BPF prog-id=183 op=LOAD Oct 2 19:09:54.283000 audit[5363]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000290a78 items=0 ppid=5354 pid=5363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:54.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363353031313565653939636266356334323636326462303831343334 Oct 2 19:09:54.331611 env[1632]: time="2023-10-02T19:09:54.331573166Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75b9cbccd6-5sch6,Uid:b3148ab2-b339-4838-af2b-9b1a504b7544,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"cc50115ee99cbf5c42662db08143464a789f524d444ebd8e3702335fd0d4f3dd\"" Oct 2 19:09:54.334251 env[1632]: time="2023-10-02T19:09:54.334199405Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:09:54.531694 env[1632]: time="2023-10-02T19:09:54.531620563Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:54.533217 env[1632]: time="2023-10-02T19:09:54.532964711Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:54.535064 kubelet[2846]: E1002 19:09:54.534426 2846 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:54.535064 kubelet[2846]: E1002 19:09:54.534476 2846 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:54.535064 kubelet[2846]: E1002 19:09:54.534622 2846 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-pwnzg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-75b9cbccd6-5sch6_calico-apiserver(b3148ab2-b339-4838-af2b-9b1a504b7544): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:54.535064 kubelet[2846]: E1002 19:09:54.534779 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75b9cbccd6-5sch6" podUID=b3148ab2-b339-4838-af2b-9b1a504b7544 Oct 2 19:09:55.242549 kubelet[2846]: E1002 19:09:55.242515 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75b9cbccd6-5sch6" podUID=b3148ab2-b339-4838-af2b-9b1a504b7544 Oct 2 19:09:55.341000 audit[5414]: NETFILTER_CFG table=filter:132 family=2 entries=8 op=nft_register_rule pid=5414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:55.341000 audit[5414]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc789bb670 a2=0 a3=7ffc789bb65c items=0 ppid=3013 pid=5414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:55.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:55.344000 audit[5414]: NETFILTER_CFG table=nat:133 family=2 entries=78 op=nft_register_rule pid=5414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:55.344000 audit[5414]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc789bb670 a2=0 a3=7ffc789bb65c items=0 ppid=3013 pid=5414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:55.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:55.493759 systemd-networkd[1443]: calicad23bbf32c: Gained IPv6LL Oct 2 19:09:56.243218 kubelet[2846]: E1002 19:09:56.243177 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75b9cbccd6-5sch6" podUID=b3148ab2-b339-4838-af2b-9b1a504b7544 Oct 2 19:09:57.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.17.113:22-139.178.89.65:41918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:57.531867 systemd[1]: Started sshd@13-172.31.17.113:22-139.178.89.65:41918.service. Oct 2 19:09:57.722000 audit[5420]: USER_ACCT pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:57.723527 sshd[5420]: Accepted publickey for core from 139.178.89.65 port 41918 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:57.724000 audit[5420]: CRED_ACQ pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:57.724000 audit[5420]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee68883b0 a2=3 a3=0 items=0 ppid=1 pid=5420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:57.724000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:57.726247 sshd[5420]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:57.734158 systemd[1]: Started session-14.scope. Oct 2 19:09:57.735257 systemd-logind[1616]: New session 14 of user core. Oct 2 19:09:57.742000 audit[5420]: USER_START pid=5420 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:57.744000 audit[5422]: CRED_ACQ pid=5422 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:57.957188 sshd[5420]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:57.958000 audit[5420]: USER_END pid=5420 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:57.958000 audit[5420]: CRED_DISP pid=5420 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:57.961481 systemd[1]: sshd@13-172.31.17.113:22-139.178.89.65:41918.service: Deactivated successfully. Oct 2 19:09:57.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.17.113:22-139.178.89.65:41918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:57.962583 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 19:09:57.963402 systemd-logind[1616]: Session 14 logged out. Waiting for processes to exit. Oct 2 19:09:57.964418 systemd-logind[1616]: Removed session 14. Oct 2 19:10:02.533065 systemd[1]: run-containerd-runc-k8s.io-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1-runc.DJVYQr.mount: Deactivated successfully. Oct 2 19:10:02.823222 env[1632]: time="2023-10-02T19:10:02.822692862Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:10:03.015421 env[1632]: time="2023-10-02T19:10:03.015354835Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:03.016756 env[1632]: time="2023-10-02T19:10:03.016702173Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:03.017074 kubelet[2846]: E1002 19:10:03.017043 2846 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:03.017462 kubelet[2846]: E1002 19:10:03.017088 2846 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:03.017462 kubelet[2846]: E1002 19:10:03.017217 2846 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-hxbld,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-ms28b_calico-system(cff47e73-ed2e-4160-ad38-dacd3bd5bc49): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:03.018616 env[1632]: time="2023-10-02T19:10:03.018581674Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:10:03.197947 env[1632]: time="2023-10-02T19:10:03.197786127Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:03.199172 env[1632]: time="2023-10-02T19:10:03.199094756Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:03.199401 kubelet[2846]: E1002 19:10:03.199376 2846 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:03.199524 kubelet[2846]: E1002 19:10:03.199434 2846 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:03.199578 kubelet[2846]: E1002 19:10:03.199547 2846 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-hxbld,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-ms28b_calico-system(cff47e73-ed2e-4160-ad38-dacd3bd5bc49): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:03.200096 kubelet[2846]: E1002 19:10:03.199637 2846 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-ms28b" podUID=cff47e73-ed2e-4160-ad38-dacd3bd5bc49 Oct 2 19:10:03.521148 systemd[1]: run-containerd-runc-k8s.io-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1-runc.xwjy1D.mount: Deactivated successfully. Oct 2 19:10:03.702796 systemd[1]: run-containerd-runc-k8s.io-7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4-runc.4cW9xJ.mount: Deactivated successfully. Oct 2 19:10:03.816000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:03.818947 kernel: kauditd_printk_skb: 79 callbacks suppressed Oct 2 19:10:03.819425 kernel: audit: type=1400 audit(1696273803.816:1444): avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:03.828151 kernel: audit: type=1300 audit(1696273803.816:1444): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c000e77380 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:10:03.816000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c000e77380 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:10:03.816000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:03.839669 kernel: audit: type=1327 audit(1696273803.816:1444): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:03.816000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:03.848024 kernel: audit: type=1400 audit(1696273803.816:1445): avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:03.816000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=12 a1=c000faf050 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:10:03.862029 kernel: audit: type=1300 audit(1696273803.816:1445): arch=c000003e syscall=254 success=no exit=-13 a0=12 a1=c000faf050 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:10:03.862170 kernel: audit: type=1327 audit(1696273803.816:1445): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:03.816000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:06.532000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:06.532000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00ccc3c50 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:10:06.560187 kernel: audit: type=1400 audit(1696273806.532:1446): avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:06.560363 kernel: audit: type=1300 audit(1696273806.532:1446): arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00ccc3c50 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:10:06.560403 kernel: audit: type=1327 audit(1696273806.532:1446): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:06.532000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:06.536000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:06.573618 kernel: audit: type=1400 audit(1696273806.536:1447): avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:06.536000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00ccc3cb0 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:10:06.536000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:06.548000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:06.548000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c002ba6f80 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:10:06.548000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:06.551000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:06.551000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00cc4f590 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:10:06.551000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:06.552000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:06.552000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00cc4f5f0 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:10:06.552000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:06.552000 audit[2502]: AVC avc: denied { watch } for pid=2502 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:06.552000 audit[2502]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c002ba70e0 a2=fc6 a3=0 items=0 ppid=2378 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c729 key=(null) Oct 2 19:10:06.552000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31372E313133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:07.818479 env[1632]: time="2023-10-02T19:10:07.818432373Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:10:07.986779 systemd[1]: Started sshd@14-172.31.17.113:22-139.178.89.65:45604.service. Oct 2 19:10:07.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.17.113:22-139.178.89.65:45604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:08.020492 env[1632]: time="2023-10-02T19:10:08.020323691Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:08.021782 env[1632]: time="2023-10-02T19:10:08.021679752Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:08.022008 kubelet[2846]: E1002 19:10:08.021994 2846 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:08.022343 kubelet[2846]: E1002 19:10:08.022333 2846 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:08.022488 kubelet[2846]: E1002 19:10:08.022479 2846 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-pwnzg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-75b9cbccd6-5sch6_calico-apiserver(b3148ab2-b339-4838-af2b-9b1a504b7544): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:08.022663 kubelet[2846]: E1002 19:10:08.022653 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75b9cbccd6-5sch6" podUID=b3148ab2-b339-4838-af2b-9b1a504b7544 Oct 2 19:10:08.171000 audit[5499]: USER_ACCT pid=5499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:08.172879 sshd[5499]: Accepted publickey for core from 139.178.89.65 port 45604 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:10:08.172000 audit[5499]: CRED_ACQ pid=5499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:08.173000 audit[5499]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9885bb70 a2=3 a3=0 items=0 ppid=1 pid=5499 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:08.173000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:08.174535 sshd[5499]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:10:08.180795 systemd[1]: Started session-15.scope. Oct 2 19:10:08.181436 systemd-logind[1616]: New session 15 of user core. Oct 2 19:10:08.187000 audit[5499]: USER_START pid=5499 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:08.189000 audit[5501]: CRED_ACQ pid=5501 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:08.430900 sshd[5499]: pam_unix(sshd:session): session closed for user core Oct 2 19:10:08.433000 audit[5499]: USER_END pid=5499 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:08.433000 audit[5499]: CRED_DISP pid=5499 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:08.435580 systemd[1]: sshd@14-172.31.17.113:22-139.178.89.65:45604.service: Deactivated successfully. Oct 2 19:10:08.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.17.113:22-139.178.89.65:45604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:08.436737 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 19:10:08.437585 systemd-logind[1616]: Session 15 logged out. Waiting for processes to exit. Oct 2 19:10:08.438827 systemd-logind[1616]: Removed session 15. Oct 2 19:10:10.591919 env[1632]: time="2023-10-02T19:10:10.591871422Z" level=info msg="StopPodSandbox for \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\"" Oct 2 19:10:10.701480 env[1632]: 2023-10-02 19:10:10.654 [WARNING][5525] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cff47e73-ed2e-4160-ad38-dacd3bd5bc49", ResourceVersion:"1058", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2", Pod:"csi-node-driver-ms28b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.58.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali11a9cf841f1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:10.701480 env[1632]: 2023-10-02 19:10:10.655 [INFO][5525] k8s.go 576: Cleaning up netns ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Oct 2 19:10:10.701480 env[1632]: 2023-10-02 19:10:10.655 [INFO][5525] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" iface="eth0" netns="" Oct 2 19:10:10.701480 env[1632]: 2023-10-02 19:10:10.655 [INFO][5525] k8s.go 583: Releasing IP address(es) ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Oct 2 19:10:10.701480 env[1632]: 2023-10-02 19:10:10.655 [INFO][5525] utils.go 196: Calico CNI releasing IP address ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Oct 2 19:10:10.701480 env[1632]: 2023-10-02 19:10:10.686 [INFO][5531] ipam_plugin.go 416: Releasing address using handleID ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" HandleID="k8s-pod-network.569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Workload="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:10:10.701480 env[1632]: time="2023-10-02T19:10:10Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:10.701480 env[1632]: time="2023-10-02T19:10:10Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:10.701480 env[1632]: 2023-10-02 19:10:10.695 [WARNING][5531] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" HandleID="k8s-pod-network.569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Workload="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:10:10.701480 env[1632]: 2023-10-02 19:10:10.695 [INFO][5531] ipam_plugin.go 444: Releasing address using workloadID ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" HandleID="k8s-pod-network.569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Workload="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:10:10.701480 env[1632]: time="2023-10-02T19:10:10Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:10.701480 env[1632]: 2023-10-02 19:10:10.699 [INFO][5525] k8s.go 589: Teardown processing complete. ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Oct 2 19:10:10.702720 env[1632]: time="2023-10-02T19:10:10.701524498Z" level=info msg="TearDown network for sandbox \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\" successfully" Oct 2 19:10:10.702720 env[1632]: time="2023-10-02T19:10:10.701559394Z" level=info msg="StopPodSandbox for \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\" returns successfully" Oct 2 19:10:10.702813 env[1632]: time="2023-10-02T19:10:10.702739313Z" level=info msg="RemovePodSandbox for \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\"" Oct 2 19:10:10.702858 env[1632]: time="2023-10-02T19:10:10.702778537Z" level=info msg="Forcibly stopping sandbox \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\"" Oct 2 19:10:10.806204 env[1632]: 2023-10-02 19:10:10.762 [WARNING][5551] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cff47e73-ed2e-4160-ad38-dacd3bd5bc49", ResourceVersion:"1058", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"9350946c0ea70dd8fd7cfd55f8de1eadf6b7cddca66b4eb7f471a0f3b7f0e5b2", Pod:"csi-node-driver-ms28b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.58.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali11a9cf841f1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:10.806204 env[1632]: 2023-10-02 19:10:10.762 [INFO][5551] k8s.go 576: Cleaning up netns ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Oct 2 19:10:10.806204 env[1632]: 2023-10-02 19:10:10.762 [INFO][5551] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" iface="eth0" netns="" Oct 2 19:10:10.806204 env[1632]: 2023-10-02 19:10:10.762 [INFO][5551] k8s.go 583: Releasing IP address(es) ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Oct 2 19:10:10.806204 env[1632]: 2023-10-02 19:10:10.762 [INFO][5551] utils.go 196: Calico CNI releasing IP address ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Oct 2 19:10:10.806204 env[1632]: 2023-10-02 19:10:10.792 [INFO][5558] ipam_plugin.go 416: Releasing address using handleID ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" HandleID="k8s-pod-network.569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Workload="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:10:10.806204 env[1632]: time="2023-10-02T19:10:10Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:10.806204 env[1632]: time="2023-10-02T19:10:10Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:10.806204 env[1632]: 2023-10-02 19:10:10.800 [WARNING][5558] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" HandleID="k8s-pod-network.569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Workload="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:10:10.806204 env[1632]: 2023-10-02 19:10:10.800 [INFO][5558] ipam_plugin.go 444: Releasing address using workloadID ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" HandleID="k8s-pod-network.569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Workload="ip--172--31--17--113-k8s-csi--node--driver--ms28b-eth0" Oct 2 19:10:10.806204 env[1632]: time="2023-10-02T19:10:10Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:10.806204 env[1632]: 2023-10-02 19:10:10.804 [INFO][5551] k8s.go 589: Teardown processing complete. ContainerID="569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5" Oct 2 19:10:10.807164 env[1632]: time="2023-10-02T19:10:10.806242939Z" level=info msg="TearDown network for sandbox \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\" successfully" Oct 2 19:10:10.812094 env[1632]: time="2023-10-02T19:10:10.811986280Z" level=info msg="RemovePodSandbox \"569209e4e0a525fbf03451659c6f501db971a9f8537c2ecf3cdd1ad8739c47f5\" returns successfully" Oct 2 19:10:10.812661 env[1632]: time="2023-10-02T19:10:10.812613984Z" level=info msg="StopPodSandbox for \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\"" Oct 2 19:10:10.943446 env[1632]: 2023-10-02 19:10:10.863 [WARNING][5576] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0", GenerateName:"calico-kube-controllers-69d9c784fb-", Namespace:"calico-system", SelfLink:"", UID:"dd35c0b4-d11f-4953-830e-f95471013fde", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69d9c784fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db", Pod:"calico-kube-controllers-69d9c784fb-bmkbn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.58.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali50e8ba27932", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:10.943446 env[1632]: 2023-10-02 19:10:10.864 [INFO][5576] k8s.go 576: Cleaning up netns ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Oct 2 19:10:10.943446 env[1632]: 2023-10-02 19:10:10.864 [INFO][5576] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" iface="eth0" netns="" Oct 2 19:10:10.943446 env[1632]: 2023-10-02 19:10:10.864 [INFO][5576] k8s.go 583: Releasing IP address(es) ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Oct 2 19:10:10.943446 env[1632]: 2023-10-02 19:10:10.864 [INFO][5576] utils.go 196: Calico CNI releasing IP address ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Oct 2 19:10:10.943446 env[1632]: 2023-10-02 19:10:10.928 [INFO][5583] ipam_plugin.go 416: Releasing address using handleID ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" HandleID="k8s-pod-network.1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Workload="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:10:10.943446 env[1632]: time="2023-10-02T19:10:10Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:10.943446 env[1632]: time="2023-10-02T19:10:10Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:10.943446 env[1632]: 2023-10-02 19:10:10.938 [WARNING][5583] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" HandleID="k8s-pod-network.1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Workload="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:10:10.943446 env[1632]: 2023-10-02 19:10:10.938 [INFO][5583] ipam_plugin.go 444: Releasing address using workloadID ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" HandleID="k8s-pod-network.1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Workload="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:10:10.943446 env[1632]: time="2023-10-02T19:10:10Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:10.943446 env[1632]: 2023-10-02 19:10:10.941 [INFO][5576] k8s.go 589: Teardown processing complete. ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Oct 2 19:10:10.944317 env[1632]: time="2023-10-02T19:10:10.944277442Z" level=info msg="TearDown network for sandbox \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\" successfully" Oct 2 19:10:10.944484 env[1632]: time="2023-10-02T19:10:10.944463858Z" level=info msg="StopPodSandbox for \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\" returns successfully" Oct 2 19:10:10.945572 env[1632]: time="2023-10-02T19:10:10.945535031Z" level=info msg="RemovePodSandbox for \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\"" Oct 2 19:10:10.945738 env[1632]: time="2023-10-02T19:10:10.945574929Z" level=info msg="Forcibly stopping sandbox \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\"" Oct 2 19:10:10.951004 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 19:10:10.951221 kernel: audit: type=1400 audit(1696273810.947:1461): avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:10.947000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:10.947000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:10.963215 kernel: audit: type=1400 audit(1696273810.947:1462): avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:10.964317 kernel: audit: type=1300 audit(1696273810.947:1462): arch=c000003e syscall=254 success=no exit=-13 a0=12 a1=c000e77b00 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:10:10.947000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=12 a1=c000e77b00 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:10:10.947000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:10.979366 kernel: audit: type=1327 audit(1696273810.947:1462): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:10.979526 kernel: audit: type=1400 audit(1696273810.947:1463): avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:10.947000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:10.947000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=12 a1=c000e77b60 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:10:10.947000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:11.003069 kernel: audit: type=1300 audit(1696273810.947:1463): arch=c000003e syscall=254 success=no exit=-13 a0=12 a1=c000e77b60 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:10:11.003207 kernel: audit: type=1327 audit(1696273810.947:1463): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:10.947000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c0011859a0 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:10:11.011794 kernel: audit: type=1300 audit(1696273810.947:1461): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c0011859a0 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:10:10.947000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:11.019112 kernel: audit: type=1327 audit(1696273810.947:1461): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:10.962000 audit[2530]: AVC avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:11.026447 kernel: audit: type=1400 audit(1696273810.962:1464): avc: denied { watch } for pid=2530 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:10.962000 audit[2530]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c001185a20 a2=fc6 a3=0 items=0 ppid=2360 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:10:10.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:11.086907 env[1632]: 2023-10-02 19:10:11.042 [WARNING][5609] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0", GenerateName:"calico-kube-controllers-69d9c784fb-", Namespace:"calico-system", SelfLink:"", UID:"dd35c0b4-d11f-4953-830e-f95471013fde", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69d9c784fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"1fc79baec22badffc383489ace3767ef66957ffa4b5f5ce7695e6e79884fc5db", Pod:"calico-kube-controllers-69d9c784fb-bmkbn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.58.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali50e8ba27932", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:11.086907 env[1632]: 2023-10-02 19:10:11.043 [INFO][5609] k8s.go 576: Cleaning up netns ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Oct 2 19:10:11.086907 env[1632]: 2023-10-02 19:10:11.043 [INFO][5609] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" iface="eth0" netns="" Oct 2 19:10:11.086907 env[1632]: 2023-10-02 19:10:11.043 [INFO][5609] k8s.go 583: Releasing IP address(es) ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Oct 2 19:10:11.086907 env[1632]: 2023-10-02 19:10:11.043 [INFO][5609] utils.go 196: Calico CNI releasing IP address ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Oct 2 19:10:11.086907 env[1632]: 2023-10-02 19:10:11.074 [INFO][5615] ipam_plugin.go 416: Releasing address using handleID ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" HandleID="k8s-pod-network.1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Workload="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:10:11.086907 env[1632]: time="2023-10-02T19:10:11Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:11.086907 env[1632]: time="2023-10-02T19:10:11Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:11.086907 env[1632]: 2023-10-02 19:10:11.081 [WARNING][5615] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" HandleID="k8s-pod-network.1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Workload="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:10:11.086907 env[1632]: 2023-10-02 19:10:11.081 [INFO][5615] ipam_plugin.go 444: Releasing address using workloadID ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" HandleID="k8s-pod-network.1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Workload="ip--172--31--17--113-k8s-calico--kube--controllers--69d9c784fb--bmkbn-eth0" Oct 2 19:10:11.086907 env[1632]: time="2023-10-02T19:10:11Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:11.086907 env[1632]: 2023-10-02 19:10:11.085 [INFO][5609] k8s.go 589: Teardown processing complete. ContainerID="1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847" Oct 2 19:10:11.088351 env[1632]: time="2023-10-02T19:10:11.087296561Z" level=info msg="TearDown network for sandbox \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\" successfully" Oct 2 19:10:11.095867 env[1632]: time="2023-10-02T19:10:11.095823391Z" level=info msg="RemovePodSandbox \"1df89abab45fd954a2159defee303d5c23ef1d665a2646b340367cd1718ac847\" returns successfully" Oct 2 19:10:11.096605 env[1632]: time="2023-10-02T19:10:11.096570155Z" level=info msg="StopPodSandbox for \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\"" Oct 2 19:10:11.198689 env[1632]: 2023-10-02 19:10:11.141 [WARNING][5634] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"4e0c1ba1-5a22-48b1-aad1-a59226d05378", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca", Pod:"coredns-565d847f94-9s8n2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.58.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6a92ae42c68", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:11.198689 env[1632]: 2023-10-02 19:10:11.142 [INFO][5634] k8s.go 576: Cleaning up netns ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Oct 2 19:10:11.198689 env[1632]: 2023-10-02 19:10:11.142 [INFO][5634] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" iface="eth0" netns="" Oct 2 19:10:11.198689 env[1632]: 2023-10-02 19:10:11.142 [INFO][5634] k8s.go 583: Releasing IP address(es) ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Oct 2 19:10:11.198689 env[1632]: 2023-10-02 19:10:11.142 [INFO][5634] utils.go 196: Calico CNI releasing IP address ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Oct 2 19:10:11.198689 env[1632]: 2023-10-02 19:10:11.181 [INFO][5640] ipam_plugin.go 416: Releasing address using handleID ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" HandleID="k8s-pod-network.10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:10:11.198689 env[1632]: time="2023-10-02T19:10:11Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:11.198689 env[1632]: time="2023-10-02T19:10:11Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:11.198689 env[1632]: 2023-10-02 19:10:11.188 [WARNING][5640] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" HandleID="k8s-pod-network.10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:10:11.198689 env[1632]: 2023-10-02 19:10:11.189 [INFO][5640] ipam_plugin.go 444: Releasing address using workloadID ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" HandleID="k8s-pod-network.10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:10:11.198689 env[1632]: time="2023-10-02T19:10:11Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:11.198689 env[1632]: 2023-10-02 19:10:11.195 [INFO][5634] k8s.go 589: Teardown processing complete. ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Oct 2 19:10:11.198689 env[1632]: time="2023-10-02T19:10:11.197456674Z" level=info msg="TearDown network for sandbox \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\" successfully" Oct 2 19:10:11.198689 env[1632]: time="2023-10-02T19:10:11.197491860Z" level=info msg="StopPodSandbox for \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\" returns successfully" Oct 2 19:10:11.199518 env[1632]: time="2023-10-02T19:10:11.199032472Z" level=info msg="RemovePodSandbox for \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\"" Oct 2 19:10:11.199518 env[1632]: time="2023-10-02T19:10:11.199080869Z" level=info msg="Forcibly stopping sandbox \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\"" Oct 2 19:10:11.309299 env[1632]: 2023-10-02 19:10:11.253 [WARNING][5658] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"4e0c1ba1-5a22-48b1-aad1-a59226d05378", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"e5c27d49a80cfaf963ef12c73eeea33da84c2f85d497f2c6f6f3d5de258b06ca", Pod:"coredns-565d847f94-9s8n2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.58.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6a92ae42c68", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:11.309299 env[1632]: 2023-10-02 19:10:11.254 [INFO][5658] k8s.go 576: Cleaning up netns ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Oct 2 19:10:11.309299 env[1632]: 2023-10-02 19:10:11.254 [INFO][5658] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" iface="eth0" netns="" Oct 2 19:10:11.309299 env[1632]: 2023-10-02 19:10:11.254 [INFO][5658] k8s.go 583: Releasing IP address(es) ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Oct 2 19:10:11.309299 env[1632]: 2023-10-02 19:10:11.254 [INFO][5658] utils.go 196: Calico CNI releasing IP address ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Oct 2 19:10:11.309299 env[1632]: 2023-10-02 19:10:11.291 [INFO][5664] ipam_plugin.go 416: Releasing address using handleID ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" HandleID="k8s-pod-network.10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:10:11.309299 env[1632]: time="2023-10-02T19:10:11Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:11.309299 env[1632]: time="2023-10-02T19:10:11Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:11.309299 env[1632]: 2023-10-02 19:10:11.303 [WARNING][5664] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" HandleID="k8s-pod-network.10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:10:11.309299 env[1632]: 2023-10-02 19:10:11.303 [INFO][5664] ipam_plugin.go 444: Releasing address using workloadID ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" HandleID="k8s-pod-network.10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--9s8n2-eth0" Oct 2 19:10:11.309299 env[1632]: time="2023-10-02T19:10:11Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:11.309299 env[1632]: 2023-10-02 19:10:11.307 [INFO][5658] k8s.go 589: Teardown processing complete. ContainerID="10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6" Oct 2 19:10:11.310029 env[1632]: time="2023-10-02T19:10:11.309321713Z" level=info msg="TearDown network for sandbox \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\" successfully" Oct 2 19:10:11.313613 env[1632]: time="2023-10-02T19:10:11.313543165Z" level=info msg="RemovePodSandbox \"10df4a38bc5a9d85f5da7ef14d4c44a0ba6b413cf979857b50f4afa4a8ce00f6\" returns successfully" Oct 2 19:10:11.315348 env[1632]: time="2023-10-02T19:10:11.315312003Z" level=info msg="StopPodSandbox for \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\"" Oct 2 19:10:11.414825 env[1632]: 2023-10-02 19:10:11.374 [WARNING][5685] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"3ca5f076-0f37-4b7f-8d04-479ef03f9ef9", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5", Pod:"coredns-565d847f94-dknxd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.58.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibff1f4bc3bd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:11.414825 env[1632]: 2023-10-02 19:10:11.375 [INFO][5685] k8s.go 576: Cleaning up netns ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Oct 2 19:10:11.414825 env[1632]: 2023-10-02 19:10:11.375 [INFO][5685] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" iface="eth0" netns="" Oct 2 19:10:11.414825 env[1632]: 2023-10-02 19:10:11.375 [INFO][5685] k8s.go 583: Releasing IP address(es) ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Oct 2 19:10:11.414825 env[1632]: 2023-10-02 19:10:11.375 [INFO][5685] utils.go 196: Calico CNI releasing IP address ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Oct 2 19:10:11.414825 env[1632]: 2023-10-02 19:10:11.402 [INFO][5691] ipam_plugin.go 416: Releasing address using handleID ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" HandleID="k8s-pod-network.678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:10:11.414825 env[1632]: time="2023-10-02T19:10:11Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:11.414825 env[1632]: time="2023-10-02T19:10:11Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:11.414825 env[1632]: 2023-10-02 19:10:11.409 [WARNING][5691] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" HandleID="k8s-pod-network.678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:10:11.414825 env[1632]: 2023-10-02 19:10:11.410 [INFO][5691] ipam_plugin.go 444: Releasing address using workloadID ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" HandleID="k8s-pod-network.678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:10:11.414825 env[1632]: time="2023-10-02T19:10:11Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:11.414825 env[1632]: 2023-10-02 19:10:11.413 [INFO][5685] k8s.go 589: Teardown processing complete. ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Oct 2 19:10:11.415651 env[1632]: time="2023-10-02T19:10:11.414902662Z" level=info msg="TearDown network for sandbox \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\" successfully" Oct 2 19:10:11.415651 env[1632]: time="2023-10-02T19:10:11.415030198Z" level=info msg="StopPodSandbox for \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\" returns successfully" Oct 2 19:10:11.415968 env[1632]: time="2023-10-02T19:10:11.415921973Z" level=info msg="RemovePodSandbox for \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\"" Oct 2 19:10:11.416093 env[1632]: time="2023-10-02T19:10:11.415974155Z" level=info msg="Forcibly stopping sandbox \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\"" Oct 2 19:10:11.511173 env[1632]: 2023-10-02 19:10:11.467 [WARNING][5710] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"3ca5f076-0f37-4b7f-8d04-479ef03f9ef9", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-17-113", ContainerID:"f8677d87ffcfa8f731a4daf8a40f260e8644cdf2de7387573181ae8cda8098a5", Pod:"coredns-565d847f94-dknxd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.58.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibff1f4bc3bd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:10:11.511173 env[1632]: 2023-10-02 19:10:11.467 [INFO][5710] k8s.go 576: Cleaning up netns ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Oct 2 19:10:11.511173 env[1632]: 2023-10-02 19:10:11.467 [INFO][5710] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" iface="eth0" netns="" Oct 2 19:10:11.511173 env[1632]: 2023-10-02 19:10:11.467 [INFO][5710] k8s.go 583: Releasing IP address(es) ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Oct 2 19:10:11.511173 env[1632]: 2023-10-02 19:10:11.467 [INFO][5710] utils.go 196: Calico CNI releasing IP address ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Oct 2 19:10:11.511173 env[1632]: 2023-10-02 19:10:11.496 [INFO][5716] ipam_plugin.go 416: Releasing address using handleID ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" HandleID="k8s-pod-network.678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:10:11.511173 env[1632]: time="2023-10-02T19:10:11Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:10:11.511173 env[1632]: time="2023-10-02T19:10:11Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:10:11.511173 env[1632]: 2023-10-02 19:10:11.505 [WARNING][5716] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" HandleID="k8s-pod-network.678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:10:11.511173 env[1632]: 2023-10-02 19:10:11.505 [INFO][5716] ipam_plugin.go 444: Releasing address using workloadID ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" HandleID="k8s-pod-network.678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Workload="ip--172--31--17--113-k8s-coredns--565d847f94--dknxd-eth0" Oct 2 19:10:11.511173 env[1632]: time="2023-10-02T19:10:11Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:10:11.511173 env[1632]: 2023-10-02 19:10:11.509 [INFO][5710] k8s.go 589: Teardown processing complete. ContainerID="678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5" Oct 2 19:10:11.511921 env[1632]: time="2023-10-02T19:10:11.511210609Z" level=info msg="TearDown network for sandbox \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\" successfully" Oct 2 19:10:11.515556 env[1632]: time="2023-10-02T19:10:11.515504077Z" level=info msg="RemovePodSandbox \"678751654970817538535de75bcd46baec0d1fed1ac86c4497beeb21b2ffc5c5\" returns successfully" Oct 2 19:10:12.427000 audit[5747]: NETFILTER_CFG table=filter:134 family=2 entries=8 op=nft_register_rule pid=5747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:12.427000 audit[5747]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffed3607970 a2=0 a3=7ffed360795c items=0 ppid=3013 pid=5747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:12.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:12.431000 audit[5747]: NETFILTER_CFG table=nat:135 family=2 entries=78 op=nft_register_rule pid=5747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:10:12.431000 audit[5747]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffed3607970 a2=0 a3=7ffed360795c items=0 ppid=3013 pid=5747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:12.431000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:10:12.538423 systemd[1]: run-containerd-runc-k8s.io-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1-runc.dfWveT.mount: Deactivated successfully. Oct 2 19:10:13.525792 systemd[1]: run-containerd-runc-k8s.io-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1-runc.xq8tXx.mount: Deactivated successfully. Oct 2 19:10:13.671884 systemd[1]: run-containerd-runc-k8s.io-7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4-runc.2bAnP0.mount: Deactivated successfully. Oct 2 19:10:13.819688 kubelet[2846]: E1002 19:10:13.819251 2846 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-ms28b" podUID=cff47e73-ed2e-4160-ad38-dacd3bd5bc49 Oct 2 19:10:18.458842 systemd[1]: Started sshd@15-172.31.17.113:22-139.178.89.65:45078.service. Oct 2 19:10:18.465719 kernel: kauditd_printk_skb: 8 callbacks suppressed Oct 2 19:10:18.465866 kernel: audit: type=1130 audit(1696273818.460:1467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.17.113:22-139.178.89.65:45078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:18.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.17.113:22-139.178.89.65:45078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:18.639000 audit[5811]: USER_ACCT pid=5811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:18.645810 kernel: audit: type=1101 audit(1696273818.639:1468): pid=5811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:18.645865 sshd[5811]: Accepted publickey for core from 139.178.89.65 port 45078 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:10:18.644000 audit[5811]: CRED_ACQ pid=5811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:18.646841 sshd[5811]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:10:18.654662 kernel: audit: type=1103 audit(1696273818.644:1469): pid=5811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:18.654748 kernel: audit: type=1006 audit(1696273818.645:1470): pid=5811 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Oct 2 19:10:18.645000 audit[5811]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca01d0d60 a2=3 a3=0 items=0 ppid=1 pid=5811 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:18.663737 kernel: audit: type=1300 audit(1696273818.645:1470): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca01d0d60 a2=3 a3=0 items=0 ppid=1 pid=5811 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:18.645000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:18.666590 kernel: audit: type=1327 audit(1696273818.645:1470): proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:18.669809 systemd[1]: Started session-16.scope. Oct 2 19:10:18.670608 systemd-logind[1616]: New session 16 of user core. Oct 2 19:10:18.677000 audit[5811]: USER_START pid=5811 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:18.680000 audit[5813]: CRED_ACQ pid=5813 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:18.690571 kernel: audit: type=1105 audit(1696273818.677:1471): pid=5811 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:18.690991 kernel: audit: type=1103 audit(1696273818.680:1472): pid=5813 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:18.885599 sshd[5811]: pam_unix(sshd:session): session closed for user core Oct 2 19:10:18.886000 audit[5811]: USER_END pid=5811 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:18.889676 systemd[1]: sshd@15-172.31.17.113:22-139.178.89.65:45078.service: Deactivated successfully. Oct 2 19:10:18.890665 systemd[1]: session-16.scope: Deactivated successfully. Oct 2 19:10:18.892782 systemd-logind[1616]: Session 16 logged out. Waiting for processes to exit. Oct 2 19:10:18.894032 systemd-logind[1616]: Removed session 16. Oct 2 19:10:18.896666 kernel: audit: type=1106 audit(1696273818.886:1473): pid=5811 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:18.896748 kernel: audit: type=1104 audit(1696273818.887:1474): pid=5811 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:18.887000 audit[5811]: CRED_DISP pid=5811 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:18.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.17.113:22-139.178.89.65:45078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:22.534664 systemd[1]: run-containerd-runc-k8s.io-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1-runc.4rusXq.mount: Deactivated successfully. Oct 2 19:10:22.620041 systemd[1]: run-containerd-runc-k8s.io-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1-runc.7v1UgW.mount: Deactivated successfully. Oct 2 19:10:23.685367 systemd[1]: run-containerd-runc-k8s.io-7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4-runc.0Vmk3a.mount: Deactivated successfully. Oct 2 19:10:23.818449 kubelet[2846]: E1002 19:10:23.818418 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75b9cbccd6-5sch6" podUID=b3148ab2-b339-4838-af2b-9b1a504b7544 Oct 2 19:10:26.820527 kubelet[2846]: E1002 19:10:26.820497 2846 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-ms28b" podUID=cff47e73-ed2e-4160-ad38-dacd3bd5bc49 Oct 2 19:10:32.542927 systemd[1]: run-containerd-runc-k8s.io-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1-runc.jHuR5y.mount: Deactivated successfully. Oct 2 19:10:32.591377 systemd[1]: run-containerd-runc-k8s.io-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1-runc.B9cSti.mount: Deactivated successfully. Oct 2 19:10:33.714614 systemd[1]: run-containerd-runc-k8s.io-7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4-runc.V59SmP.mount: Deactivated successfully. Oct 2 19:10:36.819011 env[1632]: time="2023-10-02T19:10:36.818958471Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:10:37.009745 env[1632]: time="2023-10-02T19:10:37.009584341Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:37.011554 env[1632]: time="2023-10-02T19:10:37.011484206Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:37.011971 kubelet[2846]: E1002 19:10:37.011946 2846 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:37.012498 kubelet[2846]: E1002 19:10:37.012008 2846 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:37.012498 kubelet[2846]: E1002 19:10:37.012191 2846 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-pwnzg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-75b9cbccd6-5sch6_calico-apiserver(b3148ab2-b339-4838-af2b-9b1a504b7544): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:37.012498 kubelet[2846]: E1002 19:10:37.012285 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75b9cbccd6-5sch6" podUID=b3148ab2-b339-4838-af2b-9b1a504b7544 Oct 2 19:10:41.819458 kubelet[2846]: E1002 19:10:41.819421 2846 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-ms28b" podUID=cff47e73-ed2e-4160-ad38-dacd3bd5bc49 Oct 2 19:10:43.491554 kubelet[2846]: E1002 19:10:43.491502 2846 controller.go:187] failed to update lease, error: Put "https://172.31.17.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-17-113?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Oct 2 19:10:43.564390 systemd[1]: cri-containerd-84abc3225ad446c7b16b6a7a6a7a4a40840e374ea547e5cfa1f934e10cb1e026.scope: Deactivated successfully. Oct 2 19:10:43.564728 systemd[1]: cri-containerd-84abc3225ad446c7b16b6a7a6a7a4a40840e374ea547e5cfa1f934e10cb1e026.scope: Consumed 3.362s CPU time. Oct 2 19:10:43.576695 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:10:43.576850 kernel: audit: type=1334 audit(1696273843.572:1476): prog-id=86 op=UNLOAD Oct 2 19:10:43.576984 kernel: audit: type=1334 audit(1696273843.572:1477): prog-id=111 op=UNLOAD Oct 2 19:10:43.572000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:10:43.572000 audit: BPF prog-id=111 op=UNLOAD Oct 2 19:10:43.601899 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-84abc3225ad446c7b16b6a7a6a7a4a40840e374ea547e5cfa1f934e10cb1e026-rootfs.mount: Deactivated successfully. Oct 2 19:10:43.619845 env[1632]: time="2023-10-02T19:10:43.619793103Z" level=info msg="shim disconnected" id=84abc3225ad446c7b16b6a7a6a7a4a40840e374ea547e5cfa1f934e10cb1e026 Oct 2 19:10:43.619845 env[1632]: time="2023-10-02T19:10:43.619840859Z" level=warning msg="cleaning up after shim disconnected" id=84abc3225ad446c7b16b6a7a6a7a4a40840e374ea547e5cfa1f934e10cb1e026 namespace=k8s.io Oct 2 19:10:43.619845 env[1632]: time="2023-10-02T19:10:43.619852911Z" level=info msg="cleaning up dead shim" Oct 2 19:10:43.629918 env[1632]: time="2023-10-02T19:10:43.629862291Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:10:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6018 runtime=io.containerd.runc.v2\n" Oct 2 19:10:43.659448 systemd[1]: cri-containerd-3e9bc94037802e98a60c138142fa01b4692124583d7fc17780e2b15c455f9510.scope: Deactivated successfully. Oct 2 19:10:43.660030 systemd[1]: cri-containerd-3e9bc94037802e98a60c138142fa01b4692124583d7fc17780e2b15c455f9510.scope: Consumed 1.512s CPU time. Oct 2 19:10:43.668045 kernel: audit: type=1334 audit(1696273843.663:1478): prog-id=90 op=UNLOAD Oct 2 19:10:43.668286 kernel: audit: type=1334 audit(1696273843.663:1479): prog-id=107 op=UNLOAD Oct 2 19:10:43.663000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:10:43.663000 audit: BPF prog-id=107 op=UNLOAD Oct 2 19:10:43.696230 systemd[1]: run-containerd-runc-k8s.io-7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4-runc.CVHDLx.mount: Deactivated successfully. Oct 2 19:10:43.730319 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3e9bc94037802e98a60c138142fa01b4692124583d7fc17780e2b15c455f9510-rootfs.mount: Deactivated successfully. Oct 2 19:10:43.752811 env[1632]: time="2023-10-02T19:10:43.747771068Z" level=info msg="shim disconnected" id=3e9bc94037802e98a60c138142fa01b4692124583d7fc17780e2b15c455f9510 Oct 2 19:10:43.752811 env[1632]: time="2023-10-02T19:10:43.747827335Z" level=warning msg="cleaning up after shim disconnected" id=3e9bc94037802e98a60c138142fa01b4692124583d7fc17780e2b15c455f9510 namespace=k8s.io Oct 2 19:10:43.752811 env[1632]: time="2023-10-02T19:10:43.747840647Z" level=info msg="cleaning up dead shim" Oct 2 19:10:43.768728 env[1632]: time="2023-10-02T19:10:43.768090366Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:10:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6061 runtime=io.containerd.runc.v2\n" Oct 2 19:10:44.391627 kubelet[2846]: I1002 19:10:44.391598 2846 scope.go:115] "RemoveContainer" containerID="84abc3225ad446c7b16b6a7a6a7a4a40840e374ea547e5cfa1f934e10cb1e026" Oct 2 19:10:44.394877 env[1632]: time="2023-10-02T19:10:44.394835329Z" level=info msg="CreateContainer within sandbox \"449e701bb8703e69101f0940c6b0940756df1a1a1d4c86ec3a28c6d91180c936\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Oct 2 19:10:44.396529 kubelet[2846]: I1002 19:10:44.395840 2846 scope.go:115] "RemoveContainer" containerID="3e9bc94037802e98a60c138142fa01b4692124583d7fc17780e2b15c455f9510" Oct 2 19:10:44.399064 env[1632]: time="2023-10-02T19:10:44.399028337Z" level=info msg="CreateContainer within sandbox \"f2a4c166369bb9f0c9cb39e351c396a926e35d8864adf0cd2fb44defc7afe672\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Oct 2 19:10:44.415717 env[1632]: time="2023-10-02T19:10:44.415647526Z" level=info msg="CreateContainer within sandbox \"449e701bb8703e69101f0940c6b0940756df1a1a1d4c86ec3a28c6d91180c936\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"34736346561518b5a419cb6398099c821ec7e87e5abfbc3e60e8350cd439898a\"" Oct 2 19:10:44.416191 env[1632]: time="2023-10-02T19:10:44.416154521Z" level=info msg="StartContainer for \"34736346561518b5a419cb6398099c821ec7e87e5abfbc3e60e8350cd439898a\"" Oct 2 19:10:44.423494 env[1632]: time="2023-10-02T19:10:44.423446649Z" level=info msg="CreateContainer within sandbox \"f2a4c166369bb9f0c9cb39e351c396a926e35d8864adf0cd2fb44defc7afe672\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"829ecc9f399ae9360bfcee33686804c25586b05bdf511d67f4b4460ec3ec6caa\"" Oct 2 19:10:44.424385 env[1632]: time="2023-10-02T19:10:44.424267115Z" level=info msg="StartContainer for \"829ecc9f399ae9360bfcee33686804c25586b05bdf511d67f4b4460ec3ec6caa\"" Oct 2 19:10:44.462262 systemd[1]: Started cri-containerd-34736346561518b5a419cb6398099c821ec7e87e5abfbc3e60e8350cd439898a.scope. Oct 2 19:10:44.474832 systemd[1]: Started cri-containerd-829ecc9f399ae9360bfcee33686804c25586b05bdf511d67f4b4460ec3ec6caa.scope. Oct 2 19:10:44.506109 kernel: audit: type=1400 audit(1696273844.495:1480): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506263 kernel: audit: type=1400 audit(1696273844.495:1481): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.512698 kernel: audit: type=1400 audit(1696273844.495:1482): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.518717 kernel: audit: type=1400 audit(1696273844.495:1483): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.527693 kernel: audit: type=1400 audit(1696273844.495:1484): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.534685 kernel: audit: type=1400 audit(1696273844.495:1485): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.496000 audit: BPF prog-id=184 op=LOAD Oct 2 19:10:44.496000 audit[6117]: AVC avc: denied { bpf } for pid=6117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.496000 audit[6117]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2360 pid=6117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:44.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334373336333436353631353138623561343139636236333938303939 Oct 2 19:10:44.496000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.496000 audit[6117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2360 pid=6117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:44.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334373336333436353631353138623561343139636236333938303939 Oct 2 19:10:44.496000 audit[6117]: AVC avc: denied { bpf } for pid=6117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.496000 audit[6117]: AVC avc: denied { bpf } for pid=6117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.496000 audit[6117]: AVC avc: denied { bpf } for pid=6117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.496000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.496000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.496000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.496000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.496000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.496000 audit[6117]: AVC avc: denied { bpf } for pid=6117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.496000 audit[6117]: AVC avc: denied { bpf } for pid=6117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.496000 audit: BPF prog-id=185 op=LOAD Oct 2 19:10:44.496000 audit[6117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000263e90 items=0 ppid=2360 pid=6117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:44.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334373336333436353631353138623561343139636236333938303939 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { bpf } for pid=6117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { bpf } for pid=6117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { bpf } for pid=6117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { bpf } for pid=6117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit: BPF prog-id=186 op=LOAD Oct 2 19:10:44.506000 audit[6117]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000263ed8 items=0 ppid=2360 pid=6117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:44.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334373336333436353631353138623561343139636236333938303939 Oct 2 19:10:44.506000 audit: BPF prog-id=186 op=UNLOAD Oct 2 19:10:44.506000 audit: BPF prog-id=185 op=UNLOAD Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { bpf } for pid=6117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { bpf } for pid=6117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { bpf } for pid=6117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { perfmon } for pid=6117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { bpf } for pid=6117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit[6117]: AVC avc: denied { bpf } for pid=6117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.506000 audit: BPF prog-id=187 op=LOAD Oct 2 19:10:44.506000 audit[6117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003c42e8 items=0 ppid=2360 pid=6117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:44.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334373336333436353631353138623561343139636236333938303939 Oct 2 19:10:44.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.550000 audit: BPF prog-id=188 op=LOAD Oct 2 19:10:44.551000 audit[6129]: AVC avc: denied { bpf } for pid=6129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.551000 audit[6129]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2400 pid=6129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:44.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396563633966333939616539333630626663656533333638363830 Oct 2 19:10:44.551000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.551000 audit[6129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2400 pid=6129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:44.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396563633966333939616539333630626663656533333638363830 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { bpf } for pid=6129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { bpf } for pid=6129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { bpf } for pid=6129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { bpf } for pid=6129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { bpf } for pid=6129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit: BPF prog-id=189 op=LOAD Oct 2 19:10:44.552000 audit[6129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dff60 items=0 ppid=2400 pid=6129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:44.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396563633966333939616539333630626663656533333638363830 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { bpf } for pid=6129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { bpf } for pid=6129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { bpf } for pid=6129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { bpf } for pid=6129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit: BPF prog-id=190 op=LOAD Oct 2 19:10:44.552000 audit[6129]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dffa8 items=0 ppid=2400 pid=6129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:44.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396563633966333939616539333630626663656533333638363830 Oct 2 19:10:44.552000 audit: BPF prog-id=190 op=UNLOAD Oct 2 19:10:44.552000 audit: BPF prog-id=189 op=UNLOAD Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { bpf } for pid=6129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { bpf } for pid=6129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { bpf } for pid=6129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { perfmon } for pid=6129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { bpf } for pid=6129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit[6129]: AVC avc: denied { bpf } for pid=6129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:44.552000 audit: BPF prog-id=191 op=LOAD Oct 2 19:10:44.552000 audit[6129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c03b8 items=0 ppid=2400 pid=6129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:44.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832396563633966333939616539333630626663656533333638363830 Oct 2 19:10:44.591967 env[1632]: time="2023-10-02T19:10:44.591438569Z" level=info msg="StartContainer for \"34736346561518b5a419cb6398099c821ec7e87e5abfbc3e60e8350cd439898a\" returns successfully" Oct 2 19:10:44.631015 env[1632]: time="2023-10-02T19:10:44.630956371Z" level=info msg="StartContainer for \"829ecc9f399ae9360bfcee33686804c25586b05bdf511d67f4b4460ec3ec6caa\" returns successfully" Oct 2 19:10:44.876000 audit: BPF prog-id=123 op=UNLOAD Oct 2 19:10:44.876571 systemd[1]: cri-containerd-e57746eea906ecb6aeceec411fbc75cd6b476b353a375449a3cdf16356442472.scope: Deactivated successfully. Oct 2 19:10:44.877018 systemd[1]: cri-containerd-e57746eea906ecb6aeceec411fbc75cd6b476b353a375449a3cdf16356442472.scope: Consumed 2.922s CPU time. Oct 2 19:10:44.883000 audit: BPF prog-id=126 op=UNLOAD Oct 2 19:10:44.911382 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e57746eea906ecb6aeceec411fbc75cd6b476b353a375449a3cdf16356442472-rootfs.mount: Deactivated successfully. Oct 2 19:10:44.948571 env[1632]: time="2023-10-02T19:10:44.948515591Z" level=info msg="shim disconnected" id=e57746eea906ecb6aeceec411fbc75cd6b476b353a375449a3cdf16356442472 Oct 2 19:10:44.948908 env[1632]: time="2023-10-02T19:10:44.948886422Z" level=warning msg="cleaning up after shim disconnected" id=e57746eea906ecb6aeceec411fbc75cd6b476b353a375449a3cdf16356442472 namespace=k8s.io Oct 2 19:10:44.949182 env[1632]: time="2023-10-02T19:10:44.949160332Z" level=info msg="cleaning up dead shim" Oct 2 19:10:44.972023 env[1632]: time="2023-10-02T19:10:44.971972431Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:10:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6192 runtime=io.containerd.runc.v2\n" Oct 2 19:10:45.403329 kubelet[2846]: I1002 19:10:45.403295 2846 scope.go:115] "RemoveContainer" containerID="e57746eea906ecb6aeceec411fbc75cd6b476b353a375449a3cdf16356442472" Oct 2 19:10:45.412387 env[1632]: time="2023-10-02T19:10:45.412343245Z" level=info msg="CreateContainer within sandbox \"3698f98886b8ed2acc70266dd80d8388701bd77bb1ab48d5d2b12b50ec8fc828\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Oct 2 19:10:45.444984 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1390616078.mount: Deactivated successfully. Oct 2 19:10:45.447899 env[1632]: time="2023-10-02T19:10:45.447851531Z" level=info msg="CreateContainer within sandbox \"3698f98886b8ed2acc70266dd80d8388701bd77bb1ab48d5d2b12b50ec8fc828\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"cce6ff5c2db9de0e0db9ef4d2e283e2d569db21b8137021bdbca03c495938df3\"" Oct 2 19:10:45.449426 env[1632]: time="2023-10-02T19:10:45.449389077Z" level=info msg="StartContainer for \"cce6ff5c2db9de0e0db9ef4d2e283e2d569db21b8137021bdbca03c495938df3\"" Oct 2 19:10:45.473464 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3672040023.mount: Deactivated successfully. Oct 2 19:10:45.511238 systemd[1]: Started cri-containerd-cce6ff5c2db9de0e0db9ef4d2e283e2d569db21b8137021bdbca03c495938df3.scope. Oct 2 19:10:45.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.528000 audit: BPF prog-id=192 op=LOAD Oct 2 19:10:45.530000 audit[6213]: AVC avc: denied { bpf } for pid=6213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.530000 audit[6213]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3028 pid=6213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:45.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363653666663563326462396465306530646239656634643265323833 Oct 2 19:10:45.531000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.531000 audit[6213]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3028 pid=6213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:45.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363653666663563326462396465306530646239656634643265323833 Oct 2 19:10:45.532000 audit[6213]: AVC avc: denied { bpf } for pid=6213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.532000 audit[6213]: AVC avc: denied { bpf } for pid=6213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.532000 audit[6213]: AVC avc: denied { bpf } for pid=6213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.532000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.532000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.532000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.532000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.532000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.532000 audit[6213]: AVC avc: denied { bpf } for pid=6213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.532000 audit[6213]: AVC avc: denied { bpf } for pid=6213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.532000 audit: BPF prog-id=193 op=LOAD Oct 2 19:10:45.532000 audit[6213]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000025280 items=0 ppid=3028 pid=6213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:45.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363653666663563326462396465306530646239656634643265323833 Oct 2 19:10:45.534000 audit[6213]: AVC avc: denied { bpf } for pid=6213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.534000 audit[6213]: AVC avc: denied { bpf } for pid=6213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.534000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.534000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.534000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.534000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.534000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.534000 audit[6213]: AVC avc: denied { bpf } for pid=6213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.534000 audit[6213]: AVC avc: denied { bpf } for pid=6213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.534000 audit: BPF prog-id=194 op=LOAD Oct 2 19:10:45.534000 audit[6213]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0000252c8 items=0 ppid=3028 pid=6213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:45.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363653666663563326462396465306530646239656634643265323833 Oct 2 19:10:45.534000 audit: BPF prog-id=194 op=UNLOAD Oct 2 19:10:45.535000 audit: BPF prog-id=193 op=UNLOAD Oct 2 19:10:45.535000 audit[6213]: AVC avc: denied { bpf } for pid=6213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.535000 audit[6213]: AVC avc: denied { bpf } for pid=6213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.535000 audit[6213]: AVC avc: denied { bpf } for pid=6213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.535000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.535000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.535000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.535000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.535000 audit[6213]: AVC avc: denied { perfmon } for pid=6213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.535000 audit[6213]: AVC avc: denied { bpf } for pid=6213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.535000 audit[6213]: AVC avc: denied { bpf } for pid=6213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:45.535000 audit: BPF prog-id=195 op=LOAD Oct 2 19:10:45.535000 audit[6213]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0000256d8 items=0 ppid=3028 pid=6213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:45.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363653666663563326462396465306530646239656634643265323833 Oct 2 19:10:45.625504 env[1632]: time="2023-10-02T19:10:45.625447332Z" level=info msg="StartContainer for \"cce6ff5c2db9de0e0db9ef4d2e283e2d569db21b8137021bdbca03c495938df3\" returns successfully" Oct 2 19:10:46.515000 audit[6143]: AVC avc: denied { watch } for pid=6143 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:46.515000 audit[6143]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000486a80 a2=fc6 a3=0 items=0 ppid=2360 pid=6143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:10:46.515000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:46.515000 audit[6143]: AVC avc: denied { watch } for pid=6143 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:46.515000 audit[6143]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000156c00 a2=fc6 a3=0 items=0 ppid=2360 pid=6143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c733 key=(null) Oct 2 19:10:46.515000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:52.537381 systemd[1]: run-containerd-runc-k8s.io-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1-runc.ZzX4jc.mount: Deactivated successfully. Oct 2 19:10:52.610623 systemd[1]: run-containerd-runc-k8s.io-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1-runc.FzIqst.mount: Deactivated successfully. Oct 2 19:10:52.817366 kubelet[2846]: E1002 19:10:52.817244 2846 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75b9cbccd6-5sch6" podUID=b3148ab2-b339-4838-af2b-9b1a504b7544 Oct 2 19:10:53.492631 kubelet[2846]: E1002 19:10:53.492583 2846 controller.go:187] failed to update lease, error: Put "https://172.31.17.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-17-113?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Oct 2 19:10:53.678244 systemd[1]: run-containerd-runc-k8s.io-7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4-runc.OmUiNl.mount: Deactivated successfully. Oct 2 19:10:53.818100 env[1632]: time="2023-10-02T19:10:53.817991164Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:10:54.003662 env[1632]: time="2023-10-02T19:10:54.003579269Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:54.005305 env[1632]: time="2023-10-02T19:10:54.005238241Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:54.006578 kubelet[2846]: E1002 19:10:54.006517 2846 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:54.007448 kubelet[2846]: E1002 19:10:54.006605 2846 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:54.007448 kubelet[2846]: E1002 19:10:54.006758 2846 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-hxbld,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-ms28b_calico-system(cff47e73-ed2e-4160-ad38-dacd3bd5bc49): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:54.009153 env[1632]: time="2023-10-02T19:10:54.009113036Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:10:54.215277 env[1632]: time="2023-10-02T19:10:54.215123238Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:54.216715 env[1632]: time="2023-10-02T19:10:54.216649970Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:54.216998 kubelet[2846]: E1002 19:10:54.216958 2846 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:54.217102 kubelet[2846]: E1002 19:10:54.217025 2846 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:54.217155 kubelet[2846]: E1002 19:10:54.217138 2846 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-hxbld,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-ms28b_calico-system(cff47e73-ed2e-4160-ad38-dacd3bd5bc49): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:54.217284 kubelet[2846]: E1002 19:10:54.217210 2846 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-ms28b" podUID=cff47e73-ed2e-4160-ad38-dacd3bd5bc49 Oct 2 19:11:02.526479 systemd[1]: run-containerd-runc-k8s.io-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1-runc.BdcEJU.mount: Deactivated successfully. Oct 2 19:11:02.586216 systemd[1]: run-containerd-runc-k8s.io-9ba942f93e6fbfdc8c7017b512002854d3cbe58f5580ea784321bfedf2dc74f1-runc.GC93xN.mount: Deactivated successfully. Oct 2 19:11:03.495864 kubelet[2846]: E1002 19:11:03.495757 2846 controller.go:187] failed to update lease, error: Put "https://172.31.17.113:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-17-113?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Oct 2 19:11:03.698511 systemd[1]: run-containerd-runc-k8s.io-7b3ea572e007f2ad415240420e00cfd2770529accef232f428517a8f0e4aa8e4-runc.6srCV0.mount: Deactivated successfully.