Oct 2 19:06:52.104015 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:06:52.104046 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:06:52.104060 kernel: BIOS-provided physical RAM map: Oct 2 19:06:52.104070 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 2 19:06:52.104080 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 2 19:06:52.104089 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 2 19:06:52.104104 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Oct 2 19:06:52.104115 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Oct 2 19:06:52.104125 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Oct 2 19:06:52.104135 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 2 19:06:52.104145 kernel: NX (Execute Disable) protection: active Oct 2 19:06:52.104156 kernel: SMBIOS 2.7 present. Oct 2 19:06:52.104166 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Oct 2 19:06:52.104176 kernel: Hypervisor detected: KVM Oct 2 19:06:52.104192 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:06:52.104203 kernel: kvm-clock: cpu 0, msr 3ef8a001, primary cpu clock Oct 2 19:06:52.104215 kernel: kvm-clock: using sched offset of 5893108142 cycles Oct 2 19:06:52.104227 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:06:52.104238 kernel: tsc: Detected 2499.994 MHz processor Oct 2 19:06:52.104249 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:06:52.104263 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:06:52.104274 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Oct 2 19:06:52.104286 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:06:52.104297 kernel: Using GB pages for direct mapping Oct 2 19:06:52.104308 kernel: ACPI: Early table checksum verification disabled Oct 2 19:06:52.104319 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Oct 2 19:06:52.104330 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Oct 2 19:06:52.104342 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Oct 2 19:06:52.104352 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Oct 2 19:06:52.104365 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Oct 2 19:06:52.104377 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:06:52.104388 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Oct 2 19:06:52.104399 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Oct 2 19:06:52.104409 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Oct 2 19:06:52.104421 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Oct 2 19:06:52.104432 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Oct 2 19:06:52.104443 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:06:52.104457 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Oct 2 19:06:52.104468 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Oct 2 19:06:52.104480 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Oct 2 19:06:52.104496 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Oct 2 19:06:52.104508 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Oct 2 19:06:52.104519 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Oct 2 19:06:52.104532 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Oct 2 19:06:52.104547 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Oct 2 19:06:52.104559 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Oct 2 19:06:52.104571 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Oct 2 19:06:52.104583 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:06:52.104596 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:06:52.104608 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Oct 2 19:06:52.104619 kernel: NUMA: Initialized distance table, cnt=1 Oct 2 19:06:52.104631 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Oct 2 19:06:52.104646 kernel: Zone ranges: Oct 2 19:06:52.104658 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:06:52.104670 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Oct 2 19:06:52.104682 kernel: Normal empty Oct 2 19:06:52.104694 kernel: Movable zone start for each node Oct 2 19:06:52.104706 kernel: Early memory node ranges Oct 2 19:06:52.110155 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 2 19:06:52.110180 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Oct 2 19:06:52.110193 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Oct 2 19:06:52.110211 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:06:52.110225 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 2 19:06:52.110238 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Oct 2 19:06:52.110250 kernel: ACPI: PM-Timer IO Port: 0xb008 Oct 2 19:06:52.110263 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:06:52.110275 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Oct 2 19:06:52.110288 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:06:52.110300 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:06:52.110313 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:06:52.110328 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:06:52.110340 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:06:52.110351 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 2 19:06:52.110364 kernel: TSC deadline timer available Oct 2 19:06:52.110377 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:06:52.110389 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Oct 2 19:06:52.110401 kernel: Booting paravirtualized kernel on KVM Oct 2 19:06:52.110414 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:06:52.110427 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:06:52.110442 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:06:52.110454 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:06:52.110466 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:06:52.110478 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Oct 2 19:06:52.110490 kernel: kvm-guest: PV spinlocks enabled Oct 2 19:06:52.110503 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:06:52.110515 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Oct 2 19:06:52.110527 kernel: Policy zone: DMA32 Oct 2 19:06:52.110542 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:06:52.110558 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:06:52.110571 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:06:52.110583 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:06:52.110595 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:06:52.110608 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 121024K reserved, 0K cma-reserved) Oct 2 19:06:52.110621 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:06:52.110633 kernel: Kernel/User page tables isolation: enabled Oct 2 19:06:52.110645 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:06:52.110659 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:06:52.110672 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:06:52.110685 kernel: rcu: RCU event tracing is enabled. Oct 2 19:06:52.110698 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:06:52.110710 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:06:52.110734 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:06:52.110746 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:06:52.110758 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:06:52.110771 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Oct 2 19:06:52.110787 kernel: random: crng init done Oct 2 19:06:52.110799 kernel: Console: colour VGA+ 80x25 Oct 2 19:06:52.110811 kernel: printk: console [ttyS0] enabled Oct 2 19:06:52.110823 kernel: ACPI: Core revision 20210730 Oct 2 19:06:52.110836 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Oct 2 19:06:52.110848 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:06:52.110860 kernel: x2apic enabled Oct 2 19:06:52.110872 kernel: Switched APIC routing to physical x2apic. Oct 2 19:06:52.110885 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240933eba6e, max_idle_ns: 440795246008 ns Oct 2 19:06:52.110899 kernel: Calibrating delay loop (skipped) preset value.. 4999.98 BogoMIPS (lpj=2499994) Oct 2 19:06:52.110911 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:06:52.110923 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:06:52.110936 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:06:52.110957 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:06:52.110973 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:06:52.110985 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:06:52.110999 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Oct 2 19:06:52.111011 kernel: RETBleed: Vulnerable Oct 2 19:06:52.111024 kernel: Speculative Store Bypass: Vulnerable Oct 2 19:06:52.111037 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:06:52.111058 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:06:52.111070 kernel: GDS: Unknown: Dependent on hypervisor status Oct 2 19:06:52.111083 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:06:52.111099 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:06:52.111111 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:06:52.111124 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Oct 2 19:06:52.111137 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Oct 2 19:06:52.111151 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Oct 2 19:06:52.111166 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Oct 2 19:06:52.111178 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Oct 2 19:06:52.111191 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Oct 2 19:06:52.111204 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:06:52.111217 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Oct 2 19:06:52.111230 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Oct 2 19:06:52.111243 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Oct 2 19:06:52.111256 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Oct 2 19:06:52.111268 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Oct 2 19:06:52.111281 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Oct 2 19:06:52.111439 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Oct 2 19:06:52.111453 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:06:52.111470 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:06:52.111483 kernel: LSM: Security Framework initializing Oct 2 19:06:52.111495 kernel: SELinux: Initializing. Oct 2 19:06:52.111508 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:06:52.111521 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:06:52.111534 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Oct 2 19:06:52.111546 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Oct 2 19:06:52.111559 kernel: signal: max sigframe size: 3632 Oct 2 19:06:52.111572 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:06:52.111585 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:06:52.111601 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:06:52.111614 kernel: x86: Booting SMP configuration: Oct 2 19:06:52.111627 kernel: .... node #0, CPUs: #1 Oct 2 19:06:52.111639 kernel: kvm-clock: cpu 1, msr 3ef8a041, secondary cpu clock Oct 2 19:06:52.111652 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Oct 2 19:06:52.111666 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Oct 2 19:06:52.111680 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:06:52.111693 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:06:52.111753 kernel: smpboot: Max logical packages: 1 Oct 2 19:06:52.111774 kernel: smpboot: Total of 2 processors activated (9999.97 BogoMIPS) Oct 2 19:06:52.111787 kernel: devtmpfs: initialized Oct 2 19:06:52.111802 kernel: x86/mm: Memory block size: 128MB Oct 2 19:06:52.111815 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:06:52.111829 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:06:52.111842 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:06:52.111855 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:06:52.111868 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:06:52.111880 kernel: audit: type=2000 audit(1696273611.277:1): state=initialized audit_enabled=0 res=1 Oct 2 19:06:52.111896 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:06:52.111909 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:06:52.111922 kernel: cpuidle: using governor menu Oct 2 19:06:52.111935 kernel: ACPI: bus type PCI registered Oct 2 19:06:52.111948 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:06:52.111960 kernel: dca service started, version 1.12.1 Oct 2 19:06:52.111973 kernel: PCI: Using configuration type 1 for base access Oct 2 19:06:52.111987 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:06:52.112000 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:06:52.112017 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:06:52.112030 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:06:52.112043 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:06:52.112055 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:06:52.112068 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:06:52.112081 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:06:52.112094 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:06:52.112106 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:06:52.112119 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Oct 2 19:06:52.112135 kernel: ACPI: Interpreter enabled Oct 2 19:06:52.112148 kernel: ACPI: PM: (supports S0 S5) Oct 2 19:06:52.112162 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:06:52.112176 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:06:52.112189 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Oct 2 19:06:52.112243 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:06:52.117767 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:06:52.117985 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Oct 2 19:06:52.118012 kernel: acpiphp: Slot [3] registered Oct 2 19:06:52.118027 kernel: acpiphp: Slot [4] registered Oct 2 19:06:52.118040 kernel: acpiphp: Slot [5] registered Oct 2 19:06:52.118054 kernel: acpiphp: Slot [6] registered Oct 2 19:06:52.118067 kernel: acpiphp: Slot [7] registered Oct 2 19:06:52.118079 kernel: acpiphp: Slot [8] registered Oct 2 19:06:52.118092 kernel: acpiphp: Slot [9] registered Oct 2 19:06:52.118105 kernel: acpiphp: Slot [10] registered Oct 2 19:06:52.118118 kernel: acpiphp: Slot [11] registered Oct 2 19:06:52.118133 kernel: acpiphp: Slot [12] registered Oct 2 19:06:52.118146 kernel: acpiphp: Slot [13] registered Oct 2 19:06:52.118159 kernel: acpiphp: Slot [14] registered Oct 2 19:06:52.118172 kernel: acpiphp: Slot [15] registered Oct 2 19:06:52.118185 kernel: acpiphp: Slot [16] registered Oct 2 19:06:52.118198 kernel: acpiphp: Slot [17] registered Oct 2 19:06:52.118211 kernel: acpiphp: Slot [18] registered Oct 2 19:06:52.118223 kernel: acpiphp: Slot [19] registered Oct 2 19:06:52.118237 kernel: acpiphp: Slot [20] registered Oct 2 19:06:52.118252 kernel: acpiphp: Slot [21] registered Oct 2 19:06:52.118265 kernel: acpiphp: Slot [22] registered Oct 2 19:06:52.118278 kernel: acpiphp: Slot [23] registered Oct 2 19:06:52.118292 kernel: acpiphp: Slot [24] registered Oct 2 19:06:52.118305 kernel: acpiphp: Slot [25] registered Oct 2 19:06:52.118317 kernel: acpiphp: Slot [26] registered Oct 2 19:06:52.118330 kernel: acpiphp: Slot [27] registered Oct 2 19:06:52.118343 kernel: acpiphp: Slot [28] registered Oct 2 19:06:52.118356 kernel: acpiphp: Slot [29] registered Oct 2 19:06:52.118368 kernel: acpiphp: Slot [30] registered Oct 2 19:06:52.118384 kernel: acpiphp: Slot [31] registered Oct 2 19:06:52.118397 kernel: PCI host bridge to bus 0000:00 Oct 2 19:06:52.118529 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:06:52.118637 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:06:52.118755 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:06:52.119577 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Oct 2 19:06:52.119726 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:06:52.119876 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:06:52.120007 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Oct 2 19:06:52.120136 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Oct 2 19:06:52.120258 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Oct 2 19:06:52.120375 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Oct 2 19:06:52.120493 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Oct 2 19:06:52.120609 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Oct 2 19:06:52.120738 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Oct 2 19:06:52.120858 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Oct 2 19:06:52.120975 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Oct 2 19:06:52.121091 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Oct 2 19:06:52.121205 kernel: pci 0000:00:01.3: quirk_piix4_acpi+0x0/0x170 took 10742 usecs Oct 2 19:06:52.121327 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Oct 2 19:06:52.121443 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Oct 2 19:06:52.121562 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Oct 2 19:06:52.121681 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:06:52.121815 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Oct 2 19:06:52.121932 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Oct 2 19:06:52.122057 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Oct 2 19:06:52.122174 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Oct 2 19:06:52.122195 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:06:52.122208 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:06:52.122221 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:06:52.122234 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:06:52.122249 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:06:52.122349 kernel: iommu: Default domain type: Translated Oct 2 19:06:52.122371 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:06:52.122505 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Oct 2 19:06:52.122628 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:06:52.122783 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Oct 2 19:06:52.122801 kernel: vgaarb: loaded Oct 2 19:06:52.122814 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:06:52.122828 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:06:52.122841 kernel: PTP clock support registered Oct 2 19:06:52.122855 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:06:52.122869 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:06:52.122882 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 2 19:06:52.122899 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Oct 2 19:06:52.122912 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Oct 2 19:06:52.122926 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Oct 2 19:06:52.122940 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:06:52.122954 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:06:52.122968 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:06:52.122981 kernel: pnp: PnP ACPI init Oct 2 19:06:52.122993 kernel: pnp: PnP ACPI: found 5 devices Oct 2 19:06:52.123006 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:06:52.123022 kernel: NET: Registered PF_INET protocol family Oct 2 19:06:52.123034 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:06:52.123056 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 2 19:06:52.123069 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:06:52.123082 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:06:52.123095 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 19:06:52.123108 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 2 19:06:52.123121 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:06:52.123135 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:06:52.123152 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:06:52.123165 kernel: NET: Registered PF_XDP protocol family Oct 2 19:06:52.123354 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:06:52.123466 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:06:52.123572 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:06:52.123679 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Oct 2 19:06:52.123811 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:06:52.123935 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Oct 2 19:06:52.123956 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:06:52.123970 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:06:52.123984 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240933eba6e, max_idle_ns: 440795246008 ns Oct 2 19:06:52.123998 kernel: clocksource: Switched to clocksource tsc Oct 2 19:06:52.124012 kernel: Initialise system trusted keyrings Oct 2 19:06:52.124025 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 2 19:06:52.124038 kernel: Key type asymmetric registered Oct 2 19:06:52.124051 kernel: Asymmetric key parser 'x509' registered Oct 2 19:06:52.124067 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:06:52.124080 kernel: io scheduler mq-deadline registered Oct 2 19:06:52.124092 kernel: io scheduler kyber registered Oct 2 19:06:52.124107 kernel: io scheduler bfq registered Oct 2 19:06:52.124120 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:06:52.124134 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:06:52.124147 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:06:52.124159 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:06:52.124172 kernel: i8042: Warning: Keylock active Oct 2 19:06:52.124189 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:06:52.124202 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:06:52.124333 kernel: rtc_cmos 00:00: RTC can wake from S4 Oct 2 19:06:52.124445 kernel: rtc_cmos 00:00: registered as rtc0 Oct 2 19:06:52.124556 kernel: rtc_cmos 00:00: setting system clock to 2023-10-02T19:06:51 UTC (1696273611) Oct 2 19:06:52.124666 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Oct 2 19:06:52.124681 kernel: intel_pstate: CPU model not supported Oct 2 19:06:52.124694 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:06:52.124711 kernel: Segment Routing with IPv6 Oct 2 19:06:52.124734 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:06:52.124747 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:06:52.124759 kernel: Key type dns_resolver registered Oct 2 19:06:52.124772 kernel: IPI shorthand broadcast: enabled Oct 2 19:06:52.124786 kernel: sched_clock: Marking stable (455443532, 321747437)->(904379846, -127188877) Oct 2 19:06:52.124799 kernel: registered taskstats version 1 Oct 2 19:06:52.124811 kernel: Loading compiled-in X.509 certificates Oct 2 19:06:52.124824 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:06:52.124839 kernel: Key type .fscrypt registered Oct 2 19:06:52.124853 kernel: Key type fscrypt-provisioning registered Oct 2 19:06:52.124866 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:06:52.124879 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:06:52.124893 kernel: ima: No architecture policies found Oct 2 19:06:52.124906 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:06:52.124919 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:06:52.124932 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:06:52.124945 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:06:52.124961 kernel: Run /init as init process Oct 2 19:06:52.124974 kernel: with arguments: Oct 2 19:06:52.124987 kernel: /init Oct 2 19:06:52.125000 kernel: with environment: Oct 2 19:06:52.125012 kernel: HOME=/ Oct 2 19:06:52.125024 kernel: TERM=linux Oct 2 19:06:52.125037 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:06:52.125054 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:06:52.125072 systemd[1]: Detected virtualization amazon. Oct 2 19:06:52.125087 systemd[1]: Detected architecture x86-64. Oct 2 19:06:52.125100 systemd[1]: Running in initrd. Oct 2 19:06:52.125114 systemd[1]: No hostname configured, using default hostname. Oct 2 19:06:52.125141 systemd[1]: Hostname set to . Oct 2 19:06:52.125161 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:06:52.125176 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:06:52.125190 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:06:52.125204 systemd[1]: Reached target cryptsetup.target. Oct 2 19:06:52.125219 systemd[1]: Reached target paths.target. Oct 2 19:06:52.125233 systemd[1]: Reached target slices.target. Oct 2 19:06:52.125247 systemd[1]: Reached target swap.target. Oct 2 19:06:52.125261 systemd[1]: Reached target timers.target. Oct 2 19:06:52.125279 systemd[1]: Listening on iscsid.socket. Oct 2 19:06:52.125294 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:06:52.125308 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:06:52.125325 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:06:52.125339 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:06:52.125355 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:06:52.125369 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:06:52.125383 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:06:52.125396 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:06:52.125412 systemd[1]: Reached target sockets.target. Oct 2 19:06:52.125426 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:06:52.125440 systemd[1]: Finished network-cleanup.service. Oct 2 19:06:52.125454 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:06:52.125469 systemd[1]: Starting systemd-journald.service... Oct 2 19:06:52.125483 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:06:52.125497 systemd[1]: Starting systemd-resolved.service... Oct 2 19:06:52.125511 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:06:52.125527 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:06:52.125544 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:06:52.125559 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:06:52.125573 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:06:52.125594 systemd-journald[185]: Journal started Oct 2 19:06:52.125664 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2199eff7fd12270bde7cda64b559e2) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:06:52.094816 systemd-resolved[187]: Positive Trust Anchors: Oct 2 19:06:52.221919 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:06:52.221963 kernel: Bridge firewalling registered Oct 2 19:06:52.221981 kernel: SCSI subsystem initialized Oct 2 19:06:52.221998 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:06:52.222018 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:06:52.222038 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:06:52.094826 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:06:52.234933 systemd[1]: Started systemd-resolved.service. Oct 2 19:06:52.234971 kernel: audit: type=1130 audit(1696273612.223:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.094860 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:06:52.250672 systemd[1]: Started systemd-journald.service. Oct 2 19:06:52.250733 kernel: audit: type=1130 audit(1696273612.234:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.099703 systemd-resolved[187]: Defaulting to hostname 'linux'. Oct 2 19:06:52.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.099762 systemd-modules-load[186]: Inserted module 'overlay' Oct 2 19:06:52.258117 kernel: audit: type=1130 audit(1696273612.249:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.149875 systemd-modules-load[186]: Inserted module 'br_netfilter' Oct 2 19:06:52.189831 systemd-modules-load[186]: Inserted module 'dm_multipath' Oct 2 19:06:52.251308 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:06:52.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.265769 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:06:52.273095 kernel: audit: type=1130 audit(1696273612.264:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.273317 systemd[1]: Reached target nss-lookup.target. Oct 2 19:06:52.282179 kernel: audit: type=1130 audit(1696273612.272:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.283251 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:06:52.285501 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:06:52.297194 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:06:52.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.310385 kernel: audit: type=1130 audit(1696273612.298:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.311441 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:06:52.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.325037 kernel: audit: type=1130 audit(1696273612.316:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.323581 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:06:52.338083 dracut-cmdline[206]: dracut-dracut-053 Oct 2 19:06:52.341643 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:06:52.408740 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:06:52.432838 kernel: iscsi: registered transport (tcp) Oct 2 19:06:52.457821 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:06:52.457879 kernel: QLogic iSCSI HBA Driver Oct 2 19:06:52.512046 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:06:52.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.517299 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:06:52.526574 kernel: audit: type=1130 audit(1696273612.513:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:52.586786 kernel: raid6: avx512x4 gen() 13844 MB/s Oct 2 19:06:52.602774 kernel: raid6: avx512x4 xor() 6339 MB/s Oct 2 19:06:52.620770 kernel: raid6: avx512x2 gen() 14954 MB/s Oct 2 19:06:52.638755 kernel: raid6: avx512x2 xor() 19423 MB/s Oct 2 19:06:52.655809 kernel: raid6: avx512x1 gen() 13885 MB/s Oct 2 19:06:52.672773 kernel: raid6: avx512x1 xor() 17433 MB/s Oct 2 19:06:52.690771 kernel: raid6: avx2x4 gen() 11737 MB/s Oct 2 19:06:52.708769 kernel: raid6: avx2x4 xor() 6380 MB/s Oct 2 19:06:52.728745 kernel: raid6: avx2x2 gen() 7136 MB/s Oct 2 19:06:52.746387 kernel: raid6: avx2x2 xor() 11829 MB/s Oct 2 19:06:52.767893 kernel: raid6: avx2x1 gen() 5844 MB/s Oct 2 19:06:52.785971 kernel: raid6: avx2x1 xor() 4668 MB/s Oct 2 19:06:52.807869 kernel: raid6: sse2x4 gen() 2540 MB/s Oct 2 19:06:52.825768 kernel: raid6: sse2x4 xor() 1641 MB/s Oct 2 19:06:52.844802 kernel: raid6: sse2x2 gen() 3868 MB/s Oct 2 19:06:52.862191 kernel: raid6: sse2x2 xor() 5488 MB/s Oct 2 19:06:52.878754 kernel: raid6: sse2x1 gen() 4196 MB/s Oct 2 19:06:52.901235 kernel: raid6: sse2x1 xor() 3461 MB/s Oct 2 19:06:52.901308 kernel: raid6: using algorithm avx512x2 gen() 14954 MB/s Oct 2 19:06:52.901340 kernel: raid6: .... xor() 19423 MB/s, rmw enabled Oct 2 19:06:52.905748 kernel: raid6: using avx512x2 recovery algorithm Oct 2 19:06:52.926745 kernel: xor: automatically using best checksumming function avx Oct 2 19:06:53.096747 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:06:53.108009 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:06:53.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:53.111499 systemd[1]: Starting systemd-udevd.service... Oct 2 19:06:53.118401 kernel: audit: type=1130 audit(1696273613.109:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:53.109000 audit: BPF prog-id=7 op=LOAD Oct 2 19:06:53.110000 audit: BPF prog-id=8 op=LOAD Oct 2 19:06:53.132973 systemd-udevd[383]: Using default interface naming scheme 'v252'. Oct 2 19:06:53.144144 systemd[1]: Started systemd-udevd.service. Oct 2 19:06:53.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:53.146087 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:06:53.163061 dracut-pre-trigger[386]: rd.md=0: removing MD RAID activation Oct 2 19:06:53.215429 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:06:53.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:53.220294 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:06:53.281166 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:06:53.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:53.378910 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:06:53.392734 kernel: nvme nvme0: pci function 0000:00:04.0 Oct 2 19:06:53.395463 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Oct 2 19:06:53.408737 kernel: nvme nvme0: 2/0/0 default/read/poll queues Oct 2 19:06:53.412742 kernel: ena 0000:00:05.0: ENA device version: 0.10 Oct 2 19:06:53.413056 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Oct 2 19:06:53.416740 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Oct 2 19:06:53.418761 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:06:53.418831 kernel: GPT:9289727 != 16777215 Oct 2 19:06:53.418849 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:06:53.418868 kernel: GPT:9289727 != 16777215 Oct 2 19:06:53.418885 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:06:53.418902 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:06:53.421733 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:5b:d9:58:7c:73 Oct 2 19:06:53.423104 (udev-worker)[442]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:06:53.658132 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:06:53.658160 kernel: AES CTR mode by8 optimization enabled Oct 2 19:06:53.658172 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (440) Oct 2 19:06:53.574042 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:06:53.667070 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:06:53.678181 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:06:53.679899 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:06:53.697491 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:06:53.700667 systemd[1]: Starting disk-uuid.service... Oct 2 19:06:53.709408 disk-uuid[583]: Primary Header is updated. Oct 2 19:06:53.709408 disk-uuid[583]: Secondary Entries is updated. Oct 2 19:06:53.709408 disk-uuid[583]: Secondary Header is updated. Oct 2 19:06:53.717745 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:06:53.724737 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:06:54.731489 disk-uuid[584]: The operation has completed successfully. Oct 2 19:06:54.733516 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:06:54.885506 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:06:54.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.885620 systemd[1]: Finished disk-uuid.service. Oct 2 19:06:54.899489 systemd[1]: Starting verity-setup.service... Oct 2 19:06:54.932737 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:06:55.025901 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:06:55.028939 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:06:55.034573 systemd[1]: Finished verity-setup.service. Oct 2 19:06:55.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:55.170756 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:06:55.171336 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:06:55.171804 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:06:55.173284 systemd[1]: Starting ignition-setup.service... Oct 2 19:06:55.189847 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:06:55.208191 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:06:55.208306 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:06:55.208333 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:06:55.236743 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:06:55.253353 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:06:55.280781 systemd[1]: Finished ignition-setup.service. Oct 2 19:06:55.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:55.285780 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:06:55.306800 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:06:55.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:55.309000 audit: BPF prog-id=9 op=LOAD Oct 2 19:06:55.311141 systemd[1]: Starting systemd-networkd.service... Oct 2 19:06:55.355261 systemd-networkd[1013]: lo: Link UP Oct 2 19:06:55.355272 systemd-networkd[1013]: lo: Gained carrier Oct 2 19:06:55.355989 systemd-networkd[1013]: Enumeration completed Oct 2 19:06:55.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:55.356110 systemd[1]: Started systemd-networkd.service. Oct 2 19:06:55.356497 systemd-networkd[1013]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:06:55.359665 systemd[1]: Reached target network.target. Oct 2 19:06:55.368381 systemd[1]: Starting iscsiuio.service... Oct 2 19:06:55.369202 systemd-networkd[1013]: eth0: Link UP Oct 2 19:06:55.369208 systemd-networkd[1013]: eth0: Gained carrier Oct 2 19:06:55.381344 systemd[1]: Started iscsiuio.service. Oct 2 19:06:55.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:55.382373 systemd[1]: Starting iscsid.service... Oct 2 19:06:55.387268 iscsid[1018]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:06:55.387268 iscsid[1018]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:06:55.387268 iscsid[1018]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:06:55.387268 iscsid[1018]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:06:55.387268 iscsid[1018]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:06:55.410539 iscsid[1018]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:06:55.406883 systemd-networkd[1013]: eth0: DHCPv4 address 172.31.27.162/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:06:55.412403 systemd[1]: Started iscsid.service. Oct 2 19:06:55.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:55.417698 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:06:55.430619 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:06:55.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:55.439961 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:06:55.442006 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:06:55.442120 systemd[1]: Reached target remote-fs.target. Oct 2 19:06:55.454440 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:06:55.468623 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:06:55.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:55.974072 ignition[999]: Ignition 2.14.0 Oct 2 19:06:55.974088 ignition[999]: Stage: fetch-offline Oct 2 19:06:55.974244 ignition[999]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:06:55.974302 ignition[999]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:06:56.004148 ignition[999]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:06:56.004619 ignition[999]: Ignition finished successfully Oct 2 19:06:56.008161 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:06:56.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:56.011271 systemd[1]: Starting ignition-fetch.service... Oct 2 19:06:56.021487 ignition[1037]: Ignition 2.14.0 Oct 2 19:06:56.021500 ignition[1037]: Stage: fetch Oct 2 19:06:56.021702 ignition[1037]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:06:56.021750 ignition[1037]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:06:56.032050 ignition[1037]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:06:56.033779 ignition[1037]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:06:56.065705 ignition[1037]: INFO : PUT result: OK Oct 2 19:06:56.071945 ignition[1037]: DEBUG : parsed url from cmdline: "" Oct 2 19:06:56.071945 ignition[1037]: INFO : no config URL provided Oct 2 19:06:56.071945 ignition[1037]: INFO : reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:06:56.071945 ignition[1037]: INFO : no config at "/usr/lib/ignition/user.ign" Oct 2 19:06:56.079197 ignition[1037]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:06:56.079197 ignition[1037]: INFO : PUT result: OK Oct 2 19:06:56.079197 ignition[1037]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Oct 2 19:06:56.085808 ignition[1037]: INFO : GET result: OK Oct 2 19:06:56.085808 ignition[1037]: DEBUG : parsing config with SHA512: 34ad98110d2d70cf0a40f5e94d990a22ddb31ed0bdf06fb15ddbf7e14a10bba2a61668281cf060512869dac3c4e0c1fd0fee8d2374430f2535493226ee5b1746 Oct 2 19:06:56.123466 unknown[1037]: fetched base config from "system" Oct 2 19:06:56.124008 unknown[1037]: fetched base config from "system" Oct 2 19:06:56.124028 unknown[1037]: fetched user config from "aws" Oct 2 19:06:56.125391 ignition[1037]: fetch: fetch complete Oct 2 19:06:56.125400 ignition[1037]: fetch: fetch passed Oct 2 19:06:56.129257 systemd[1]: Finished ignition-fetch.service. Oct 2 19:06:56.140534 kernel: kauditd_printk_skb: 17 callbacks suppressed Oct 2 19:06:56.141072 kernel: audit: type=1130 audit(1696273616.131:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:56.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:56.125457 ignition[1037]: Ignition finished successfully Oct 2 19:06:56.132557 systemd[1]: Starting ignition-kargs.service... Oct 2 19:06:56.159859 ignition[1043]: Ignition 2.14.0 Oct 2 19:06:56.159932 ignition[1043]: Stage: kargs Oct 2 19:06:56.160215 ignition[1043]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:06:56.160244 ignition[1043]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:06:56.189175 ignition[1043]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:06:56.193987 ignition[1043]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:06:56.197272 ignition[1043]: INFO : PUT result: OK Oct 2 19:06:56.200621 ignition[1043]: kargs: kargs passed Oct 2 19:06:56.200675 ignition[1043]: Ignition finished successfully Oct 2 19:06:56.202851 systemd[1]: Finished ignition-kargs.service. Oct 2 19:06:56.212014 kernel: audit: type=1130 audit(1696273616.204:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:56.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:56.205669 systemd[1]: Starting ignition-disks.service... Oct 2 19:06:56.218502 ignition[1049]: Ignition 2.14.0 Oct 2 19:06:56.218516 ignition[1049]: Stage: disks Oct 2 19:06:56.218841 ignition[1049]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:06:56.218872 ignition[1049]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:06:56.229436 ignition[1049]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:06:56.231054 ignition[1049]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:06:56.233353 ignition[1049]: INFO : PUT result: OK Oct 2 19:06:56.237342 ignition[1049]: disks: disks passed Oct 2 19:06:56.238172 ignition[1049]: Ignition finished successfully Oct 2 19:06:56.241819 systemd[1]: Finished ignition-disks.service. Oct 2 19:06:56.246150 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:06:56.260937 kernel: audit: type=1130 audit(1696273616.245:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:56.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:56.260933 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:06:56.263598 systemd[1]: Reached target local-fs.target. Oct 2 19:06:56.264700 systemd[1]: Reached target sysinit.target. Oct 2 19:06:56.277967 systemd[1]: Reached target basic.target. Oct 2 19:06:56.282390 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:06:56.315826 systemd-fsck[1057]: ROOT: clean, 603/553520 files, 56012/553472 blocks Oct 2 19:06:56.322740 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:06:56.330303 kernel: audit: type=1130 audit(1696273616.323:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:56.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:56.330750 systemd[1]: Mounting sysroot.mount... Oct 2 19:06:56.345739 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:06:56.346960 systemd[1]: Mounted sysroot.mount. Oct 2 19:06:56.349224 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:06:56.362168 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:06:56.371877 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:06:56.371934 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:06:56.371967 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:06:56.387848 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:06:56.394633 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:06:56.397466 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:06:56.418838 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1074) Oct 2 19:06:56.418899 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:06:56.418912 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:06:56.418923 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:06:56.418995 initrd-setup-root[1079]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:06:56.430744 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:06:56.437074 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:06:56.442118 initrd-setup-root[1105]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:06:56.449886 initrd-setup-root[1113]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:06:56.457620 initrd-setup-root[1121]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:06:56.572824 systemd-networkd[1013]: eth0: Gained IPv6LL Oct 2 19:06:56.695773 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:06:56.703931 kernel: audit: type=1130 audit(1696273616.696:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:56.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:56.698093 systemd[1]: Starting ignition-mount.service... Oct 2 19:06:56.707908 systemd[1]: Starting sysroot-boot.service... Oct 2 19:06:56.711146 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:06:56.711274 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:06:56.746555 ignition[1140]: INFO : Ignition 2.14.0 Oct 2 19:06:56.746555 ignition[1140]: INFO : Stage: mount Oct 2 19:06:56.749376 ignition[1140]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:06:56.749376 ignition[1140]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:06:56.762915 ignition[1140]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:06:56.765012 ignition[1140]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:06:56.769990 ignition[1140]: INFO : PUT result: OK Oct 2 19:06:56.769382 systemd[1]: Finished sysroot-boot.service. Oct 2 19:06:56.773574 ignition[1140]: INFO : mount: mount passed Oct 2 19:06:56.780216 kernel: audit: type=1130 audit(1696273616.770:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:56.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:56.779981 systemd[1]: Finished ignition-mount.service. Oct 2 19:06:56.793432 kernel: audit: type=1130 audit(1696273616.782:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:56.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:56.793537 ignition[1140]: INFO : Ignition finished successfully Oct 2 19:06:56.789846 systemd[1]: Starting ignition-files.service... Oct 2 19:06:56.806856 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:06:56.820746 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1149) Oct 2 19:06:56.824838 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:06:56.824905 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:06:56.824923 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:06:56.831744 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:06:56.834301 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:06:56.849984 ignition[1168]: INFO : Ignition 2.14.0 Oct 2 19:06:56.849984 ignition[1168]: INFO : Stage: files Oct 2 19:06:56.852937 ignition[1168]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:06:56.852937 ignition[1168]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:06:56.872755 ignition[1168]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:06:56.877593 ignition[1168]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:06:56.881481 ignition[1168]: INFO : PUT result: OK Oct 2 19:06:56.887251 ignition[1168]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:06:56.892518 ignition[1168]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:06:56.892518 ignition[1168]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:06:56.916116 ignition[1168]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:06:56.919622 ignition[1168]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:06:56.923139 unknown[1168]: wrote ssh authorized keys file for user: core Oct 2 19:06:56.925411 ignition[1168]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:06:56.927855 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:06:56.930119 ignition[1168]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Oct 2 19:06:57.279244 ignition[1168]: INFO : GET result: OK Oct 2 19:06:57.506929 ignition[1168]: DEBUG : file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Oct 2 19:06:57.510158 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:06:57.510158 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Oct 2 19:06:57.510158 ignition[1168]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:06:57.604991 ignition[1168]: INFO : GET result: OK Oct 2 19:06:57.767480 ignition[1168]: DEBUG : file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Oct 2 19:06:57.771066 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Oct 2 19:06:57.771066 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:06:57.771066 ignition[1168]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:06:57.781018 ignition[1168]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2933897303" Oct 2 19:06:57.786061 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1168) Oct 2 19:06:57.786188 ignition[1168]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2933897303": device or resource busy Oct 2 19:06:57.786188 ignition[1168]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2933897303", trying btrfs: device or resource busy Oct 2 19:06:57.786188 ignition[1168]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2933897303" Oct 2 19:06:57.794318 ignition[1168]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2933897303" Oct 2 19:06:57.800234 ignition[1168]: INFO : op(3): [started] unmounting "/mnt/oem2933897303" Oct 2 19:06:57.802277 ignition[1168]: INFO : op(3): [finished] unmounting "/mnt/oem2933897303" Oct 2 19:06:57.802277 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:06:57.802277 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:06:57.802277 ignition[1168]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:06:57.801751 systemd[1]: mnt-oem2933897303.mount: Deactivated successfully. Oct 2 19:06:57.964784 ignition[1168]: INFO : GET result: OK Oct 2 19:06:58.531428 ignition[1168]: DEBUG : file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Oct 2 19:06:58.537328 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:06:58.537328 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:06:58.537328 ignition[1168]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:06:58.588575 ignition[1168]: INFO : GET result: OK Oct 2 19:06:59.370061 ignition[1168]: DEBUG : file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Oct 2 19:06:59.374325 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:06:59.374325 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:06:59.374325 ignition[1168]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:06:59.423837 ignition[1168]: INFO : GET result: OK Oct 2 19:07:00.389480 ignition[1168]: DEBUG : file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Oct 2 19:07:00.392903 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:07:00.392903 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:07:00.392903 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:07:00.392903 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:07:00.405908 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:07:00.405908 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:07:00.405908 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:07:00.405908 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:07:00.405908 ignition[1168]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:07:00.423623 ignition[1168]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1776667966" Oct 2 19:07:00.423623 ignition[1168]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1776667966": device or resource busy Oct 2 19:07:00.423623 ignition[1168]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1776667966", trying btrfs: device or resource busy Oct 2 19:07:00.423623 ignition[1168]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1776667966" Oct 2 19:07:00.434827 ignition[1168]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1776667966" Oct 2 19:07:00.434827 ignition[1168]: INFO : op(6): [started] unmounting "/mnt/oem1776667966" Oct 2 19:07:00.438447 ignition[1168]: INFO : op(6): [finished] unmounting "/mnt/oem1776667966" Oct 2 19:07:00.438447 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:07:00.438447 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:07:00.438447 ignition[1168]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:07:00.434941 systemd[1]: mnt-oem1776667966.mount: Deactivated successfully. Oct 2 19:07:00.467307 ignition[1168]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem88817160" Oct 2 19:07:00.469631 ignition[1168]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem88817160": device or resource busy Oct 2 19:07:00.469631 ignition[1168]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem88817160", trying btrfs: device or resource busy Oct 2 19:07:00.469631 ignition[1168]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem88817160" Oct 2 19:07:00.487551 ignition[1168]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem88817160" Oct 2 19:07:00.487551 ignition[1168]: INFO : op(9): [started] unmounting "/mnt/oem88817160" Oct 2 19:07:00.487528 systemd[1]: mnt-oem88817160.mount: Deactivated successfully. Oct 2 19:07:00.492338 ignition[1168]: INFO : op(9): [finished] unmounting "/mnt/oem88817160" Oct 2 19:07:00.492338 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:07:00.496280 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:07:00.496280 ignition[1168]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:07:00.515952 ignition[1168]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2386104860" Oct 2 19:07:00.518665 ignition[1168]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2386104860": device or resource busy Oct 2 19:07:00.518665 ignition[1168]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2386104860", trying btrfs: device or resource busy Oct 2 19:07:00.518665 ignition[1168]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2386104860" Oct 2 19:07:00.518665 ignition[1168]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2386104860" Oct 2 19:07:00.518665 ignition[1168]: INFO : op(c): [started] unmounting "/mnt/oem2386104860" Oct 2 19:07:00.518665 ignition[1168]: INFO : op(c): [finished] unmounting "/mnt/oem2386104860" Oct 2 19:07:00.518665 ignition[1168]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:07:00.518665 ignition[1168]: INFO : files: op(f): [started] processing unit "nvidia.service" Oct 2 19:07:00.518665 ignition[1168]: INFO : files: op(f): [finished] processing unit "nvidia.service" Oct 2 19:07:00.518665 ignition[1168]: INFO : files: op(10): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:07:00.518665 ignition[1168]: INFO : files: op(10): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:07:00.518665 ignition[1168]: INFO : files: op(11): [started] processing unit "amazon-ssm-agent.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(11): op(12): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(11): op(12): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(11): [finished] processing unit "amazon-ssm-agent.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(13): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(13): op(14): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(13): op(14): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(13): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(15): [started] processing unit "prepare-critools.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(15): op(16): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(15): op(16): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(15): [finished] processing unit "prepare-critools.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(17): [started] setting preset to enabled for "nvidia.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(17): [finished] setting preset to enabled for "nvidia.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(18): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(18): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(19): [started] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(19): [finished] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:07:00.559819 ignition[1168]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:07:00.661274 kernel: audit: type=1130 audit(1696273620.606:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:00.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:00.661401 ignition[1168]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:07:00.661401 ignition[1168]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:07:00.661401 ignition[1168]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:07:00.661401 ignition[1168]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:07:00.661401 ignition[1168]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:07:00.661401 ignition[1168]: INFO : files: files passed Oct 2 19:07:00.661401 ignition[1168]: INFO : Ignition finished successfully Oct 2 19:07:00.586527 systemd[1]: Finished ignition-files.service. Oct 2 19:07:00.691640 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:07:00.703929 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:07:00.705073 systemd[1]: Starting ignition-quench.service... Oct 2 19:07:00.726503 kernel: audit: type=1130 audit(1696273620.710:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:00.726538 kernel: audit: type=1131 audit(1696273620.713:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:00.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:00.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:00.726668 initrd-setup-root-after-ignition[1194]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:07:00.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:00.709318 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:07:00.709443 systemd[1]: Finished ignition-quench.service. Oct 2 19:07:00.722729 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:07:00.727048 systemd[1]: Reached target ignition-complete.target. Oct 2 19:07:00.733471 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:07:00.766816 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:07:00.766957 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:07:00.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:00.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:00.770966 systemd[1]: Reached target initrd-fs.target. Oct 2 19:07:00.779162 systemd[1]: Reached target initrd.target. Oct 2 19:07:00.782077 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:07:00.785592 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:07:00.804706 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:07:00.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:00.810028 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:07:00.863394 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:07:00.868339 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:07:00.875357 systemd[1]: Stopped target timers.target. Oct 2 19:07:00.879203 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:07:00.879411 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:07:00.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:00.884662 systemd[1]: Stopped target initrd.target. Oct 2 19:07:00.887051 systemd[1]: Stopped target basic.target. Oct 2 19:07:00.891410 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:07:00.897761 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:07:00.907884 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:07:00.913769 systemd[1]: Stopped target remote-fs.target. Oct 2 19:07:00.914426 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:07:00.919522 systemd[1]: Stopped target sysinit.target. Oct 2 19:07:00.921022 systemd[1]: Stopped target local-fs.target. Oct 2 19:07:00.925953 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:07:00.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:00.929551 systemd[1]: Stopped target swap.target. Oct 2 19:07:00.930668 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:07:00.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:00.930810 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:07:00.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:00.931550 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:07:00.936421 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:07:00.936609 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:07:00.941577 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:07:00.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:00.941752 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:07:00.954414 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:07:00.961800 systemd[1]: Stopped ignition-files.service. Oct 2 19:07:01.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.000421 systemd[1]: Stopping ignition-mount.service... Oct 2 19:07:01.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.017447 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:07:01.022647 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:07:01.025163 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:07:01.034491 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:07:01.036839 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:07:01.054092 ignition[1207]: INFO : Ignition 2.14.0 Oct 2 19:07:01.054092 ignition[1207]: INFO : Stage: umount Oct 2 19:07:01.054092 ignition[1207]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:07:01.054092 ignition[1207]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:07:01.059850 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:07:01.059981 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:07:01.069759 ignition[1207]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:07:01.070833 ignition[1207]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:07:01.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.083672 ignition[1207]: INFO : PUT result: OK Oct 2 19:07:01.090147 ignition[1207]: INFO : umount: umount passed Oct 2 19:07:01.091665 ignition[1207]: INFO : Ignition finished successfully Oct 2 19:07:01.091813 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:07:01.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.091932 systemd[1]: Stopped ignition-mount.service. Oct 2 19:07:01.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.094195 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:07:01.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.094250 systemd[1]: Stopped ignition-disks.service. Oct 2 19:07:01.097424 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:07:01.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.097501 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:07:01.099770 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:07:01.099840 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:07:01.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.104647 systemd[1]: Stopped target network.target. Oct 2 19:07:01.107391 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:07:01.107489 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:07:01.111500 systemd[1]: Stopped target paths.target. Oct 2 19:07:01.114365 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:07:01.122380 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:07:01.124877 systemd[1]: Stopped target slices.target. Oct 2 19:07:01.127523 systemd[1]: Stopped target sockets.target. Oct 2 19:07:01.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.134206 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:07:01.183304 kernel: kauditd_printk_skb: 18 callbacks suppressed Oct 2 19:07:01.183418 kernel: audit: type=1131 audit(1696273621.153:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.137657 systemd[1]: Closed iscsid.socket. Oct 2 19:07:01.142498 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:07:01.142541 systemd[1]: Closed iscsiuio.socket. Oct 2 19:07:01.205464 kernel: audit: type=1131 audit(1696273621.194:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.146282 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:07:01.223808 kernel: audit: type=1131 audit(1696273621.208:58): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.146513 systemd[1]: Stopped ignition-setup.service. Oct 2 19:07:01.153786 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:07:01.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.183427 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:07:01.248052 kernel: audit: type=1131 audit(1696273621.227:59): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.248106 kernel: audit: type=1334 audit(1696273621.245:60): prog-id=6 op=UNLOAD Oct 2 19:07:01.245000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:07:01.190990 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:07:01.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.192149 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:07:01.262376 kernel: audit: type=1131 audit(1696273621.247:61): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.193741 systemd-networkd[1013]: eth0: DHCPv6 lease lost Oct 2 19:07:01.201639 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:07:01.320528 kernel: audit: type=1131 audit(1696273621.270:62): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.205460 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:07:01.327930 kernel: audit: type=1334 audit(1696273621.316:63): prog-id=9 op=UNLOAD Oct 2 19:07:01.316000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:07:01.209840 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:07:01.210334 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:07:01.228933 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:07:01.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.228971 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:07:01.353587 kernel: audit: type=1131 audit(1696273621.333:64): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.353640 kernel: audit: type=1131 audit(1696273621.351:65): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.231932 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:07:01.232014 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:07:01.250647 systemd[1]: Stopping network-cleanup.service... Oct 2 19:07:01.257554 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:07:01.257654 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:07:01.270677 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:07:01.315355 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:07:01.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.341332 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:07:01.341401 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:07:01.352166 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:07:01.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.387050 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:07:01.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.389834 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:07:01.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.398776 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:07:01.398861 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:07:01.405128 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:07:01.405182 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:07:01.421956 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:07:01.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.422836 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:07:01.429478 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:07:01.429572 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:07:01.433559 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:07:01.433639 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:07:01.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.442042 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:07:01.472540 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 19:07:01.472658 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 19:07:01.479239 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:07:01.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.479312 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:07:01.501187 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:07:01.501260 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:07:01.546134 systemd[1]: mnt-oem2386104860.mount: Deactivated successfully. Oct 2 19:07:01.546300 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:07:01.550582 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:07:01.550661 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 2 19:07:01.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.555295 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:07:01.555492 systemd[1]: Stopped network-cleanup.service. Oct 2 19:07:01.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:01.563221 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:07:01.564384 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:07:01.575865 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:07:01.579529 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:07:01.633338 systemd[1]: Switching root. Oct 2 19:07:01.681730 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Oct 2 19:07:01.681816 systemd-journald[185]: Journal stopped Oct 2 19:07:07.846229 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:07:07.846311 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:07:07.846335 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:07:07.846357 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:07:07.846375 kernel: SELinux: policy capability open_perms=1 Oct 2 19:07:07.846392 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:07:07.846410 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:07:07.846431 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:07:07.846449 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:07:07.846467 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:07:07.846490 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:07:07.846510 systemd[1]: Successfully loaded SELinux policy in 107.549ms. Oct 2 19:07:07.846535 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 13.021ms. Oct 2 19:07:07.846559 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:07:07.846580 systemd[1]: Detected virtualization amazon. Oct 2 19:07:07.846599 systemd[1]: Detected architecture x86-64. Oct 2 19:07:07.846619 systemd[1]: Detected first boot. Oct 2 19:07:07.846640 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:07:07.846659 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:07:07.846678 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:07:07.846701 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:07:07.846734 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:07:07.846756 kernel: kauditd_printk_skb: 17 callbacks suppressed Oct 2 19:07:07.846774 kernel: audit: type=1334 audit(1696273627.481:83): prog-id=12 op=LOAD Oct 2 19:07:07.846792 kernel: audit: type=1334 audit(1696273627.481:84): prog-id=3 op=UNLOAD Oct 2 19:07:07.846812 kernel: audit: type=1334 audit(1696273627.482:85): prog-id=13 op=LOAD Oct 2 19:07:07.846829 kernel: audit: type=1334 audit(1696273627.486:86): prog-id=14 op=LOAD Oct 2 19:07:07.846846 kernel: audit: type=1334 audit(1696273627.486:87): prog-id=4 op=UNLOAD Oct 2 19:07:07.846862 kernel: audit: type=1334 audit(1696273627.486:88): prog-id=5 op=UNLOAD Oct 2 19:07:07.846880 kernel: audit: type=1131 audit(1696273627.492:89): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.846898 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:07:07.846916 kernel: audit: type=1334 audit(1696273627.499:90): prog-id=12 op=UNLOAD Oct 2 19:07:07.846934 systemd[1]: Stopped iscsiuio.service. Oct 2 19:07:07.846952 kernel: audit: type=1131 audit(1696273627.504:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.846973 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:07:07.847013 systemd[1]: Stopped iscsid.service. Oct 2 19:07:07.847032 kernel: audit: type=1131 audit(1696273627.515:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.847054 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:07:07.847073 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:07:07.847091 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:07:07.847110 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:07:07.847131 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:07:07.847150 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:07:07.847169 systemd[1]: Created slice system-getty.slice. Oct 2 19:07:07.847188 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:07:07.847206 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:07:07.847226 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:07:07.847245 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:07:07.847263 systemd[1]: Created slice user.slice. Oct 2 19:07:07.847283 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:07:07.847303 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:07:07.847321 systemd[1]: Set up automount boot.automount. Oct 2 19:07:07.851842 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:07:07.851880 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:07:07.851900 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:07:07.851919 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:07:07.851938 systemd[1]: Reached target integritysetup.target. Oct 2 19:07:07.851957 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:07:07.851981 systemd[1]: Reached target remote-fs.target. Oct 2 19:07:07.852008 systemd[1]: Reached target slices.target. Oct 2 19:07:07.852027 systemd[1]: Reached target swap.target. Oct 2 19:07:07.852044 systemd[1]: Reached target torcx.target. Oct 2 19:07:07.852063 systemd[1]: Reached target veritysetup.target. Oct 2 19:07:07.852091 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:07:07.852114 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:07:07.852133 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:07:07.852151 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:07:07.852170 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:07:07.852188 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:07:07.852207 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:07:07.852225 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:07:07.852244 systemd[1]: Mounting media.mount... Oct 2 19:07:07.852262 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:07:07.852282 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:07:07.852300 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:07:07.852317 systemd[1]: Mounting tmp.mount... Oct 2 19:07:07.852336 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:07:07.852355 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:07:07.852373 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:07:07.852394 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:07:07.852415 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:07:07.852433 systemd[1]: Starting modprobe@drm.service... Oct 2 19:07:07.852456 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:07:07.852473 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:07:07.852492 systemd[1]: Starting modprobe@loop.service... Oct 2 19:07:07.865987 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:07:07.866030 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:07:07.866044 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:07:07.866057 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:07:07.866069 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:07:07.866082 systemd[1]: Stopped systemd-journald.service. Oct 2 19:07:07.866098 systemd[1]: Starting systemd-journald.service... Oct 2 19:07:07.866110 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:07:07.866122 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:07:07.866133 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:07:07.866145 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:07:07.866158 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:07:07.866170 systemd[1]: Stopped verity-setup.service. Oct 2 19:07:07.866183 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:07:07.866195 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:07:07.866487 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:07:07.866507 systemd[1]: Mounted media.mount. Oct 2 19:07:07.866520 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:07:07.866532 kernel: loop: module loaded Oct 2 19:07:07.866545 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:07:07.866558 systemd[1]: Mounted tmp.mount. Oct 2 19:07:07.866573 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:07:07.866586 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:07:07.866598 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:07:07.866610 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:07:07.866623 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:07:07.866635 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:07:07.866647 systemd[1]: Finished modprobe@drm.service. Oct 2 19:07:07.866659 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:07:07.867124 kernel: fuse: init (API version 7.34) Oct 2 19:07:07.867150 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:07:07.867176 systemd-journald[1314]: Journal started Oct 2 19:07:07.867332 systemd-journald[1314]: Runtime Journal (/run/log/journal/ec2199eff7fd12270bde7cda64b559e2) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:07:02.468000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:07:02.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:07:02.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:07:02.661000 audit: BPF prog-id=10 op=LOAD Oct 2 19:07:02.661000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:07:02.661000 audit: BPF prog-id=11 op=LOAD Oct 2 19:07:02.661000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:07:07.481000 audit: BPF prog-id=12 op=LOAD Oct 2 19:07:07.481000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:07:07.482000 audit: BPF prog-id=13 op=LOAD Oct 2 19:07:07.486000 audit: BPF prog-id=14 op=LOAD Oct 2 19:07:07.486000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:07:07.486000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:07:07.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.499000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:07:07.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.743000 audit: BPF prog-id=15 op=LOAD Oct 2 19:07:07.743000 audit: BPF prog-id=16 op=LOAD Oct 2 19:07:07.743000 audit: BPF prog-id=17 op=LOAD Oct 2 19:07:07.743000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:07:07.743000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:07:07.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.840000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:07:07.840000 audit[1314]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffec4cb5660 a2=4000 a3=7ffec4cb56fc items=0 ppid=1 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:07.840000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:07:07.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.478825 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:07:02.991248 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:07:07.492657 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:07:02.992047 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:07:02.992076 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:07:02.992121 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:07:02.992137 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:07:02.992182 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:07:02.992203 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:07:02.992824 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:07:02.992884 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:07:02.992904 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:07:02.993682 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:07:02.993751 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:07:02.993778 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:07:07.871585 systemd[1]: Started systemd-journald.service. Oct 2 19:07:07.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:02.993801 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:07:07.872857 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:07:02.993827 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:07:07.873067 systemd[1]: Finished modprobe@loop.service. Oct 2 19:07:02.993849 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:07:07.875008 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:07:06.811592 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:06Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:07:07.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.877781 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:07:06.811916 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:06Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:07:07.880116 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:07:06.812028 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:06Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:07:07.882940 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:07:06.812214 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:06Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:07:07.885532 systemd[1]: Reached target network-pre.target. Oct 2 19:07:06.812263 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:06Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:07:06.812322 /usr/lib/systemd/system-generators/torcx-generator[1240]: time="2023-10-02T19:07:06Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:07:07.889410 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:07:07.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.894228 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:07:07.896499 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:07:07.898469 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:07:07.905090 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:07:07.906846 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:07:07.908400 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:07:07.909807 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:07:07.914102 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:07:07.916886 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:07:07.918373 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:07:07.919982 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:07:07.948528 systemd-journald[1314]: Time spent on flushing to /var/log/journal/ec2199eff7fd12270bde7cda64b559e2 is 50.768ms for 1202 entries. Oct 2 19:07:07.948528 systemd-journald[1314]: System Journal (/var/log/journal/ec2199eff7fd12270bde7cda64b559e2) is 8.0M, max 195.6M, 187.6M free. Oct 2 19:07:08.022024 systemd-journald[1314]: Received client request to flush runtime journal. Oct 2 19:07:07.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:07.958300 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:07:07.959939 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:07:07.980468 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:07:08.023353 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:07:08.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:08.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:08.050244 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:07:08.053520 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:07:08.062490 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:07:08.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:08.067997 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:07:08.088102 udevadm[1356]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:07:08.176652 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:07:08.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:08.179690 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:07:08.265930 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:07:08.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:08.912233 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:07:08.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:08.913000 audit: BPF prog-id=18 op=LOAD Oct 2 19:07:08.913000 audit: BPF prog-id=19 op=LOAD Oct 2 19:07:08.913000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:07:08.913000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:07:08.915037 systemd[1]: Starting systemd-udevd.service... Oct 2 19:07:08.939865 systemd-udevd[1359]: Using default interface naming scheme 'v252'. Oct 2 19:07:08.996185 systemd[1]: Started systemd-udevd.service. Oct 2 19:07:08.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:08.999000 audit: BPF prog-id=20 op=LOAD Oct 2 19:07:09.001074 systemd[1]: Starting systemd-networkd.service... Oct 2 19:07:09.016000 audit: BPF prog-id=21 op=LOAD Oct 2 19:07:09.017000 audit: BPF prog-id=22 op=LOAD Oct 2 19:07:09.017000 audit: BPF prog-id=23 op=LOAD Oct 2 19:07:09.019796 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:07:09.088990 (udev-worker)[1364]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:07:09.101742 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:07:09.121167 systemd[1]: Started systemd-userdbd.service. Oct 2 19:07:09.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:09.179744 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Oct 2 19:07:09.198770 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:07:09.198870 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Oct 2 19:07:09.225744 kernel: ACPI: button: Sleep Button [SLPF] Oct 2 19:07:09.284489 systemd-networkd[1368]: lo: Link UP Oct 2 19:07:09.284504 systemd-networkd[1368]: lo: Gained carrier Oct 2 19:07:09.285165 systemd-networkd[1368]: Enumeration completed Oct 2 19:07:09.285280 systemd[1]: Started systemd-networkd.service. Oct 2 19:07:09.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:09.220000 audit[1370]: AVC avc: denied { confidentiality } for pid=1370 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:07:09.288711 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:07:09.291531 systemd-networkd[1368]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:07:09.297744 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:07:09.298035 systemd-networkd[1368]: eth0: Link UP Oct 2 19:07:09.298350 systemd-networkd[1368]: eth0: Gained carrier Oct 2 19:07:09.220000 audit[1370]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556ab8f03580 a1=32194 a2=7f7b559d7bc5 a3=5 items=106 ppid=1359 pid=1370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:09.220000 audit: CWD cwd="/" Oct 2 19:07:09.220000 audit: PATH item=0 name=(null) inode=14134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=1 name=(null) inode=14140 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=2 name=(null) inode=14134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=3 name=(null) inode=14141 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=4 name=(null) inode=14134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=5 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=6 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=7 name=(null) inode=14143 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=8 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=9 name=(null) inode=14144 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=10 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=11 name=(null) inode=14145 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=12 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=13 name=(null) inode=14146 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=14 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=15 name=(null) inode=14147 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=16 name=(null) inode=14134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=17 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=18 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=19 name=(null) inode=14149 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=20 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=21 name=(null) inode=14150 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=22 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=23 name=(null) inode=14151 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=24 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=25 name=(null) inode=14152 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=26 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=27 name=(null) inode=14153 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=28 name=(null) inode=14134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=29 name=(null) inode=14154 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=30 name=(null) inode=14154 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=31 name=(null) inode=14155 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=32 name=(null) inode=14154 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=33 name=(null) inode=14156 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=34 name=(null) inode=14154 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=35 name=(null) inode=14157 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=36 name=(null) inode=14154 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=37 name=(null) inode=14158 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=38 name=(null) inode=14154 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=39 name=(null) inode=14159 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=40 name=(null) inode=14134 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=41 name=(null) inode=14160 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=42 name=(null) inode=14160 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=43 name=(null) inode=14161 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=44 name=(null) inode=14160 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=45 name=(null) inode=14162 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=46 name=(null) inode=14160 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=47 name=(null) inode=14163 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=48 name=(null) inode=14160 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=49 name=(null) inode=14164 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=50 name=(null) inode=14160 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=51 name=(null) inode=14165 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=52 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=53 name=(null) inode=14166 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=54 name=(null) inode=14166 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=55 name=(null) inode=14167 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=56 name=(null) inode=14166 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=57 name=(null) inode=14168 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=58 name=(null) inode=14166 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=59 name=(null) inode=14169 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=60 name=(null) inode=14169 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=61 name=(null) inode=14170 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=62 name=(null) inode=14169 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=63 name=(null) inode=14171 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=64 name=(null) inode=14169 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=65 name=(null) inode=14172 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=66 name=(null) inode=14169 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=67 name=(null) inode=14173 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=68 name=(null) inode=14169 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=69 name=(null) inode=14174 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=70 name=(null) inode=14166 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=71 name=(null) inode=14175 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=72 name=(null) inode=14175 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=73 name=(null) inode=14176 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=74 name=(null) inode=14175 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=75 name=(null) inode=14177 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=76 name=(null) inode=14175 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=77 name=(null) inode=14178 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=78 name=(null) inode=14175 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=79 name=(null) inode=14179 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=80 name=(null) inode=14175 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=81 name=(null) inode=14180 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=82 name=(null) inode=14166 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=83 name=(null) inode=14181 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=84 name=(null) inode=14181 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=85 name=(null) inode=14182 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=86 name=(null) inode=14181 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=87 name=(null) inode=14183 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=88 name=(null) inode=14181 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=89 name=(null) inode=14184 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=90 name=(null) inode=14181 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=91 name=(null) inode=14185 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=92 name=(null) inode=14181 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=93 name=(null) inode=14186 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=94 name=(null) inode=14166 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=95 name=(null) inode=14187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=96 name=(null) inode=14187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=97 name=(null) inode=14188 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=98 name=(null) inode=14187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=99 name=(null) inode=14189 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=100 name=(null) inode=14187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=101 name=(null) inode=14190 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=102 name=(null) inode=14187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=103 name=(null) inode=14191 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=104 name=(null) inode=14187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PATH item=105 name=(null) inode=14192 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:09.220000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:07:09.321931 systemd-networkd[1368]: eth0: DHCPv4 address 172.31.27.162/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:07:09.328781 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5 Oct 2 19:07:09.332766 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Oct 2 19:07:09.353547 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:07:09.402829 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1375) Oct 2 19:07:09.564145 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:07:09.612187 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:07:09.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:09.616868 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:07:09.693304 lvm[1474]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:07:09.743629 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:07:09.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:09.745116 systemd[1]: Reached target cryptsetup.target. Oct 2 19:07:09.748057 systemd[1]: Starting lvm2-activation.service... Oct 2 19:07:09.755903 lvm[1475]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:07:09.790043 systemd[1]: Finished lvm2-activation.service. Oct 2 19:07:09.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:09.792363 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:07:09.793628 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:07:09.793658 systemd[1]: Reached target local-fs.target. Oct 2 19:07:09.795593 systemd[1]: Reached target machines.target. Oct 2 19:07:09.800894 systemd[1]: Starting ldconfig.service... Oct 2 19:07:09.803135 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:07:09.803214 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:07:09.804862 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:07:09.808051 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:07:09.813831 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:07:09.823150 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:07:09.823256 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:07:09.827684 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:07:09.860042 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1477 (bootctl) Oct 2 19:07:09.861878 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:07:09.874928 systemd-tmpfiles[1480]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:07:09.880698 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:07:09.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:09.886501 systemd-tmpfiles[1480]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:07:09.889874 systemd-tmpfiles[1480]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:07:10.003446 systemd-fsck[1485]: fsck.fat 4.2 (2021-01-31) Oct 2 19:07:10.003446 systemd-fsck[1485]: /dev/nvme0n1p1: 789 files, 115069/258078 clusters Oct 2 19:07:10.005898 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:07:10.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:10.009116 systemd[1]: Mounting boot.mount... Oct 2 19:07:10.022294 systemd[1]: Mounted boot.mount. Oct 2 19:07:10.049775 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:07:10.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:10.143873 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:07:10.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:10.149134 systemd[1]: Starting audit-rules.service... Oct 2 19:07:10.153297 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:07:10.160000 audit: BPF prog-id=24 op=LOAD Oct 2 19:07:10.167000 audit: BPF prog-id=25 op=LOAD Oct 2 19:07:10.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:10.157817 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:07:10.163692 systemd[1]: Starting systemd-resolved.service... Oct 2 19:07:10.169270 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:07:10.183334 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:07:10.187236 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:07:10.189458 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:07:10.206000 audit[1504]: SYSTEM_BOOT pid=1504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:07:10.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:10.212612 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:07:10.315421 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:07:10.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:10.340000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:07:10.340000 audit[1519]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd2e02cbc0 a2=420 a3=0 items=0 ppid=1499 pid=1519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:10.340000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:07:10.347467 augenrules[1519]: No rules Oct 2 19:07:10.349498 systemd[1]: Finished audit-rules.service. Oct 2 19:07:10.355491 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:07:10.356893 systemd[1]: Reached target time-set.target. Oct 2 19:07:10.396748 systemd-resolved[1502]: Positive Trust Anchors: Oct 2 19:07:10.396764 systemd-resolved[1502]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:07:10.396805 systemd-resolved[1502]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:07:10.449197 systemd-resolved[1502]: Defaulting to hostname 'linux'. Oct 2 19:07:10.451795 systemd[1]: Started systemd-resolved.service. Oct 2 19:07:10.453284 systemd[1]: Reached target network.target. Oct 2 19:07:10.454424 systemd[1]: Reached target nss-lookup.target. Oct 2 19:07:11.058004 systemd-timesyncd[1503]: Contacted time server 104.194.8.227:123 (0.flatcar.pool.ntp.org). Oct 2 19:07:11.058064 systemd-timesyncd[1503]: Initial clock synchronization to Mon 2023-10-02 19:07:11.057881 UTC. Oct 2 19:07:11.059375 systemd-resolved[1502]: Clock change detected. Flushing caches. Oct 2 19:07:11.192975 systemd-networkd[1368]: eth0: Gained IPv6LL Oct 2 19:07:11.197156 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:07:11.198914 systemd[1]: Reached target network-online.target. Oct 2 19:07:11.495148 ldconfig[1476]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:07:11.545292 systemd[1]: Finished ldconfig.service. Oct 2 19:07:11.548001 systemd[1]: Starting systemd-update-done.service... Oct 2 19:07:11.556033 systemd[1]: Finished systemd-update-done.service. Oct 2 19:07:11.557315 systemd[1]: Reached target sysinit.target. Oct 2 19:07:11.558466 systemd[1]: Started motdgen.path. Oct 2 19:07:11.559513 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:07:11.561044 systemd[1]: Started logrotate.timer. Oct 2 19:07:11.562091 systemd[1]: Started mdadm.timer. Oct 2 19:07:11.563191 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:07:11.564493 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:07:11.564523 systemd[1]: Reached target paths.target. Oct 2 19:07:11.565545 systemd[1]: Reached target timers.target. Oct 2 19:07:11.567106 systemd[1]: Listening on dbus.socket. Oct 2 19:07:11.569423 systemd[1]: Starting docker.socket... Oct 2 19:07:11.573857 systemd[1]: Listening on sshd.socket. Oct 2 19:07:11.574995 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:07:11.575533 systemd[1]: Listening on docker.socket. Oct 2 19:07:11.576512 systemd[1]: Reached target sockets.target. Oct 2 19:07:11.578515 systemd[1]: Reached target basic.target. Oct 2 19:07:11.582607 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:07:11.582639 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:07:11.584821 systemd[1]: Started amazon-ssm-agent.service. Oct 2 19:07:11.592524 systemd[1]: Starting containerd.service... Oct 2 19:07:11.598135 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:07:11.601759 systemd[1]: Starting dbus.service... Oct 2 19:07:11.604909 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:07:11.608241 systemd[1]: Starting extend-filesystems.service... Oct 2 19:07:11.618966 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:07:11.631882 systemd[1]: Starting motdgen.service... Oct 2 19:07:11.651638 systemd[1]: Started nvidia.service. Oct 2 19:07:11.657555 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:07:11.665987 systemd[1]: Starting prepare-critools.service... Oct 2 19:07:11.669006 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:07:11.673721 systemd[1]: Starting sshd-keygen.service... Oct 2 19:07:11.690549 systemd[1]: Starting systemd-logind.service... Oct 2 19:07:11.801189 jq[1532]: false Oct 2 19:07:11.692188 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:07:11.692280 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:07:11.693445 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:07:11.808833 jq[1545]: true Oct 2 19:07:11.695336 systemd[1]: Starting update-engine.service... Oct 2 19:07:11.901702 tar[1547]: crictl Oct 2 19:07:11.699095 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:07:11.797430 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:07:11.929560 tar[1549]: ./ Oct 2 19:07:11.929560 tar[1549]: ./macvlan Oct 2 19:07:11.797907 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:07:11.807979 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:07:11.930339 jq[1557]: true Oct 2 19:07:11.808189 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:07:11.863475 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:07:11.865718 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:07:11.874594 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:07:11.875816 systemd[1]: Finished motdgen.service. Oct 2 19:07:11.948106 env[1553]: time="2023-10-02T19:07:11.933413853Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:07:12.046747 extend-filesystems[1533]: Found nvme0n1 Oct 2 19:07:12.065866 extend-filesystems[1533]: Found nvme0n1p1 Oct 2 19:07:12.067880 bash[1596]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:07:12.068541 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:07:12.071201 dbus-daemon[1531]: [system] SELinux support is enabled Oct 2 19:07:12.071564 systemd[1]: Started dbus.service. Oct 2 19:07:12.084119 dbus-daemon[1531]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1368 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 19:07:12.076475 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:07:12.076505 systemd[1]: Reached target system-config.target. Oct 2 19:07:12.078423 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:07:12.078447 systemd[1]: Reached target user-config.target. Oct 2 19:07:12.092897 extend-filesystems[1533]: Found nvme0n1p2 Oct 2 19:07:12.092897 extend-filesystems[1533]: Found nvme0n1p3 Oct 2 19:07:12.092897 extend-filesystems[1533]: Found usr Oct 2 19:07:12.092897 extend-filesystems[1533]: Found nvme0n1p4 Oct 2 19:07:12.092897 extend-filesystems[1533]: Found nvme0n1p6 Oct 2 19:07:12.093006 dbus-daemon[1531]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:07:12.103106 systemd[1]: Starting systemd-hostnamed.service... Oct 2 19:07:12.111245 extend-filesystems[1533]: Found nvme0n1p7 Oct 2 19:07:12.137734 extend-filesystems[1533]: Found nvme0n1p9 Oct 2 19:07:12.140229 extend-filesystems[1533]: Checking size of /dev/nvme0n1p9 Oct 2 19:07:12.148485 amazon-ssm-agent[1528]: 2023/10/02 19:07:12 Failed to load instance info from vault. RegistrationKey does not exist. Oct 2 19:07:12.162685 amazon-ssm-agent[1528]: Initializing new seelog logger Oct 2 19:07:12.171684 extend-filesystems[1533]: Resized partition /dev/nvme0n1p9 Oct 2 19:07:12.191737 amazon-ssm-agent[1528]: New Seelog Logger Creation Complete Oct 2 19:07:12.199024 amazon-ssm-agent[1528]: 2023/10/02 19:07:12 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:07:12.201516 amazon-ssm-agent[1528]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:07:12.203069 amazon-ssm-agent[1528]: 2023/10/02 19:07:12 processing appconfig overrides Oct 2 19:07:12.206685 extend-filesystems[1611]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:07:12.217689 update_engine[1544]: I1002 19:07:12.216539 1544 main.cc:92] Flatcar Update Engine starting Oct 2 19:07:12.229522 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Oct 2 19:07:12.234266 systemd[1]: Started update-engine.service. Oct 2 19:07:12.239604 systemd[1]: Started locksmithd.service. Oct 2 19:07:12.249622 update_engine[1544]: I1002 19:07:12.249258 1544 update_check_scheduler.cc:74] Next update check in 11m30s Oct 2 19:07:12.288686 env[1553]: time="2023-10-02T19:07:12.288636801Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:07:12.289851 env[1553]: time="2023-10-02T19:07:12.289635077Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:12.295370 env[1553]: time="2023-10-02T19:07:12.295319404Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:07:12.297456 env[1553]: time="2023-10-02T19:07:12.297187596Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:12.302594 env[1553]: time="2023-10-02T19:07:12.302553520Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:07:12.306322 env[1553]: time="2023-10-02T19:07:12.306280421Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:12.306589 env[1553]: time="2023-10-02T19:07:12.306564372Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:07:12.311293 env[1553]: time="2023-10-02T19:07:12.311253148Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:12.311595 env[1553]: time="2023-10-02T19:07:12.311575258Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:12.312234 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Oct 2 19:07:12.347945 env[1553]: time="2023-10-02T19:07:12.347896235Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:12.348301 env[1553]: time="2023-10-02T19:07:12.348266960Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:07:12.348380 env[1553]: time="2023-10-02T19:07:12.348313273Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:07:12.348434 env[1553]: time="2023-10-02T19:07:12.348410832Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:07:12.348486 env[1553]: time="2023-10-02T19:07:12.348430037Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:07:12.352393 extend-filesystems[1611]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Oct 2 19:07:12.352393 extend-filesystems[1611]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 2 19:07:12.352393 extend-filesystems[1611]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Oct 2 19:07:12.372541 extend-filesystems[1533]: Resized filesystem in /dev/nvme0n1p9 Oct 2 19:07:12.354905 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:07:12.355140 systemd[1]: Finished extend-filesystems.service. Oct 2 19:07:12.377448 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 19:07:12.389055 env[1553]: time="2023-10-02T19:07:12.388117484Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:07:12.389055 env[1553]: time="2023-10-02T19:07:12.388182871Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:07:12.389055 env[1553]: time="2023-10-02T19:07:12.388202858Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:07:12.389055 env[1553]: time="2023-10-02T19:07:12.388492202Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:07:12.389055 env[1553]: time="2023-10-02T19:07:12.388592285Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:07:12.389055 env[1553]: time="2023-10-02T19:07:12.388618490Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:07:12.389055 env[1553]: time="2023-10-02T19:07:12.388642712Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:07:12.389055 env[1553]: time="2023-10-02T19:07:12.388683008Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:07:12.389055 env[1553]: time="2023-10-02T19:07:12.388703724Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:07:12.389055 env[1553]: time="2023-10-02T19:07:12.388739310Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:07:12.389055 env[1553]: time="2023-10-02T19:07:12.388763522Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:07:12.389055 env[1553]: time="2023-10-02T19:07:12.388784398Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:07:12.389055 env[1553]: time="2023-10-02T19:07:12.388984998Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:07:12.390507 env[1553]: time="2023-10-02T19:07:12.390020712Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:07:12.390788 env[1553]: time="2023-10-02T19:07:12.390763813Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:07:12.390939 env[1553]: time="2023-10-02T19:07:12.390920273Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:07:12.391317 env[1553]: time="2023-10-02T19:07:12.391260120Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:07:12.391591 env[1553]: time="2023-10-02T19:07:12.391449238Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:07:12.391698 env[1553]: time="2023-10-02T19:07:12.391680770Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:07:12.391808 env[1553]: time="2023-10-02T19:07:12.391792708Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:07:12.391903 env[1553]: time="2023-10-02T19:07:12.391887643Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:07:12.392044 env[1553]: time="2023-10-02T19:07:12.391987320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:07:12.392044 env[1553]: time="2023-10-02T19:07:12.392013493Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:07:12.392220 env[1553]: time="2023-10-02T19:07:12.392033068Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:07:12.392220 env[1553]: time="2023-10-02T19:07:12.392166314Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:07:12.392220 env[1553]: time="2023-10-02T19:07:12.392192029Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:07:12.392778 env[1553]: time="2023-10-02T19:07:12.392755082Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:07:12.392906 env[1553]: time="2023-10-02T19:07:12.392887432Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:07:12.393165 env[1553]: time="2023-10-02T19:07:12.393132184Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:07:12.393335 env[1553]: time="2023-10-02T19:07:12.393279768Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:07:12.393335 env[1553]: time="2023-10-02T19:07:12.393309329Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:07:12.393510 env[1553]: time="2023-10-02T19:07:12.393438891Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:07:12.393510 env[1553]: time="2023-10-02T19:07:12.393475217Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:07:12.393758 env[1553]: time="2023-10-02T19:07:12.393635930Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:07:12.394437 env[1553]: time="2023-10-02T19:07:12.394344939Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:07:12.398400 env[1553]: time="2023-10-02T19:07:12.398340071Z" level=info msg="Connect containerd service" Oct 2 19:07:12.398502 env[1553]: time="2023-10-02T19:07:12.398435530Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:07:12.400287 env[1553]: time="2023-10-02T19:07:12.400247913Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:07:12.400690 env[1553]: time="2023-10-02T19:07:12.400649855Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:07:12.400761 env[1553]: time="2023-10-02T19:07:12.400724227Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:07:12.404429 systemd[1]: Started containerd.service. Oct 2 19:07:12.426249 env[1553]: time="2023-10-02T19:07:12.426177831Z" level=info msg="Start subscribing containerd event" Oct 2 19:07:12.426379 env[1553]: time="2023-10-02T19:07:12.426270568Z" level=info msg="Start recovering state" Oct 2 19:07:12.426379 env[1553]: time="2023-10-02T19:07:12.426353585Z" level=info msg="Start event monitor" Oct 2 19:07:12.426379 env[1553]: time="2023-10-02T19:07:12.426369720Z" level=info msg="Start snapshots syncer" Oct 2 19:07:12.426491 env[1553]: time="2023-10-02T19:07:12.426383808Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:07:12.426491 env[1553]: time="2023-10-02T19:07:12.426394852Z" level=info msg="Start streaming server" Oct 2 19:07:12.426698 env[1553]: time="2023-10-02T19:07:12.426614725Z" level=info msg="containerd successfully booted in 0.500577s" Oct 2 19:07:12.454276 systemd-logind[1543]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:07:12.457450 systemd-logind[1543]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 19:07:12.460369 systemd-logind[1543]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:07:12.462957 systemd-logind[1543]: New seat seat0. Oct 2 19:07:12.473494 systemd[1]: Started systemd-logind.service. Oct 2 19:07:12.519050 dbus-daemon[1531]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 19:07:12.520693 dbus-daemon[1531]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1600 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 19:07:12.519309 systemd[1]: Started systemd-hostnamed.service. Oct 2 19:07:12.526571 tar[1549]: ./static Oct 2 19:07:12.528155 systemd[1]: Starting polkit.service... Oct 2 19:07:12.560310 polkitd[1637]: Started polkitd version 121 Oct 2 19:07:12.604619 polkitd[1637]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 19:07:12.616349 polkitd[1637]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 19:07:12.629530 polkitd[1637]: Finished loading, compiling and executing 2 rules Oct 2 19:07:12.630384 dbus-daemon[1531]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 19:07:12.630757 systemd[1]: Started polkit.service. Oct 2 19:07:12.633760 polkitd[1637]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 19:07:12.678516 systemd-hostnamed[1600]: Hostname set to (transient) Oct 2 19:07:12.678636 systemd-resolved[1502]: System hostname changed to 'ip-172-31-27-162'. Oct 2 19:07:12.782298 tar[1549]: ./vlan Oct 2 19:07:13.009080 tar[1549]: ./portmap Oct 2 19:07:13.040478 coreos-metadata[1530]: Oct 02 19:07:13.040 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Oct 2 19:07:13.048675 coreos-metadata[1530]: Oct 02 19:07:13.048 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Oct 2 19:07:13.055644 coreos-metadata[1530]: Oct 02 19:07:13.055 INFO Fetch successful Oct 2 19:07:13.055812 coreos-metadata[1530]: Oct 02 19:07:13.055 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 2 19:07:13.067476 coreos-metadata[1530]: Oct 02 19:07:13.067 INFO Fetch successful Oct 2 19:07:13.073112 unknown[1530]: wrote ssh authorized keys file for user: core Oct 2 19:07:13.108697 update-ssh-keys[1712]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:07:13.110809 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:07:13.205558 amazon-ssm-agent[1528]: 2023-10-02 19:07:13 INFO Entering SSM Agent hibernate - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-0478071169e99c609 is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-0478071169e99c609 because no identity-based policy allows the ssm:UpdateInstanceInformation action Oct 2 19:07:13.205558 amazon-ssm-agent[1528]: status code: 400, request id: abca182d-45d9-46f0-8706-86c8ad24b82d Oct 2 19:07:13.205558 amazon-ssm-agent[1528]: 2023-10-02 19:07:13 INFO Agent is in hibernate mode. Reducing logging. Logging will be reduced to one log per backoff period Oct 2 19:07:13.217854 tar[1549]: ./host-local Oct 2 19:07:13.331375 tar[1549]: ./vrf Oct 2 19:07:13.447071 tar[1549]: ./bridge Oct 2 19:07:13.565567 systemd[1]: Finished prepare-critools.service. Oct 2 19:07:13.570451 tar[1549]: ./tuning Oct 2 19:07:13.618014 tar[1549]: ./firewall Oct 2 19:07:13.673975 tar[1549]: ./host-device Oct 2 19:07:13.723908 tar[1549]: ./sbr Oct 2 19:07:13.775546 tar[1549]: ./loopback Oct 2 19:07:13.826519 tar[1549]: ./dhcp Oct 2 19:07:13.945006 tar[1549]: ./ptp Oct 2 19:07:13.994908 tar[1549]: ./ipvlan Oct 2 19:07:14.043690 tar[1549]: ./bandwidth Oct 2 19:07:14.106798 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:07:14.235730 locksmithd[1613]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:07:14.666837 sshd_keygen[1589]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:07:14.692740 systemd[1]: Finished sshd-keygen.service. Oct 2 19:07:14.695403 systemd[1]: Starting issuegen.service... Oct 2 19:07:14.702998 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:07:14.703166 systemd[1]: Finished issuegen.service. Oct 2 19:07:14.706744 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:07:14.718827 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:07:14.722436 systemd[1]: Started getty@tty1.service. Oct 2 19:07:14.728698 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:07:14.731846 systemd[1]: Reached target getty.target. Oct 2 19:07:14.736155 systemd[1]: Reached target multi-user.target. Oct 2 19:07:14.744255 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:07:14.756168 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:07:14.756659 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:07:14.758338 systemd[1]: Startup finished in 748ms (kernel) + 10.541s (initrd) + 11.810s (userspace) = 23.100s. Oct 2 19:07:21.484001 systemd[1]: Created slice system-sshd.slice. Oct 2 19:07:21.486364 systemd[1]: Started sshd@0-172.31.27.162:22-139.178.89.65:55226.service. Oct 2 19:07:21.676877 sshd[1747]: Accepted publickey for core from 139.178.89.65 port 55226 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:21.680070 sshd[1747]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:21.697964 systemd[1]: Created slice user-500.slice. Oct 2 19:07:21.699937 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:07:21.706893 systemd-logind[1543]: New session 1 of user core. Oct 2 19:07:21.722101 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:07:21.725908 systemd[1]: Starting user@500.service... Oct 2 19:07:21.730493 (systemd)[1750]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:21.909126 systemd[1750]: Queued start job for default target default.target. Oct 2 19:07:21.910365 systemd[1750]: Reached target paths.target. Oct 2 19:07:21.910402 systemd[1750]: Reached target sockets.target. Oct 2 19:07:21.910420 systemd[1750]: Reached target timers.target. Oct 2 19:07:21.910438 systemd[1750]: Reached target basic.target. Oct 2 19:07:21.910589 systemd[1750]: Reached target default.target. Oct 2 19:07:21.910636 systemd[1750]: Startup finished in 168ms. Oct 2 19:07:21.911718 systemd[1]: Started user@500.service. Oct 2 19:07:21.913291 systemd[1]: Started session-1.scope. Oct 2 19:07:22.067371 systemd[1]: Started sshd@1-172.31.27.162:22-139.178.89.65:55236.service. Oct 2 19:07:22.234599 sshd[1759]: Accepted publickey for core from 139.178.89.65 port 55236 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:22.237315 sshd[1759]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:22.243737 systemd-logind[1543]: New session 2 of user core. Oct 2 19:07:22.244561 systemd[1]: Started session-2.scope. Oct 2 19:07:22.378468 sshd[1759]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:22.382838 systemd[1]: sshd@1-172.31.27.162:22-139.178.89.65:55236.service: Deactivated successfully. Oct 2 19:07:22.384033 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:07:22.385516 systemd-logind[1543]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:07:22.387250 systemd-logind[1543]: Removed session 2. Oct 2 19:07:22.405606 systemd[1]: Started sshd@2-172.31.27.162:22-139.178.89.65:55246.service. Oct 2 19:07:22.574316 sshd[1765]: Accepted publickey for core from 139.178.89.65 port 55246 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:22.576253 sshd[1765]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:22.583190 systemd-logind[1543]: New session 3 of user core. Oct 2 19:07:22.583887 systemd[1]: Started session-3.scope. Oct 2 19:07:22.705635 sshd[1765]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:22.708757 systemd[1]: sshd@2-172.31.27.162:22-139.178.89.65:55246.service: Deactivated successfully. Oct 2 19:07:22.711903 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:07:22.712766 systemd-logind[1543]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:07:22.713978 systemd-logind[1543]: Removed session 3. Oct 2 19:07:22.735957 systemd[1]: Started sshd@3-172.31.27.162:22-139.178.89.65:55254.service. Oct 2 19:07:22.909298 sshd[1771]: Accepted publickey for core from 139.178.89.65 port 55254 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:22.911833 sshd[1771]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:22.921813 systemd[1]: Started session-4.scope. Oct 2 19:07:22.922502 systemd-logind[1543]: New session 4 of user core. Oct 2 19:07:23.050361 sshd[1771]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:23.054924 systemd[1]: sshd@3-172.31.27.162:22-139.178.89.65:55254.service: Deactivated successfully. Oct 2 19:07:23.056027 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:07:23.056821 systemd-logind[1543]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:07:23.057880 systemd-logind[1543]: Removed session 4. Oct 2 19:07:23.076809 systemd[1]: Started sshd@4-172.31.27.162:22-139.178.89.65:55258.service. Oct 2 19:07:23.242156 sshd[1777]: Accepted publickey for core from 139.178.89.65 port 55258 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:23.243559 sshd[1777]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:23.254066 systemd[1]: Started session-5.scope. Oct 2 19:07:23.254929 systemd-logind[1543]: New session 5 of user core. Oct 2 19:07:23.373458 sudo[1780]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:07:23.373792 sudo[1780]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:07:23.383559 dbus-daemon[1531]: Ѝ\x94\xb5\xf4U: received setenforce notice (enforcing=-1490814528) Oct 2 19:07:23.386867 sudo[1780]: pam_unix(sudo:session): session closed for user root Oct 2 19:07:23.411010 sshd[1777]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:23.414647 systemd[1]: sshd@4-172.31.27.162:22-139.178.89.65:55258.service: Deactivated successfully. Oct 2 19:07:23.421472 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:07:23.424899 systemd-logind[1543]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:07:23.428509 systemd-logind[1543]: Removed session 5. Oct 2 19:07:23.439139 systemd[1]: Started sshd@5-172.31.27.162:22-139.178.89.65:55262.service. Oct 2 19:07:23.611402 sshd[1784]: Accepted publickey for core from 139.178.89.65 port 55262 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:23.613564 sshd[1784]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:23.619711 systemd-logind[1543]: New session 6 of user core. Oct 2 19:07:23.620305 systemd[1]: Started session-6.scope. Oct 2 19:07:23.726538 sudo[1788]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:07:23.726887 sudo[1788]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:07:23.730597 sudo[1788]: pam_unix(sudo:session): session closed for user root Oct 2 19:07:23.741023 sudo[1787]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:07:23.741772 sudo[1787]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:07:23.757468 systemd[1]: Stopping audit-rules.service... Oct 2 19:07:23.757000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:07:23.760463 kernel: kauditd_printk_skb: 177 callbacks suppressed Oct 2 19:07:23.760520 kernel: audit: type=1305 audit(1696273643.757:157): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:07:23.760549 auditctl[1791]: No rules Oct 2 19:07:23.757000 audit[1791]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1548d740 a2=420 a3=0 items=0 ppid=1 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:23.762607 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:07:23.763328 systemd[1]: Stopped audit-rules.service. Oct 2 19:07:23.769598 systemd[1]: Starting audit-rules.service... Oct 2 19:07:23.775458 kernel: audit: type=1300 audit(1696273643.757:157): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1548d740 a2=420 a3=0 items=0 ppid=1 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:23.775546 kernel: audit: type=1327 audit(1696273643.757:157): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:07:23.757000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:07:23.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:23.784827 kernel: audit: type=1131 audit(1696273643.762:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:23.802585 augenrules[1808]: No rules Oct 2 19:07:23.803362 systemd[1]: Finished audit-rules.service. Oct 2 19:07:23.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:23.804704 sudo[1787]: pam_unix(sudo:session): session closed for user root Oct 2 19:07:23.803000 audit[1787]: USER_END pid=1787 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:23.816461 kernel: audit: type=1130 audit(1696273643.802:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:23.816566 kernel: audit: type=1106 audit(1696273643.803:160): pid=1787 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:23.803000 audit[1787]: CRED_DISP pid=1787 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:23.817294 kernel: audit: type=1104 audit(1696273643.803:161): pid=1787 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:23.828655 sshd[1784]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:23.829000 audit[1784]: USER_END pid=1784 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:23.833678 systemd[1]: sshd@5-172.31.27.162:22-139.178.89.65:55262.service: Deactivated successfully. Oct 2 19:07:23.834746 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:07:23.829000 audit[1784]: CRED_DISP pid=1784 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:23.838510 systemd-logind[1543]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:07:23.840406 systemd-logind[1543]: Removed session 6. Oct 2 19:07:23.844827 kernel: audit: type=1106 audit(1696273643.829:162): pid=1784 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:23.845051 kernel: audit: type=1104 audit(1696273643.829:163): pid=1784 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:23.845082 kernel: audit: type=1131 audit(1696273643.829:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.162:22-139.178.89.65:55262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:23.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.162:22-139.178.89.65:55262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:23.858468 systemd[1]: Started sshd@6-172.31.27.162:22-139.178.89.65:55276.service. Oct 2 19:07:23.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.162:22-139.178.89.65:55276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:24.028000 audit[1814]: USER_ACCT pid=1814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:24.031375 sshd[1814]: Accepted publickey for core from 139.178.89.65 port 55276 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:24.030000 audit[1814]: CRED_ACQ pid=1814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:24.030000 audit[1814]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8fc69860 a2=3 a3=0 items=0 ppid=1 pid=1814 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:24.030000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:07:24.032104 sshd[1814]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:24.039455 systemd-logind[1543]: New session 7 of user core. Oct 2 19:07:24.039902 systemd[1]: Started session-7.scope. Oct 2 19:07:24.046000 audit[1814]: USER_START pid=1814 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:24.049000 audit[1816]: CRED_ACQ pid=1816 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:24.143000 audit[1817]: USER_ACCT pid=1817 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:24.145354 sudo[1817]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:07:24.144000 audit[1817]: CRED_REFR pid=1817 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:24.145663 sudo[1817]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:07:24.153000 audit[1817]: USER_START pid=1817 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:24.789853 systemd[1]: Starting docker.service... Oct 2 19:07:24.842981 env[1832]: time="2023-10-02T19:07:24.842920498Z" level=info msg="Starting up" Oct 2 19:07:24.845870 env[1832]: time="2023-10-02T19:07:24.845829036Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:07:24.845870 env[1832]: time="2023-10-02T19:07:24.845865348Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:07:24.846019 env[1832]: time="2023-10-02T19:07:24.845891476Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:07:24.846019 env[1832]: time="2023-10-02T19:07:24.845904452Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:07:24.850727 env[1832]: time="2023-10-02T19:07:24.850681388Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:07:24.850727 env[1832]: time="2023-10-02T19:07:24.850705407Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:07:24.850727 env[1832]: time="2023-10-02T19:07:24.850727060Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:07:24.850939 env[1832]: time="2023-10-02T19:07:24.850741737Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:07:24.903880 env[1832]: time="2023-10-02T19:07:24.903838155Z" level=info msg="Loading containers: start." Oct 2 19:07:24.966000 audit[1863]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:24.966000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc1cc87210 a2=0 a3=7ffc1cc871fc items=0 ppid=1832 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:24.966000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:07:24.969000 audit[1865]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:24.969000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd4111a180 a2=0 a3=7ffd4111a16c items=0 ppid=1832 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:24.969000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:07:24.971000 audit[1867]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:24.971000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff33cf16f0 a2=0 a3=7fff33cf16dc items=0 ppid=1832 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:24.971000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:07:24.974000 audit[1869]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:24.974000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffbba36290 a2=0 a3=7fffbba3627c items=0 ppid=1832 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:24.974000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:07:24.976000 audit[1871]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1871 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:24.976000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1b162020 a2=0 a3=7fff1b16200c items=0 ppid=1832 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:24.976000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:07:24.993000 audit[1876]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:24.993000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdcf8f0c20 a2=0 a3=7ffdcf8f0c0c items=0 ppid=1832 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:24.993000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:07:25.007000 audit[1878]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1878 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.007000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffce59555f0 a2=0 a3=7ffce59555dc items=0 ppid=1832 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.007000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:07:25.009000 audit[1880]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1880 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.009000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe7d779580 a2=0 a3=7ffe7d77956c items=0 ppid=1832 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.009000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:07:25.012000 audit[1882]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1882 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.012000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd7c64a170 a2=0 a3=7ffd7c64a15c items=0 ppid=1832 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.012000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:07:25.031000 audit[1886]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1886 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.031000 audit[1886]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd4c2e6250 a2=0 a3=7ffd4c2e623c items=0 ppid=1832 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.031000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:07:25.033000 audit[1887]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.033000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff19a0c6d0 a2=0 a3=7fff19a0c6bc items=0 ppid=1832 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.033000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:07:25.047239 kernel: Initializing XFRM netlink socket Oct 2 19:07:25.098503 env[1832]: time="2023-10-02T19:07:25.098462821Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:07:25.099718 (udev-worker)[1842]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:07:25.186000 audit[1895]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1895 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.186000 audit[1895]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff8b3119f0 a2=0 a3=7fff8b3119dc items=0 ppid=1832 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.186000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:07:25.245000 audit[1898]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.245000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcda176b00 a2=0 a3=7ffcda176aec items=0 ppid=1832 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.245000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:07:25.249000 audit[1901]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.249000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe9a1019a0 a2=0 a3=7ffe9a10198c items=0 ppid=1832 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.249000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:07:25.253000 audit[1903]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.253000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdd382b180 a2=0 a3=7ffdd382b16c items=0 ppid=1832 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.253000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:07:25.256000 audit[1905]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.256000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdcae412f0 a2=0 a3=7ffdcae412dc items=0 ppid=1832 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.256000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:07:25.261000 audit[1907]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.261000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc4e7eb9a0 a2=0 a3=7ffc4e7eb98c items=0 ppid=1832 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.261000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:07:25.264000 audit[1909]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.264000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd07628500 a2=0 a3=7ffd076284ec items=0 ppid=1832 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.264000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:07:25.276000 audit[1912]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1912 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.276000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffcb006ac00 a2=0 a3=7ffcb006abec items=0 ppid=1832 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.276000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:07:25.280000 audit[1914]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.280000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff31851200 a2=0 a3=7fff318511ec items=0 ppid=1832 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.280000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:07:25.283000 audit[1916]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.283000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffede233650 a2=0 a3=7ffede23363c items=0 ppid=1832 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.283000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:07:25.289000 audit[1918]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.289000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb3350820 a2=0 a3=7ffdb335080c items=0 ppid=1832 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.289000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:07:25.291208 systemd-networkd[1368]: docker0: Link UP Oct 2 19:07:25.303000 audit[1922]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.303000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffed9225600 a2=0 a3=7ffed92255ec items=0 ppid=1832 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.303000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:07:25.305000 audit[1923]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:25.305000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc0c988680 a2=0 a3=7ffc0c98866c items=0 ppid=1832 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:25.305000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:07:25.306920 env[1832]: time="2023-10-02T19:07:25.306888977Z" level=info msg="Loading containers: done." Oct 2 19:07:25.325006 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3693809107-merged.mount: Deactivated successfully. Oct 2 19:07:25.344916 env[1832]: time="2023-10-02T19:07:25.344868345Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:07:25.345823 env[1832]: time="2023-10-02T19:07:25.345769448Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:07:25.345964 env[1832]: time="2023-10-02T19:07:25.345936425Z" level=info msg="Daemon has completed initialization" Oct 2 19:07:25.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:25.376449 systemd[1]: Started docker.service. Oct 2 19:07:25.389466 env[1832]: time="2023-10-02T19:07:25.389395667Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:07:25.414166 systemd[1]: Reloading. Oct 2 19:07:25.533961 /usr/lib/systemd/system-generators/torcx-generator[1970]: time="2023-10-02T19:07:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:07:25.534469 /usr/lib/systemd/system-generators/torcx-generator[1970]: time="2023-10-02T19:07:25Z" level=info msg="torcx already run" Oct 2 19:07:25.663411 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:07:25.663433 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:07:25.691416 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit: BPF prog-id=34 op=LOAD Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.801000 audit: BPF prog-id=35 op=LOAD Oct 2 19:07:25.801000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:07:25.801000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:07:25.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.803000 audit: BPF prog-id=36 op=LOAD Oct 2 19:07:25.803000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit: BPF prog-id=37 op=LOAD Oct 2 19:07:25.805000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit: BPF prog-id=38 op=LOAD Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.805000 audit: BPF prog-id=39 op=LOAD Oct 2 19:07:25.805000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:07:25.805000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:07:25.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.806000 audit: BPF prog-id=40 op=LOAD Oct 2 19:07:25.807000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit: BPF prog-id=41 op=LOAD Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.807000 audit: BPF prog-id=42 op=LOAD Oct 2 19:07:25.807000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:07:25.807000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:07:25.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.810000 audit: BPF prog-id=43 op=LOAD Oct 2 19:07:25.810000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:07:25.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit: BPF prog-id=44 op=LOAD Oct 2 19:07:25.812000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit: BPF prog-id=45 op=LOAD Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.812000 audit: BPF prog-id=46 op=LOAD Oct 2 19:07:25.812000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:07:25.812000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:07:25.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.815000 audit: BPF prog-id=47 op=LOAD Oct 2 19:07:25.815000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:07:25.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.816000 audit: BPF prog-id=48 op=LOAD Oct 2 19:07:25.816000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit: BPF prog-id=49 op=LOAD Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.817000 audit: BPF prog-id=50 op=LOAD Oct 2 19:07:25.817000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:07:25.817000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:07:25.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:25.821000 audit: BPF prog-id=51 op=LOAD Oct 2 19:07:25.821000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:07:25.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:25.840100 systemd[1]: Started kubelet.service. Oct 2 19:07:25.947127 kubelet[2022]: E1002 19:07:25.946645 2022 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Oct 2 19:07:25.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:07:25.951374 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:07:25.951552 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:07:26.620313 env[1553]: time="2023-10-02T19:07:26.620120740Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.9\"" Oct 2 19:07:27.292994 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2044220957.mount: Deactivated successfully. Oct 2 19:07:32.391785 env[1553]: time="2023-10-02T19:07:32.391732008Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:32.393595 env[1553]: time="2023-10-02T19:07:32.393554093Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c52a40ca2c2b6ae662714743a505c761236790f8bfce772fc577c3c965462d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:32.395977 env[1553]: time="2023-10-02T19:07:32.395944907Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:32.398240 env[1553]: time="2023-10-02T19:07:32.398191517Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5f354253b464a8802ce01ffdd1bb8d0d17785daca4b6c8b84df06e9949e21449,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:32.398919 env[1553]: time="2023-10-02T19:07:32.398883989Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.9\" returns image reference \"sha256:6c52a40ca2c2b6ae662714743a505c761236790f8bfce772fc577c3c965462d2\"" Oct 2 19:07:32.413493 env[1553]: time="2023-10-02T19:07:32.413452638Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.9\"" Oct 2 19:07:36.059148 kernel: kauditd_printk_skb: 292 callbacks suppressed Oct 2 19:07:36.059322 kernel: audit: type=1130 audit(1696273656.055:407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:36.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:36.055960 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:07:36.056285 systemd[1]: Stopped kubelet.service. Oct 2 19:07:36.058737 systemd[1]: Started kubelet.service. Oct 2 19:07:36.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:36.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:36.080241 kernel: audit: type=1131 audit(1696273656.055:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:36.080386 kernel: audit: type=1130 audit(1696273656.056:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:36.174853 kubelet[2045]: E1002 19:07:36.174798 2045 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Oct 2 19:07:36.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:07:36.181551 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:07:36.181723 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:07:36.187244 kernel: audit: type=1131 audit(1696273656.180:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:07:37.112388 env[1553]: time="2023-10-02T19:07:37.112336218Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:37.117049 env[1553]: time="2023-10-02T19:07:37.117003713Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:139e76b0f613cb0698b528828be26fb99b86eb7374a2372b3ff41657e2e24c7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:37.119630 env[1553]: time="2023-10-02T19:07:37.119592712Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:37.121997 env[1553]: time="2023-10-02T19:07:37.121959665Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:27bf12cdfcccc8893cd66e4573044ec46fb05964a02f67b3e1a59f66db7ee101,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:37.123567 env[1553]: time="2023-10-02T19:07:37.123523479Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.9\" returns image reference \"sha256:139e76b0f613cb0698b528828be26fb99b86eb7374a2372b3ff41657e2e24c7c\"" Oct 2 19:07:37.142755 env[1553]: time="2023-10-02T19:07:37.142701049Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.9\"" Oct 2 19:07:39.952374 env[1553]: time="2023-10-02T19:07:39.952056207Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:39.956307 env[1553]: time="2023-10-02T19:07:39.956259077Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:93796172d009be2c7ea43f869773c64826626d7f09a926298e9a046781b30999,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:39.958857 env[1553]: time="2023-10-02T19:07:39.958816479Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:39.960990 env[1553]: time="2023-10-02T19:07:39.960948463Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:cf0312a97893a0ff42b2863cdb43243afc6397c77f2f2036a73708069e9af315,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:39.961890 env[1553]: time="2023-10-02T19:07:39.961850494Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.9\" returns image reference \"sha256:93796172d009be2c7ea43f869773c64826626d7f09a926298e9a046781b30999\"" Oct 2 19:07:39.979631 env[1553]: time="2023-10-02T19:07:39.979590694Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.9\"" Oct 2 19:07:41.497619 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3396364401.mount: Deactivated successfully. Oct 2 19:07:42.309704 env[1553]: time="2023-10-02T19:07:42.309651224Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:42.313187 env[1553]: time="2023-10-02T19:07:42.313047596Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95433ef6ee1d55f93a09fe73299b8b95f623d791acd4da21a86bb749626df9ad,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:42.315696 env[1553]: time="2023-10-02T19:07:42.315645935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:42.318010 env[1553]: time="2023-10-02T19:07:42.317969767Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d8c8e3e8fe630c3f2d84a22722d4891343196483ac4cc02c1ba9345b1bfc8a3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:42.323615 env[1553]: time="2023-10-02T19:07:42.323548861Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.9\" returns image reference \"sha256:95433ef6ee1d55f93a09fe73299b8b95f623d791acd4da21a86bb749626df9ad\"" Oct 2 19:07:42.337476 env[1553]: time="2023-10-02T19:07:42.337438524Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:07:42.710784 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 19:07:42.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:42.716286 kernel: audit: type=1131 audit(1696273662.709:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:42.735000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:07:42.735000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:07:42.739582 kernel: audit: type=1334 audit(1696273662.735:412): prog-id=42 op=UNLOAD Oct 2 19:07:42.739687 kernel: audit: type=1334 audit(1696273662.735:413): prog-id=41 op=UNLOAD Oct 2 19:07:42.739724 kernel: audit: type=1334 audit(1696273662.735:414): prog-id=40 op=UNLOAD Oct 2 19:07:42.735000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:07:42.854048 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2385804122.mount: Deactivated successfully. Oct 2 19:07:42.863433 env[1553]: time="2023-10-02T19:07:42.863352784Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:42.866516 env[1553]: time="2023-10-02T19:07:42.866467018Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:42.868827 env[1553]: time="2023-10-02T19:07:42.868784150Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:42.871147 env[1553]: time="2023-10-02T19:07:42.871105527Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:42.871659 env[1553]: time="2023-10-02T19:07:42.871624977Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 19:07:42.885039 env[1553]: time="2023-10-02T19:07:42.884985867Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Oct 2 19:07:43.907113 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount407109542.mount: Deactivated successfully. Oct 2 19:07:46.318838 kernel: audit: type=1130 audit(1696273666.304:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:46.318978 kernel: audit: type=1131 audit(1696273666.305:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:46.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:46.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:46.305881 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 19:07:46.306171 systemd[1]: Stopped kubelet.service. Oct 2 19:07:46.313352 systemd[1]: Started kubelet.service. Oct 2 19:07:46.327675 kernel: audit: type=1130 audit(1696273666.312:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:46.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:46.419013 kubelet[2076]: E1002 19:07:46.418954 2076 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Oct 2 19:07:46.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:07:46.428103 kernel: audit: type=1131 audit(1696273666.420:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:07:46.421430 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:07:46.421601 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:07:49.444634 env[1553]: time="2023-10-02T19:07:49.444579622Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:49.449704 env[1553]: time="2023-10-02T19:07:49.449660587Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:49.452623 env[1553]: time="2023-10-02T19:07:49.452582875Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:49.455103 env[1553]: time="2023-10-02T19:07:49.455060909Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:49.455837 env[1553]: time="2023-10-02T19:07:49.455766072Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Oct 2 19:07:49.475306 env[1553]: time="2023-10-02T19:07:49.475271648Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Oct 2 19:07:50.109419 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3839915921.mount: Deactivated successfully. Oct 2 19:07:51.180859 env[1553]: time="2023-10-02T19:07:51.180802970Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:51.197014 env[1553]: time="2023-10-02T19:07:51.196950810Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:51.200017 env[1553]: time="2023-10-02T19:07:51.199976181Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:51.202339 env[1553]: time="2023-10-02T19:07:51.202288118Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:51.203061 env[1553]: time="2023-10-02T19:07:51.203025679Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Oct 2 19:07:53.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:53.782942 systemd[1]: Stopped kubelet.service. Oct 2 19:07:53.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:53.794005 kernel: audit: type=1130 audit(1696273673.782:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:53.794252 kernel: audit: type=1131 audit(1696273673.785:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:53.807771 systemd[1]: Reloading. Oct 2 19:07:53.913338 /usr/lib/systemd/system-generators/torcx-generator[2166]: time="2023-10-02T19:07:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:07:53.913378 /usr/lib/systemd/system-generators/torcx-generator[2166]: time="2023-10-02T19:07:53Z" level=info msg="torcx already run" Oct 2 19:07:54.001655 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:07:54.001680 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:07:54.023966 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:07:54.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.113226 kernel: audit: type=1400 audit(1696273674.107:421): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.117364 kernel: audit: type=1400 audit(1696273674.107:422): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.127867 kernel: audit: type=1400 audit(1696273674.107:423): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.127958 kernel: audit: type=1400 audit(1696273674.107:424): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.132304 kernel: audit: type=1400 audit(1696273674.107:425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.132383 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:07:54.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.138465 kernel: audit: type=1400 audit(1696273674.107:426): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.138574 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:07:54.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.112000 audit: BPF prog-id=52 op=LOAD Oct 2 19:07:54.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.112000 audit: BPF prog-id=53 op=LOAD Oct 2 19:07:54.112000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:07:54.112000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:07:54.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.117000 audit: BPF prog-id=54 op=LOAD Oct 2 19:07:54.117000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:07:54.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.123000 audit: BPF prog-id=55 op=LOAD Oct 2 19:07:54.123000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:07:54.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.127000 audit: BPF prog-id=56 op=LOAD Oct 2 19:07:54.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.127000 audit: BPF prog-id=57 op=LOAD Oct 2 19:07:54.127000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:07:54.127000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:07:54.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.140000 audit: BPF prog-id=58 op=LOAD Oct 2 19:07:54.140000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:07:54.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.142000 audit: BPF prog-id=59 op=LOAD Oct 2 19:07:54.142000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:07:54.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.143000 audit: BPF prog-id=60 op=LOAD Oct 2 19:07:54.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.143000 audit: BPF prog-id=61 op=LOAD Oct 2 19:07:54.143000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:07:54.143000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit: BPF prog-id=62 op=LOAD Oct 2 19:07:54.144000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit: BPF prog-id=63 op=LOAD Oct 2 19:07:54.144000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit: BPF prog-id=64 op=LOAD Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.144000 audit: BPF prog-id=65 op=LOAD Oct 2 19:07:54.144000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:07:54.144000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:07:54.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.147000 audit: BPF prog-id=66 op=LOAD Oct 2 19:07:54.147000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:07:54.172663 systemd[1]: Started kubelet.service. Oct 2 19:07:54.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:54.243897 kubelet[2218]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:07:54.243897 kubelet[2218]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:07:54.244468 kubelet[2218]: I1002 19:07:54.243963 2218 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:07:54.245923 kubelet[2218]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:07:54.245923 kubelet[2218]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:07:54.831403 kubelet[2218]: I1002 19:07:54.831358 2218 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Oct 2 19:07:54.831403 kubelet[2218]: I1002 19:07:54.831390 2218 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:07:54.831747 kubelet[2218]: I1002 19:07:54.831725 2218 server.go:836] "Client rotation is on, will bootstrap in background" Oct 2 19:07:54.836606 kubelet[2218]: E1002 19:07:54.836575 2218 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.27.162:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:54.836856 kubelet[2218]: I1002 19:07:54.836841 2218 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:07:54.837912 kubelet[2218]: I1002 19:07:54.837883 2218 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:07:54.838364 kubelet[2218]: I1002 19:07:54.838316 2218 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:07:54.838508 kubelet[2218]: I1002 19:07:54.838481 2218 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:07:54.838830 kubelet[2218]: I1002 19:07:54.838554 2218 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:07:54.838830 kubelet[2218]: I1002 19:07:54.838573 2218 container_manager_linux.go:308] "Creating device plugin manager" Oct 2 19:07:54.839074 kubelet[2218]: I1002 19:07:54.838999 2218 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:07:54.842697 kubelet[2218]: I1002 19:07:54.842672 2218 kubelet.go:398] "Attempting to sync node with API server" Oct 2 19:07:54.842697 kubelet[2218]: I1002 19:07:54.842700 2218 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:07:54.843072 kubelet[2218]: I1002 19:07:54.842728 2218 kubelet.go:297] "Adding apiserver pod source" Oct 2 19:07:54.843072 kubelet[2218]: I1002 19:07:54.842746 2218 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:07:54.844245 kubelet[2218]: W1002 19:07:54.844185 2218 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.27.162:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-162&limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:54.844354 kubelet[2218]: E1002 19:07:54.844261 2218 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.27.162:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-162&limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:54.844407 kubelet[2218]: I1002 19:07:54.844355 2218 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:07:54.844680 kubelet[2218]: W1002 19:07:54.844661 2218 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:07:54.845572 kubelet[2218]: I1002 19:07:54.845549 2218 server.go:1186] "Started kubelet" Oct 2 19:07:54.847000 audit[2218]: AVC avc: denied { mac_admin } for pid=2218 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.847000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:07:54.847000 audit[2218]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008fd3e0 a1=c0005fd290 a2=c0008fd3b0 a3=25 items=0 ppid=1 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.847000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:07:54.847000 audit[2218]: AVC avc: denied { mac_admin } for pid=2218 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:54.847000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:07:54.847000 audit[2218]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a0cbc0 a1=c0005fd2a8 a2=c0008fd470 a3=25 items=0 ppid=1 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.847000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:07:54.848088 kubelet[2218]: I1002 19:07:54.847564 2218 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:07:54.848088 kubelet[2218]: I1002 19:07:54.847636 2218 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:07:54.848088 kubelet[2218]: I1002 19:07:54.847720 2218 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:07:54.852092 kubelet[2218]: W1002 19:07:54.852045 2218 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.27.162:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:54.852452 kubelet[2218]: E1002 19:07:54.852435 2218 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.27.162:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:54.852959 kubelet[2218]: E1002 19:07:54.852935 2218 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:07:54.853187 kubelet[2218]: E1002 19:07:54.852965 2218 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:07:54.860368 kubelet[2218]: I1002 19:07:54.860329 2218 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 19:07:54.860949 kubelet[2218]: I1002 19:07:54.860914 2218 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:07:54.863719 kubelet[2218]: W1002 19:07:54.861533 2218 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.27.162:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:54.863719 kubelet[2218]: E1002 19:07:54.861625 2218 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.27.162:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:54.863719 kubelet[2218]: E1002 19:07:54.863669 2218 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://172.31.27.162:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-162?timeout=10s": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:54.867445 kubelet[2218]: I1002 19:07:54.867359 2218 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:07:54.867000 audit[2228]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:54.867000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe68ab7ff0 a2=0 a3=7ffe68ab7fdc items=0 ppid=2218 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.867000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:07:54.868231 kubelet[2218]: I1002 19:07:54.868204 2218 server.go:451] "Adding debug handlers to kubelet server" Oct 2 19:07:54.877000 audit[2229]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:54.877000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc24268a00 a2=0 a3=7ffc242689ec items=0 ppid=2218 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.877000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:07:54.899000 audit[2231]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:54.899000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe8c69ac80 a2=0 a3=7ffe8c69ac6c items=0 ppid=2218 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:07:54.906000 audit[2233]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:54.906000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc592ee400 a2=0 a3=7ffc592ee3ec items=0 ppid=2218 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:07:54.908499 kubelet[2218]: E1002 19:07:54.906952 2218 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-162.178a5feb87038c74", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-162", UID:"ip-172-31-27-162", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-162"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 845523060, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 845523060, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.27.162:6443/api/v1/namespaces/default/events": dial tcp 172.31.27.162:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:07:54.946000 audit[2239]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:54.946000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdcdbd0650 a2=0 a3=7ffdcdbd063c items=0 ppid=2218 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.946000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:07:54.949000 audit[2241]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:54.949000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe52620fa0 a2=0 a3=7ffe52620f8c items=0 ppid=2218 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:07:54.965000 audit[2244]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:54.965000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd860e12e0 a2=0 a3=7ffd860e12cc items=0 ppid=2218 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.965000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:07:54.973784 kubelet[2218]: I1002 19:07:54.973748 2218 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-162" Oct 2 19:07:54.974621 kubelet[2218]: E1002 19:07:54.974548 2218 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.162:6443/api/v1/nodes\": dial tcp 172.31.27.162:6443: connect: connection refused" node="ip-172-31-27-162" Oct 2 19:07:54.975348 kubelet[2218]: I1002 19:07:54.975327 2218 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:07:54.975348 kubelet[2218]: I1002 19:07:54.975347 2218 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:07:54.975523 kubelet[2218]: I1002 19:07:54.975366 2218 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:07:54.976000 audit[2247]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:54.976000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffcb43a9be0 a2=0 a3=7ffcb43a9bcc items=0 ppid=2218 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:07:54.978454 kubelet[2218]: I1002 19:07:54.978431 2218 policy_none.go:49] "None policy: Start" Oct 2 19:07:54.978000 audit[2248]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:54.978000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffece411000 a2=0 a3=7ffece410fec items=0 ppid=2218 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:07:54.980288 kubelet[2218]: I1002 19:07:54.980267 2218 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:07:54.980374 kubelet[2218]: I1002 19:07:54.980300 2218 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:07:54.980000 audit[2249]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:54.980000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda62a3130 a2=0 a3=7ffda62a311c items=0 ppid=2218 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.980000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:07:54.985000 audit[2251]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:54.985000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe893af550 a2=0 a3=7ffe893af53c items=0 ppid=2218 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.985000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:07:54.989869 systemd[1]: Created slice kubepods.slice. Oct 2 19:07:54.990000 audit[2253]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:54.990000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffea23cf7e0 a2=0 a3=7ffea23cf7cc items=0 ppid=2218 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:07:54.996338 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:07:54.996000 audit[2255]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:54.996000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe45e175c0 a2=0 a3=7ffe45e175ac items=0 ppid=2218 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:54.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:07:55.003955 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:07:55.005000 audit[2257]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:55.005000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffe8892ef10 a2=0 a3=7ffe8892eefc items=0 ppid=2218 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:07:55.012450 kubelet[2218]: I1002 19:07:55.012418 2218 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:07:55.012000 audit[2218]: AVC avc: denied { mac_admin } for pid=2218 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:55.012000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:07:55.012000 audit[2218]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008fdcb0 a1=c000982bd0 a2=c0008fdc80 a3=25 items=0 ppid=1 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.012000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:07:55.012929 kubelet[2218]: I1002 19:07:55.012502 2218 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:07:55.012929 kubelet[2218]: I1002 19:07:55.012704 2218 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:07:55.013000 audit[2259]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:55.013000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffce4988e80 a2=0 a3=7ffce4988e6c items=0 ppid=2218 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:07:55.014068 kubelet[2218]: I1002 19:07:55.014049 2218 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:07:55.017146 kubelet[2218]: E1002 19:07:55.017114 2218 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-27-162\" not found" Oct 2 19:07:55.017000 audit[2260]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:55.017000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd23d21000 a2=0 a3=7ffd23d20fec items=0 ppid=2218 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.017000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:07:55.019000 audit[2261]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:55.019000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc95d17bf0 a2=0 a3=7ffc95d17bdc items=0 ppid=2218 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:07:55.021000 audit[2262]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:55.021000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3a4f6fd0 a2=0 a3=7ffd3a4f6fbc items=0 ppid=2218 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:07:55.022000 audit[2263]: NETFILTER_CFG table=nat:44 family=10 entries=2 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:55.022000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff3a001910 a2=0 a3=7fff3a0018fc items=0 ppid=2218 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.022000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:07:55.023000 audit[2264]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:55.023000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1b28ed70 a2=0 a3=7fff1b28ed5c items=0 ppid=2218 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:07:55.025000 audit[2266]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:55.025000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe8db0c3b0 a2=0 a3=7ffe8db0c39c items=0 ppid=2218 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.025000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:07:55.026000 audit[2267]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:55.026000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe5e145e90 a2=0 a3=7ffe5e145e7c items=0 ppid=2218 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.026000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:07:55.032000 audit[2269]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:55.032000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffd7a54a860 a2=0 a3=7ffd7a54a84c items=0 ppid=2218 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.032000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:07:55.034000 audit[2270]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:55.034000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc66052100 a2=0 a3=7ffc660520ec items=0 ppid=2218 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:07:55.035000 audit[2271]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:55.035000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7a636480 a2=0 a3=7ffd7a63646c items=0 ppid=2218 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:07:55.038000 audit[2273]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:55.038000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdaeb6b570 a2=0 a3=7ffdaeb6b55c items=0 ppid=2218 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:07:55.040000 audit[2275]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:55.040000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd070eed90 a2=0 a3=7ffd070eed7c items=0 ppid=2218 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.040000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:07:55.043000 audit[2277]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:55.043000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe2a7e79c0 a2=0 a3=7ffe2a7e79ac items=0 ppid=2218 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:07:55.046000 audit[2279]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:55.046000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fff57e42460 a2=0 a3=7fff57e4244c items=0 ppid=2218 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:07:55.049000 audit[2281]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:55.049000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffc756b30e0 a2=0 a3=7ffc756b30cc items=0 ppid=2218 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:07:55.050537 kubelet[2218]: I1002 19:07:55.050519 2218 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:07:55.050643 kubelet[2218]: I1002 19:07:55.050632 2218 status_manager.go:176] "Starting to sync pod status with apiserver" Oct 2 19:07:55.050714 kubelet[2218]: I1002 19:07:55.050705 2218 kubelet.go:2113] "Starting kubelet main sync loop" Oct 2 19:07:55.050866 kubelet[2218]: E1002 19:07:55.050851 2218 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 19:07:55.051000 audit[2282]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:55.051000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6c954300 a2=0 a3=7ffc6c9542ec items=0 ppid=2218 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:07:55.052513 kubelet[2218]: W1002 19:07:55.052467 2218 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.27.162:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:55.052634 kubelet[2218]: E1002 19:07:55.052622 2218 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.27.162:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:55.053000 audit[2283]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:55.053000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8afda8b0 a2=0 a3=7ffc8afda89c items=0 ppid=2218 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:07:55.055000 audit[2284]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:55.055000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff937e24d0 a2=0 a3=7fff937e24bc items=0 ppid=2218 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:55.055000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:07:55.064230 kubelet[2218]: E1002 19:07:55.064181 2218 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://172.31.27.162:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-162?timeout=10s": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:55.152706 kubelet[2218]: I1002 19:07:55.151580 2218 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:07:55.167576 kubelet[2218]: I1002 19:07:55.167552 2218 status_manager.go:698] "Failed to get status for pod" podUID=47b0d7bbe95e7085183e0519a2e6dd04 pod="kube-system/kube-apiserver-ip-172-31-27-162" err="Get \"https://172.31.27.162:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-27-162\": dial tcp 172.31.27.162:6443: connect: connection refused" Oct 2 19:07:55.167749 kubelet[2218]: I1002 19:07:55.167606 2218 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:07:55.168254 kubelet[2218]: I1002 19:07:55.167711 2218 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5359a76da47f4452ef470c1d1e19b86e-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-27-162\" (UID: \"5359a76da47f4452ef470c1d1e19b86e\") " pod="kube-system/kube-controller-manager-ip-172-31-27-162" Oct 2 19:07:55.168254 kubelet[2218]: I1002 19:07:55.168152 2218 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5359a76da47f4452ef470c1d1e19b86e-k8s-certs\") pod \"kube-controller-manager-ip-172-31-27-162\" (UID: \"5359a76da47f4452ef470c1d1e19b86e\") " pod="kube-system/kube-controller-manager-ip-172-31-27-162" Oct 2 19:07:55.168254 kubelet[2218]: I1002 19:07:55.168190 2218 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5359a76da47f4452ef470c1d1e19b86e-kubeconfig\") pod \"kube-controller-manager-ip-172-31-27-162\" (UID: \"5359a76da47f4452ef470c1d1e19b86e\") " pod="kube-system/kube-controller-manager-ip-172-31-27-162" Oct 2 19:07:55.168254 kubelet[2218]: I1002 19:07:55.168247 2218 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5359a76da47f4452ef470c1d1e19b86e-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-27-162\" (UID: \"5359a76da47f4452ef470c1d1e19b86e\") " pod="kube-system/kube-controller-manager-ip-172-31-27-162" Oct 2 19:07:55.168617 kubelet[2218]: I1002 19:07:55.168282 2218 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/47b0d7bbe95e7085183e0519a2e6dd04-ca-certs\") pod \"kube-apiserver-ip-172-31-27-162\" (UID: \"47b0d7bbe95e7085183e0519a2e6dd04\") " pod="kube-system/kube-apiserver-ip-172-31-27-162" Oct 2 19:07:55.168617 kubelet[2218]: I1002 19:07:55.168311 2218 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/47b0d7bbe95e7085183e0519a2e6dd04-k8s-certs\") pod \"kube-apiserver-ip-172-31-27-162\" (UID: \"47b0d7bbe95e7085183e0519a2e6dd04\") " pod="kube-system/kube-apiserver-ip-172-31-27-162" Oct 2 19:07:55.168617 kubelet[2218]: I1002 19:07:55.168341 2218 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/47b0d7bbe95e7085183e0519a2e6dd04-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-27-162\" (UID: \"47b0d7bbe95e7085183e0519a2e6dd04\") " pod="kube-system/kube-apiserver-ip-172-31-27-162" Oct 2 19:07:55.168617 kubelet[2218]: I1002 19:07:55.168383 2218 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5359a76da47f4452ef470c1d1e19b86e-ca-certs\") pod \"kube-controller-manager-ip-172-31-27-162\" (UID: \"5359a76da47f4452ef470c1d1e19b86e\") " pod="kube-system/kube-controller-manager-ip-172-31-27-162" Oct 2 19:07:55.170242 kubelet[2218]: I1002 19:07:55.170208 2218 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:07:55.174353 systemd[1]: Created slice kubepods-burstable-pod47b0d7bbe95e7085183e0519a2e6dd04.slice. Oct 2 19:07:55.179865 kubelet[2218]: I1002 19:07:55.179836 2218 status_manager.go:698] "Failed to get status for pod" podUID=5359a76da47f4452ef470c1d1e19b86e pod="kube-system/kube-controller-manager-ip-172-31-27-162" err="Get \"https://172.31.27.162:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-27-162\": dial tcp 172.31.27.162:6443: connect: connection refused" Oct 2 19:07:55.180111 kubelet[2218]: I1002 19:07:55.180092 2218 status_manager.go:698] "Failed to get status for pod" podUID=ed38514cd9968c36321881e64d462ba8 pod="kube-system/kube-scheduler-ip-172-31-27-162" err="Get \"https://172.31.27.162:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-27-162\": dial tcp 172.31.27.162:6443: connect: connection refused" Oct 2 19:07:55.180280 kubelet[2218]: I1002 19:07:55.180236 2218 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-162" Oct 2 19:07:55.180522 kubelet[2218]: E1002 19:07:55.180504 2218 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.162:6443/api/v1/nodes\": dial tcp 172.31.27.162:6443: connect: connection refused" node="ip-172-31-27-162" Oct 2 19:07:55.198722 systemd[1]: Created slice kubepods-burstable-pod5359a76da47f4452ef470c1d1e19b86e.slice. Oct 2 19:07:55.206067 systemd[1]: Created slice kubepods-burstable-poded38514cd9968c36321881e64d462ba8.slice. Oct 2 19:07:55.269505 kubelet[2218]: I1002 19:07:55.269468 2218 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ed38514cd9968c36321881e64d462ba8-kubeconfig\") pod \"kube-scheduler-ip-172-31-27-162\" (UID: \"ed38514cd9968c36321881e64d462ba8\") " pod="kube-system/kube-scheduler-ip-172-31-27-162" Oct 2 19:07:55.465976 kubelet[2218]: E1002 19:07:55.465700 2218 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://172.31.27.162:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-162?timeout=10s": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:55.496018 env[1553]: time="2023-10-02T19:07:55.495967015Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-27-162,Uid:47b0d7bbe95e7085183e0519a2e6dd04,Namespace:kube-system,Attempt:0,}" Oct 2 19:07:55.504792 env[1553]: time="2023-10-02T19:07:55.504750638Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-27-162,Uid:5359a76da47f4452ef470c1d1e19b86e,Namespace:kube-system,Attempt:0,}" Oct 2 19:07:55.510071 env[1553]: time="2023-10-02T19:07:55.510021069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-27-162,Uid:ed38514cd9968c36321881e64d462ba8,Namespace:kube-system,Attempt:0,}" Oct 2 19:07:55.583317 kubelet[2218]: I1002 19:07:55.583290 2218 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-162" Oct 2 19:07:55.583841 kubelet[2218]: E1002 19:07:55.583691 2218 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.162:6443/api/v1/nodes\": dial tcp 172.31.27.162:6443: connect: connection refused" node="ip-172-31-27-162" Oct 2 19:07:55.749869 kubelet[2218]: W1002 19:07:55.749395 2218 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.27.162:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-162&limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:55.749869 kubelet[2218]: E1002 19:07:55.749456 2218 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.27.162:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-162&limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:55.868363 kubelet[2218]: W1002 19:07:55.868309 2218 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.27.162:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:55.868363 kubelet[2218]: E1002 19:07:55.868367 2218 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.27.162:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:56.050664 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1597859474.mount: Deactivated successfully. Oct 2 19:07:56.140563 env[1553]: time="2023-10-02T19:07:56.140507098Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:56.229380 env[1553]: time="2023-10-02T19:07:56.229332473Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:56.230850 kubelet[2218]: W1002 19:07:56.230745 2218 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.27.162:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:56.230850 kubelet[2218]: E1002 19:07:56.230827 2218 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.27.162:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:56.242137 env[1553]: time="2023-10-02T19:07:56.242085851Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:56.267157 kubelet[2218]: E1002 19:07:56.266845 2218 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://172.31.27.162:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-162?timeout=10s": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:56.267157 kubelet[2218]: W1002 19:07:56.267102 2218 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.27.162:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:56.267157 kubelet[2218]: E1002 19:07:56.267133 2218 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.27.162:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:56.270340 env[1553]: time="2023-10-02T19:07:56.270295056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:56.274007 env[1553]: time="2023-10-02T19:07:56.273959845Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:56.274991 env[1553]: time="2023-10-02T19:07:56.274951323Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:56.276571 env[1553]: time="2023-10-02T19:07:56.276535620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:56.280722 env[1553]: time="2023-10-02T19:07:56.280668720Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:56.282431 env[1553]: time="2023-10-02T19:07:56.282342637Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:56.284492 env[1553]: time="2023-10-02T19:07:56.284454758Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:56.294201 env[1553]: time="2023-10-02T19:07:56.294149710Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:56.302928 env[1553]: time="2023-10-02T19:07:56.302001669Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:56.363722 env[1553]: time="2023-10-02T19:07:56.363616428Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:56.363891 env[1553]: time="2023-10-02T19:07:56.363747740Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:56.363891 env[1553]: time="2023-10-02T19:07:56.363779031Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:56.364098 env[1553]: time="2023-10-02T19:07:56.364024639Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/71b9962595be2cd4713b9d9f41edd33357936c1e7584eccfc7d3e888e67509b6 pid=2292 runtime=io.containerd.runc.v2 Oct 2 19:07:56.386989 kubelet[2218]: I1002 19:07:56.386481 2218 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-162" Oct 2 19:07:56.387579 kubelet[2218]: E1002 19:07:56.387058 2218 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.162:6443/api/v1/nodes\": dial tcp 172.31.27.162:6443: connect: connection refused" node="ip-172-31-27-162" Oct 2 19:07:56.387848 env[1553]: time="2023-10-02T19:07:56.387179752Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:56.387848 env[1553]: time="2023-10-02T19:07:56.387257231Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:56.387848 env[1553]: time="2023-10-02T19:07:56.387321635Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:56.387848 env[1553]: time="2023-10-02T19:07:56.387623583Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/38f635b7eee760cce91adb24ebc4e57c38512474cf0dc5a62787e421f9618ff2 pid=2314 runtime=io.containerd.runc.v2 Oct 2 19:07:56.390639 env[1553]: time="2023-10-02T19:07:56.390553078Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:56.390955 env[1553]: time="2023-10-02T19:07:56.390910783Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:56.391103 env[1553]: time="2023-10-02T19:07:56.391076666Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:56.391535 env[1553]: time="2023-10-02T19:07:56.391493810Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6e7bf60eaa033437141df5189fb9d4326d0972df3ee39307439bfb919b7934b9 pid=2317 runtime=io.containerd.runc.v2 Oct 2 19:07:56.415532 systemd[1]: Started cri-containerd-38f635b7eee760cce91adb24ebc4e57c38512474cf0dc5a62787e421f9618ff2.scope. Oct 2 19:07:56.426022 systemd[1]: Started cri-containerd-71b9962595be2cd4713b9d9f41edd33357936c1e7584eccfc7d3e888e67509b6.scope. Oct 2 19:07:56.456435 systemd[1]: Started cri-containerd-6e7bf60eaa033437141df5189fb9d4326d0972df3ee39307439bfb919b7934b9.scope. Oct 2 19:07:56.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.466000 audit: BPF prog-id=67 op=LOAD Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2314 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663633356237656565373630636365393161646232346562633465 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2314 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663633356237656565373630636365393161646232346562633465 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit: BPF prog-id=68 op=LOAD Oct 2 19:07:56.467000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b6e20 items=0 ppid=2314 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663633356237656565373630636365393161646232346562633465 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit: BPF prog-id=69 op=LOAD Oct 2 19:07:56.467000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b6e68 items=0 ppid=2314 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663633356237656565373630636365393161646232346562633465 Oct 2 19:07:56.467000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:07:56.467000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { perfmon } for pid=2345 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.467000 audit: BPF prog-id=70 op=LOAD Oct 2 19:07:56.467000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b7278 items=0 ppid=2314 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663633356237656565373630636365393161646232346562633465 Oct 2 19:07:56.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.490000 audit: BPF prog-id=71 op=LOAD Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2292 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731623939363235393562653263643437313362396439663431656464 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2292 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731623939363235393562653263643437313362396439663431656464 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit: BPF prog-id=72 op=LOAD Oct 2 19:07:56.491000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d0de0 items=0 ppid=2292 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731623939363235393562653263643437313362396439663431656464 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit: BPF prog-id=73 op=LOAD Oct 2 19:07:56.491000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d0e28 items=0 ppid=2292 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731623939363235393562653263643437313362396439663431656464 Oct 2 19:07:56.491000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:07:56.491000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.491000 audit: BPF prog-id=74 op=LOAD Oct 2 19:07:56.491000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d1238 items=0 ppid=2292 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731623939363235393562653263643437313362396439663431656464 Oct 2 19:07:56.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.499000 audit: BPF prog-id=75 op=LOAD Oct 2 19:07:56.501000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.501000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2317 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665376266363065616130333334333731343164663531383966623964 Oct 2 19:07:56.501000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.501000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2317 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665376266363065616130333334333731343164663531383966623964 Oct 2 19:07:56.502000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.502000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.502000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.502000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.502000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.502000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.502000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.502000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.502000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.502000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.502000 audit: BPF prog-id=76 op=LOAD Oct 2 19:07:56.502000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024640 items=0 ppid=2317 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665376266363065616130333334333731343164663531383966623964 Oct 2 19:07:56.503000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.503000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.503000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.503000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.503000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.503000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.503000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.503000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.503000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.503000 audit: BPF prog-id=77 op=LOAD Oct 2 19:07:56.503000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024688 items=0 ppid=2317 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665376266363065616130333334333731343164663531383966623964 Oct 2 19:07:56.503000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:07:56.504000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:07:56.504000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.504000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.504000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.504000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.504000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.504000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.504000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.504000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.504000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.504000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.504000 audit: BPF prog-id=78 op=LOAD Oct 2 19:07:56.504000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024a98 items=0 ppid=2317 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665376266363065616130333334333731343164663531383966623964 Oct 2 19:07:56.578372 env[1553]: time="2023-10-02T19:07:56.578325493Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-27-162,Uid:5359a76da47f4452ef470c1d1e19b86e,Namespace:kube-system,Attempt:0,} returns sandbox id \"38f635b7eee760cce91adb24ebc4e57c38512474cf0dc5a62787e421f9618ff2\"" Oct 2 19:07:56.590898 env[1553]: time="2023-10-02T19:07:56.590856826Z" level=info msg="CreateContainer within sandbox \"38f635b7eee760cce91adb24ebc4e57c38512474cf0dc5a62787e421f9618ff2\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:07:56.610544 env[1553]: time="2023-10-02T19:07:56.610495706Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-27-162,Uid:47b0d7bbe95e7085183e0519a2e6dd04,Namespace:kube-system,Attempt:0,} returns sandbox id \"6e7bf60eaa033437141df5189fb9d4326d0972df3ee39307439bfb919b7934b9\"" Oct 2 19:07:56.620929 env[1553]: time="2023-10-02T19:07:56.620856688Z" level=info msg="CreateContainer within sandbox \"6e7bf60eaa033437141df5189fb9d4326d0972df3ee39307439bfb919b7934b9\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:07:56.630123 env[1553]: time="2023-10-02T19:07:56.630072990Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-27-162,Uid:ed38514cd9968c36321881e64d462ba8,Namespace:kube-system,Attempt:0,} returns sandbox id \"71b9962595be2cd4713b9d9f41edd33357936c1e7584eccfc7d3e888e67509b6\"" Oct 2 19:07:56.633577 env[1553]: time="2023-10-02T19:07:56.633529456Z" level=info msg="CreateContainer within sandbox \"38f635b7eee760cce91adb24ebc4e57c38512474cf0dc5a62787e421f9618ff2\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"4f0282d875b95ba76cb982b70d5fbf1e564bac196e2554a2be90236012b1a7b8\"" Oct 2 19:07:56.636066 env[1553]: time="2023-10-02T19:07:56.636013240Z" level=info msg="CreateContainer within sandbox \"71b9962595be2cd4713b9d9f41edd33357936c1e7584eccfc7d3e888e67509b6\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:07:56.636737 env[1553]: time="2023-10-02T19:07:56.636065706Z" level=info msg="StartContainer for \"4f0282d875b95ba76cb982b70d5fbf1e564bac196e2554a2be90236012b1a7b8\"" Oct 2 19:07:56.658403 env[1553]: time="2023-10-02T19:07:56.658345890Z" level=info msg="CreateContainer within sandbox \"6e7bf60eaa033437141df5189fb9d4326d0972df3ee39307439bfb919b7934b9\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"e8d445d7832efac80705fcf5e7b7752b71516502f26ce91f6eae4e84cbccc600\"" Oct 2 19:07:56.659448 env[1553]: time="2023-10-02T19:07:56.659420877Z" level=info msg="StartContainer for \"e8d445d7832efac80705fcf5e7b7752b71516502f26ce91f6eae4e84cbccc600\"" Oct 2 19:07:56.666245 env[1553]: time="2023-10-02T19:07:56.666171462Z" level=info msg="CreateContainer within sandbox \"71b9962595be2cd4713b9d9f41edd33357936c1e7584eccfc7d3e888e67509b6\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"50895df5f990598069863f5484288a9ef8449153d2eb36eabad528c8ae149b7c\"" Oct 2 19:07:56.667088 env[1553]: time="2023-10-02T19:07:56.667013597Z" level=info msg="StartContainer for \"50895df5f990598069863f5484288a9ef8449153d2eb36eabad528c8ae149b7c\"" Oct 2 19:07:56.674151 systemd[1]: Started cri-containerd-4f0282d875b95ba76cb982b70d5fbf1e564bac196e2554a2be90236012b1a7b8.scope. Oct 2 19:07:56.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.708000 audit: BPF prog-id=79 op=LOAD Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2314 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466303238326438373562393562613736636239383262373064356662 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2314 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466303238326438373562393562613736636239383262373064356662 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit: BPF prog-id=80 op=LOAD Oct 2 19:07:56.710000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000196fe0 items=0 ppid=2314 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466303238326438373562393562613736636239383262373064356662 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit: BPF prog-id=81 op=LOAD Oct 2 19:07:56.710000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000197028 items=0 ppid=2314 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466303238326438373562393562613736636239383262373064356662 Oct 2 19:07:56.710000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:07:56.710000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.710000 audit: BPF prog-id=82 op=LOAD Oct 2 19:07:56.710000 audit[2419]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000197438 items=0 ppid=2314 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466303238326438373562393562613736636239383262373064356662 Oct 2 19:07:56.761057 systemd[1]: Started cri-containerd-50895df5f990598069863f5484288a9ef8449153d2eb36eabad528c8ae149b7c.scope. Oct 2 19:07:56.778010 systemd[1]: Started cri-containerd-e8d445d7832efac80705fcf5e7b7752b71516502f26ce91f6eae4e84cbccc600.scope. Oct 2 19:07:56.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.820000 audit: BPF prog-id=83 op=LOAD Oct 2 19:07:56.823000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.823000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2317 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538643434356437383332656661633830373035666366356537623737 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2317 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538643434356437383332656661633830373035666366356537623737 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit: BPF prog-id=84 op=LOAD Oct 2 19:07:56.826000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a0400 items=0 ppid=2317 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538643434356437383332656661633830373035666366356537623737 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit: BPF prog-id=85 op=LOAD Oct 2 19:07:56.826000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a0448 items=0 ppid=2317 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538643434356437383332656661633830373035666366356537623737 Oct 2 19:07:56.826000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:07:56.826000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { perfmon } for pid=2446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit[2446]: AVC avc: denied { bpf } for pid=2446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.826000 audit: BPF prog-id=86 op=LOAD Oct 2 19:07:56.826000 audit[2446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a0858 items=0 ppid=2317 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538643434356437383332656661633830373035666366356537623737 Oct 2 19:07:56.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.837000 audit: BPF prog-id=87 op=LOAD Oct 2 19:07:56.838000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.838000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2292 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.846530 kubelet[2218]: E1002 19:07:56.846064 2218 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.27.162:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:56.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383935646635663939303539383036393836336635343834323838 Oct 2 19:07:56.846000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.846000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2292 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383935646635663939303539383036393836336635343834323838 Oct 2 19:07:56.847000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.847000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.847000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.847000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.847000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.847000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.847000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.847000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.847000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.847000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.847000 audit: BPF prog-id=88 op=LOAD Oct 2 19:07:56.847000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002de490 items=0 ppid=2292 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383935646635663939303539383036393836336635343834323838 Oct 2 19:07:56.848000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.848000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.848000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.848000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.848000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.848000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.848000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.848000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.848000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.848000 audit: BPF prog-id=89 op=LOAD Oct 2 19:07:56.848000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002de4d8 items=0 ppid=2292 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383935646635663939303539383036393836336635343834323838 Oct 2 19:07:56.849000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:07:56.849000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:07:56.849000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.849000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.849000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.849000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.849000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.849000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.849000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.849000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.849000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.849000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:56.849000 audit: BPF prog-id=90 op=LOAD Oct 2 19:07:56.849000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002de8e8 items=0 ppid=2292 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:56.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383935646635663939303539383036393836336635343834323838 Oct 2 19:07:56.875018 env[1553]: time="2023-10-02T19:07:56.874951454Z" level=info msg="StartContainer for \"4f0282d875b95ba76cb982b70d5fbf1e564bac196e2554a2be90236012b1a7b8\" returns successfully" Oct 2 19:07:56.932811 env[1553]: time="2023-10-02T19:07:56.932742761Z" level=info msg="StartContainer for \"50895df5f990598069863f5484288a9ef8449153d2eb36eabad528c8ae149b7c\" returns successfully" Oct 2 19:07:56.946807 env[1553]: time="2023-10-02T19:07:56.946752627Z" level=info msg="StartContainer for \"e8d445d7832efac80705fcf5e7b7752b71516502f26ce91f6eae4e84cbccc600\" returns successfully" Oct 2 19:07:57.065917 kubelet[2218]: I1002 19:07:57.065887 2218 status_manager.go:698] "Failed to get status for pod" podUID=ed38514cd9968c36321881e64d462ba8 pod="kube-system/kube-scheduler-ip-172-31-27-162" err="Get \"https://172.31.27.162:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-27-162\": dial tcp 172.31.27.162:6443: connect: connection refused" Oct 2 19:07:57.072293 kubelet[2218]: I1002 19:07:57.072054 2218 status_manager.go:698] "Failed to get status for pod" podUID=5359a76da47f4452ef470c1d1e19b86e pod="kube-system/kube-controller-manager-ip-172-31-27-162" err="Get \"https://172.31.27.162:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-27-162\": dial tcp 172.31.27.162:6443: connect: connection refused" Oct 2 19:07:57.081554 kubelet[2218]: I1002 19:07:57.081523 2218 status_manager.go:698] "Failed to get status for pod" podUID=47b0d7bbe95e7085183e0519a2e6dd04 pod="kube-system/kube-apiserver-ip-172-31-27-162" err="Get \"https://172.31.27.162:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-27-162\": dial tcp 172.31.27.162:6443: connect: connection refused" Oct 2 19:07:57.605289 kubelet[2218]: W1002 19:07:57.599093 2218 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.27.162:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-162&limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:57.606122 kubelet[2218]: E1002 19:07:57.605442 2218 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.27.162:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-162&limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:57.659765 update_engine[1544]: I1002 19:07:57.659271 1544 update_attempter.cc:505] Updating boot flags... Oct 2 19:07:57.868719 kubelet[2218]: E1002 19:07:57.867991 2218 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: Get "https://172.31.27.162:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-162?timeout=10s": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:58.022477 kubelet[2218]: I1002 19:07:58.018837 2218 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-162" Oct 2 19:07:58.029904 kubelet[2218]: E1002 19:07:58.024527 2218 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.162:6443/api/v1/nodes\": dial tcp 172.31.27.162:6443: connect: connection refused" node="ip-172-31-27-162" Oct 2 19:07:58.596000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:07:58.596000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00034b0b0 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:07:58.596000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:07:58.615000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:07:58.615000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001069600 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:07:58.615000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:07:58.664294 kubelet[2218]: W1002 19:07:58.664208 2218 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.27.162:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:07:58.664294 kubelet[2218]: E1002 19:07:58.664301 2218 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.27.162:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.162:6443: connect: connection refused Oct 2 19:08:01.227020 kubelet[2218]: I1002 19:08:01.226992 2218 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-162" Oct 2 19:08:01.443966 kernel: kauditd_printk_skb: 626 callbacks suppressed Oct 2 19:08:01.444446 kernel: audit: type=1400 audit(1696273681.437:739): avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:01.437000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:01.437000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c0045a2120 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:08:01.480526 kernel: audit: type=1300 audit(1696273681.437:739): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c0045a2120 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:08:01.437000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:01.511519 kernel: audit: type=1327 audit(1696273681.437:739): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:01.437000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:01.528655 kernel: audit: type=1400 audit(1696273681.437:740): avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:01.437000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c0014ea040 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:08:01.582446 kernel: audit: type=1300 audit(1696273681.437:740): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c0014ea040 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:08:01.582605 kernel: audit: type=1327 audit(1696273681.437:740): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:01.437000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:01.438000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:01.438000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c0045a2360 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:08:01.638199 kernel: audit: type=1400 audit(1696273681.438:741): avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:01.638367 kernel: audit: type=1300 audit(1696273681.438:741): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c0045a2360 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:08:01.638413 kernel: audit: type=1327 audit(1696273681.438:741): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:01.438000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:01.516000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:01.702858 kernel: audit: type=1400 audit(1696273681.516:742): avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:01.516000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c004626b70 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:08:01.516000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:01.532000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:01.532000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=53 a1=c001517000 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:08:01.532000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:01.532000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:01.532000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=53 a1=c004627b60 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:08:01.532000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:01.963718 kubelet[2218]: E1002 19:08:01.963658 2218 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-27-162\" not found" node="ip-172-31-27-162" Oct 2 19:08:02.155633 kubelet[2218]: I1002 19:08:02.155484 2218 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-27-162" Oct 2 19:08:02.210394 kubelet[2218]: E1002 19:08:02.179187 2218 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-162.178a5feb87038c74", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-162", UID:"ip-172-31-27-162", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-162"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 845523060, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 845523060, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:02.218024 kubelet[2218]: E1002 19:08:02.217937 2218 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-27-162\" not found" Oct 2 19:08:02.275159 kubelet[2218]: E1002 19:08:02.275017 2218 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-162.178a5feb8774e8e0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-162", UID:"ip-172-31-27-162", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-162"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 852952288, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 852952288, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:02.318429 kubelet[2218]: E1002 19:08:02.318352 2218 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-27-162\" not found" Oct 2 19:08:02.337479 kubelet[2218]: E1002 19:08:02.337345 2218 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-162.178a5feb8ea54966", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-162", UID:"ip-172-31-27-162", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-27-162 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-162"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 973563238, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 973563238, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:02.402885 kubelet[2218]: E1002 19:08:02.402748 2218 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-162.178a5feb8ea56719", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-162", UID:"ip-172-31-27-162", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-27-162 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-162"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 973570841, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 973570841, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:02.419153 kubelet[2218]: E1002 19:08:02.419075 2218 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-27-162\" not found" Oct 2 19:08:02.467003 kubelet[2218]: E1002 19:08:02.466767 2218 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-162.178a5feb8ea57ec1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-162", UID:"ip-172-31-27-162", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-27-162 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-162"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 973576897, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 973576897, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:02.520119 kubelet[2218]: E1002 19:08:02.519890 2218 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-27-162\" not found" Oct 2 19:08:02.541939 kubelet[2218]: E1002 19:08:02.541675 2218 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-162.178a5feb8ea54966", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-162", UID:"ip-172-31-27-162", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-27-162 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-162"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 973563238, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 973709436, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:02.603543 kubelet[2218]: E1002 19:08:02.603410 2218 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-162.178a5feb8ea56719", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-162", UID:"ip-172-31-27-162", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-27-162 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-162"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 973570841, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 973713136, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:02.621153 kubelet[2218]: E1002 19:08:02.621105 2218 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-27-162\" not found" Oct 2 19:08:02.666536 kubelet[2218]: E1002 19:08:02.666340 2218 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-162.178a5feb8ea57ec1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-162", UID:"ip-172-31-27-162", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-27-162 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-162"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 973576897, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 973717295, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:02.723344 kubelet[2218]: E1002 19:08:02.723173 2218 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-27-162\" not found" Oct 2 19:08:02.728543 kubelet[2218]: E1002 19:08:02.728436 2218 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-162.178a5feb9142cd62", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-162", UID:"ip-172-31-27-162", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-162"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 55, 17440610, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 55, 17440610, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:02.825277 kubelet[2218]: E1002 19:08:02.825241 2218 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-27-162\" not found" Oct 2 19:08:02.844697 kubelet[2218]: E1002 19:08:02.844584 2218 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-162.178a5feb8ea54966", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-162", UID:"ip-172-31-27-162", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-27-162 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-162"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 973563238, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 55, 154178078, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:02.927047 kubelet[2218]: E1002 19:08:02.927012 2218 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-27-162\" not found" Oct 2 19:08:03.027812 kubelet[2218]: E1002 19:08:03.027762 2218 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-27-162\" not found" Oct 2 19:08:03.128225 kubelet[2218]: E1002 19:08:03.128089 2218 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-27-162\" not found" Oct 2 19:08:03.228807 kubelet[2218]: E1002 19:08:03.228772 2218 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-27-162\" not found" Oct 2 19:08:03.239849 kubelet[2218]: E1002 19:08:03.239732 2218 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-162.178a5feb8ea56719", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-162", UID:"ip-172-31-27-162", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-27-162 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-162"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 973570841, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 55, 154350773, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:03.330011 kubelet[2218]: E1002 19:08:03.329973 2218 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-27-162\" not found" Oct 2 19:08:03.430747 kubelet[2218]: E1002 19:08:03.430629 2218 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ip-172-31-27-162\" not found" Oct 2 19:08:03.637182 kubelet[2218]: E1002 19:08:03.636805 2218 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-162.178a5feb8ea57ec1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-162", UID:"ip-172-31-27-162", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-27-162 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-162"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 54, 973576897, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 55, 154422132, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:08:03.850131 kubelet[2218]: I1002 19:08:03.850089 2218 apiserver.go:52] "Watching apiserver" Oct 2 19:08:03.861512 kubelet[2218]: I1002 19:08:03.861468 2218 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:08:03.879849 kubelet[2218]: I1002 19:08:03.879806 2218 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:08:04.861056 systemd[1]: Reloading. Oct 2 19:08:04.990818 /usr/lib/systemd/system-generators/torcx-generator[2637]: time="2023-10-02T19:08:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:08:04.990854 /usr/lib/systemd/system-generators/torcx-generator[2637]: time="2023-10-02T19:08:04Z" level=info msg="torcx already run" Oct 2 19:08:05.119700 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:08:05.119801 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:08:05.144713 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:08:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit: BPF prog-id=91 op=LOAD Oct 2 19:08:05.248000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit: BPF prog-id=92 op=LOAD Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.248000 audit: BPF prog-id=93 op=LOAD Oct 2 19:08:05.248000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:08:05.248000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:08:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.251000 audit: BPF prog-id=94 op=LOAD Oct 2 19:08:05.251000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:08:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit: BPF prog-id=95 op=LOAD Oct 2 19:08:05.254000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit: BPF prog-id=96 op=LOAD Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.254000 audit: BPF prog-id=97 op=LOAD Oct 2 19:08:05.254000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:08:05.254000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:08:05.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.255000 audit: BPF prog-id=98 op=LOAD Oct 2 19:08:05.255000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:08:05.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.257000 audit: BPF prog-id=99 op=LOAD Oct 2 19:08:05.257000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:08:05.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit: BPF prog-id=100 op=LOAD Oct 2 19:08:05.259000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit: BPF prog-id=101 op=LOAD Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.259000 audit: BPF prog-id=102 op=LOAD Oct 2 19:08:05.259000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:08:05.259000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:08:05.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.260000 audit: BPF prog-id=103 op=LOAD Oct 2 19:08:05.260000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit: BPF prog-id=104 op=LOAD Oct 2 19:08:05.261000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit: BPF prog-id=105 op=LOAD Oct 2 19:08:05.262000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit: BPF prog-id=106 op=LOAD Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.262000 audit: BPF prog-id=107 op=LOAD Oct 2 19:08:05.262000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:08:05.262000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:08:05.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.263000 audit: BPF prog-id=108 op=LOAD Oct 2 19:08:05.263000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:08:05.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.265000 audit: BPF prog-id=109 op=LOAD Oct 2 19:08:05.265000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:08:05.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.266000 audit: BPF prog-id=110 op=LOAD Oct 2 19:08:05.266000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:08:05.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.268000 audit: BPF prog-id=111 op=LOAD Oct 2 19:08:05.268000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:08:05.291710 systemd[1]: Stopping kubelet.service... Oct 2 19:08:05.294477 kubelet[2218]: I1002 19:08:05.292114 2218 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:08:05.322154 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:08:05.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:05.323032 systemd[1]: Stopped kubelet.service. Oct 2 19:08:05.333781 systemd[1]: Started kubelet.service. Oct 2 19:08:05.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:05.476283 kubelet[2689]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:08:05.476776 kubelet[2689]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:08:05.476996 kubelet[2689]: I1002 19:08:05.476950 2689 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:08:05.480073 kubelet[2689]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:08:05.480292 kubelet[2689]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:08:05.488917 kubelet[2689]: I1002 19:08:05.488886 2689 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Oct 2 19:08:05.489109 kubelet[2689]: I1002 19:08:05.489097 2689 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:08:05.489534 kubelet[2689]: I1002 19:08:05.489519 2689 server.go:836] "Client rotation is on, will bootstrap in background" Oct 2 19:08:05.494111 kubelet[2689]: I1002 19:08:05.494085 2689 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:08:05.495936 kubelet[2689]: I1002 19:08:05.495915 2689 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:08:05.501061 kubelet[2689]: I1002 19:08:05.501035 2689 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:08:05.501592 kubelet[2689]: I1002 19:08:05.501575 2689 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:08:05.502121 kubelet[2689]: I1002 19:08:05.502102 2689 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:08:05.502324 kubelet[2689]: I1002 19:08:05.502311 2689 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:08:05.502475 kubelet[2689]: I1002 19:08:05.502464 2689 container_manager_linux.go:308] "Creating device plugin manager" Oct 2 19:08:05.502603 kubelet[2689]: I1002 19:08:05.502595 2689 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:08:05.516903 kubelet[2689]: I1002 19:08:05.516873 2689 kubelet.go:398] "Attempting to sync node with API server" Oct 2 19:08:05.516903 kubelet[2689]: I1002 19:08:05.516912 2689 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:08:05.517137 kubelet[2689]: I1002 19:08:05.516950 2689 kubelet.go:297] "Adding apiserver pod source" Oct 2 19:08:05.517137 kubelet[2689]: I1002 19:08:05.516966 2689 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:08:05.529525 kubelet[2689]: I1002 19:08:05.529495 2689 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:08:05.530673 kubelet[2689]: I1002 19:08:05.530653 2689 server.go:1186] "Started kubelet" Oct 2 19:08:05.537000 audit[2689]: AVC avc: denied { mac_admin } for pid=2689 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.537000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:08:05.537000 audit[2689]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b75680 a1=c000a95770 a2=c000b75650 a3=25 items=0 ppid=1 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:05.537000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:08:05.539020 kubelet[2689]: I1002 19:08:05.538622 2689 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:08:05.539020 kubelet[2689]: I1002 19:08:05.538668 2689 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:08:05.539020 kubelet[2689]: I1002 19:08:05.538697 2689 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:08:05.537000 audit[2689]: AVC avc: denied { mac_admin } for pid=2689 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.537000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:08:05.537000 audit[2689]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b78dc0 a1=c000a957a0 a2=c000b75710 a3=25 items=0 ppid=1 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:05.537000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:08:05.545917 kubelet[2689]: I1002 19:08:05.545372 2689 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:08:05.546351 kubelet[2689]: I1002 19:08:05.546331 2689 server.go:451] "Adding debug handlers to kubelet server" Oct 2 19:08:05.551102 kubelet[2689]: I1002 19:08:05.551065 2689 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 19:08:05.555754 kubelet[2689]: E1002 19:08:05.554865 2689 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:08:05.555754 kubelet[2689]: E1002 19:08:05.554940 2689 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:08:05.558913 kubelet[2689]: I1002 19:08:05.556864 2689 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:08:05.664606 kubelet[2689]: I1002 19:08:05.664581 2689 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-162" Oct 2 19:08:05.688780 kubelet[2689]: I1002 19:08:05.688237 2689 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-27-162" Oct 2 19:08:05.688780 kubelet[2689]: I1002 19:08:05.688434 2689 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-27-162" Oct 2 19:08:05.724480 kubelet[2689]: I1002 19:08:05.724452 2689 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:08:05.831690 kubelet[2689]: I1002 19:08:05.831134 2689 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:08:05.831690 kubelet[2689]: I1002 19:08:05.831159 2689 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:08:05.831690 kubelet[2689]: I1002 19:08:05.831177 2689 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:08:05.831690 kubelet[2689]: I1002 19:08:05.831567 2689 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:08:05.831690 kubelet[2689]: I1002 19:08:05.831584 2689 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 19:08:05.831690 kubelet[2689]: I1002 19:08:05.831593 2689 policy_none.go:49] "None policy: Start" Oct 2 19:08:05.834921 kubelet[2689]: I1002 19:08:05.834896 2689 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:08:05.835087 kubelet[2689]: I1002 19:08:05.834930 2689 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:08:05.835654 kubelet[2689]: I1002 19:08:05.835432 2689 state_mem.go:75] "Updated machine memory state" Oct 2 19:08:05.849931 kubelet[2689]: I1002 19:08:05.849906 2689 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:08:05.849000 audit[2689]: AVC avc: denied { mac_admin } for pid=2689 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:05.849000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:08:05.849000 audit[2689]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001342ae0 a1=c000adcbe8 a2=c001342ab0 a3=25 items=0 ppid=1 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:05.849000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:08:05.852469 kubelet[2689]: I1002 19:08:05.852438 2689 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:08:05.860645 kubelet[2689]: I1002 19:08:05.859589 2689 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:08:05.867352 kubelet[2689]: I1002 19:08:05.867331 2689 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:08:05.867519 kubelet[2689]: I1002 19:08:05.867508 2689 status_manager.go:176] "Starting to sync pod status with apiserver" Oct 2 19:08:05.868007 kubelet[2689]: I1002 19:08:05.867983 2689 kubelet.go:2113] "Starting kubelet main sync loop" Oct 2 19:08:05.868112 kubelet[2689]: E1002 19:08:05.868041 2689 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 19:08:05.875000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:05.875000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e2cc00 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:08:05.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:05.897000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:05.897000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c67120 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:08:05.897000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:05.899000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:05.899000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e2d1c0 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:08:05.899000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:05.906000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:05.906000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e2d300 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:08:05.906000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:05.969517 kubelet[2689]: I1002 19:08:05.969461 2689 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:08:05.969701 kubelet[2689]: I1002 19:08:05.969563 2689 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:08:05.969701 kubelet[2689]: I1002 19:08:05.969638 2689 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:08:06.092457 kubelet[2689]: I1002 19:08:06.092331 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5359a76da47f4452ef470c1d1e19b86e-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-27-162\" (UID: \"5359a76da47f4452ef470c1d1e19b86e\") " pod="kube-system/kube-controller-manager-ip-172-31-27-162" Oct 2 19:08:06.092457 kubelet[2689]: I1002 19:08:06.092415 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5359a76da47f4452ef470c1d1e19b86e-k8s-certs\") pod \"kube-controller-manager-ip-172-31-27-162\" (UID: \"5359a76da47f4452ef470c1d1e19b86e\") " pod="kube-system/kube-controller-manager-ip-172-31-27-162" Oct 2 19:08:06.092457 kubelet[2689]: I1002 19:08:06.092461 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/47b0d7bbe95e7085183e0519a2e6dd04-k8s-certs\") pod \"kube-apiserver-ip-172-31-27-162\" (UID: \"47b0d7bbe95e7085183e0519a2e6dd04\") " pod="kube-system/kube-apiserver-ip-172-31-27-162" Oct 2 19:08:06.093451 kubelet[2689]: I1002 19:08:06.092560 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5359a76da47f4452ef470c1d1e19b86e-ca-certs\") pod \"kube-controller-manager-ip-172-31-27-162\" (UID: \"5359a76da47f4452ef470c1d1e19b86e\") " pod="kube-system/kube-controller-manager-ip-172-31-27-162" Oct 2 19:08:06.093451 kubelet[2689]: I1002 19:08:06.092803 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5359a76da47f4452ef470c1d1e19b86e-kubeconfig\") pod \"kube-controller-manager-ip-172-31-27-162\" (UID: \"5359a76da47f4452ef470c1d1e19b86e\") " pod="kube-system/kube-controller-manager-ip-172-31-27-162" Oct 2 19:08:06.093451 kubelet[2689]: I1002 19:08:06.092890 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5359a76da47f4452ef470c1d1e19b86e-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-27-162\" (UID: \"5359a76da47f4452ef470c1d1e19b86e\") " pod="kube-system/kube-controller-manager-ip-172-31-27-162" Oct 2 19:08:06.096142 kubelet[2689]: I1002 19:08:06.096040 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ed38514cd9968c36321881e64d462ba8-kubeconfig\") pod \"kube-scheduler-ip-172-31-27-162\" (UID: \"ed38514cd9968c36321881e64d462ba8\") " pod="kube-system/kube-scheduler-ip-172-31-27-162" Oct 2 19:08:06.096326 kubelet[2689]: I1002 19:08:06.096202 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/47b0d7bbe95e7085183e0519a2e6dd04-ca-certs\") pod \"kube-apiserver-ip-172-31-27-162\" (UID: \"47b0d7bbe95e7085183e0519a2e6dd04\") " pod="kube-system/kube-apiserver-ip-172-31-27-162" Oct 2 19:08:06.096403 kubelet[2689]: I1002 19:08:06.096340 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/47b0d7bbe95e7085183e0519a2e6dd04-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-27-162\" (UID: \"47b0d7bbe95e7085183e0519a2e6dd04\") " pod="kube-system/kube-apiserver-ip-172-31-27-162" Oct 2 19:08:06.528043 kubelet[2689]: I1002 19:08:06.527926 2689 apiserver.go:52] "Watching apiserver" Oct 2 19:08:06.558102 kubelet[2689]: I1002 19:08:06.558058 2689 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:08:06.600476 kubelet[2689]: I1002 19:08:06.600425 2689 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:08:06.908167 kubelet[2689]: E1002 19:08:06.908118 2689 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-27-162\" already exists" pod="kube-system/kube-scheduler-ip-172-31-27-162" Oct 2 19:08:07.129867 kubelet[2689]: E1002 19:08:07.129700 2689 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-27-162\" already exists" pod="kube-system/kube-apiserver-ip-172-31-27-162" Oct 2 19:08:07.358151 kubelet[2689]: E1002 19:08:07.358114 2689 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ip-172-31-27-162\" already exists" pod="kube-system/kube-controller-manager-ip-172-31-27-162" Oct 2 19:08:07.956305 kubelet[2689]: I1002 19:08:07.956145 2689 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-27-162" podStartSLOduration=2.955661798 pod.CreationTimestamp="2023-10-02 19:08:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:08:07.63448938 +0000 UTC m=+2.286210255" watchObservedRunningTime="2023-10-02 19:08:07.955661798 +0000 UTC m=+2.607382661" Oct 2 19:08:07.957275 kubelet[2689]: I1002 19:08:07.957254 2689 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-27-162" podStartSLOduration=2.957184996 pod.CreationTimestamp="2023-10-02 19:08:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:08:07.957141031 +0000 UTC m=+2.608861911" watchObservedRunningTime="2023-10-02 19:08:07.957184996 +0000 UTC m=+2.608905869" Oct 2 19:08:08.790099 kubelet[2689]: I1002 19:08:08.790055 2689 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-27-162" podStartSLOduration=3.789963032 pod.CreationTimestamp="2023-10-02 19:08:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:08:08.35518952 +0000 UTC m=+3.006910391" watchObservedRunningTime="2023-10-02 19:08:08.789963032 +0000 UTC m=+3.441683898" Oct 2 19:08:11.380557 sudo[1817]: pam_unix(sudo:session): session closed for user root Oct 2 19:08:11.379000 audit[1817]: USER_END pid=1817 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:11.382057 kernel: kauditd_printk_skb: 278 callbacks suppressed Oct 2 19:08:11.382137 kernel: audit: type=1106 audit(1696273691.379:998): pid=1817 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:11.382000 audit[1817]: CRED_DISP pid=1817 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:11.395344 kernel: audit: type=1104 audit(1696273691.382:999): pid=1817 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:11.422446 sshd[1814]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:11.426000 audit[1814]: USER_END pid=1814 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:11.427000 audit[1814]: CRED_DISP pid=1814 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:11.443486 kernel: audit: type=1106 audit(1696273691.426:1000): pid=1814 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:11.443811 kernel: audit: type=1104 audit(1696273691.427:1001): pid=1814 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:11.444914 systemd[1]: sshd@6-172.31.27.162:22-139.178.89.65:55276.service: Deactivated successfully. Oct 2 19:08:11.445873 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:08:11.446086 systemd[1]: session-7.scope: Consumed 3.931s CPU time. Oct 2 19:08:11.446294 systemd-logind[1543]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:08:11.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.162:22-139.178.89.65:55276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:11.448313 systemd-logind[1543]: Removed session 7. Oct 2 19:08:11.453263 kernel: audit: type=1131 audit(1696273691.444:1002): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.162:22-139.178.89.65:55276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:16.637000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:08:16.637000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011f94c0 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:08:16.665340 kernel: audit: type=1400 audit(1696273696.637:1003): avc: denied { watch } for pid=2438 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:08:16.665496 kernel: audit: type=1300 audit(1696273696.637:1003): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011f94c0 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:08:16.665542 kernel: audit: type=1327 audit(1696273696.637:1003): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:16.637000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:18.548857 kubelet[2689]: I1002 19:08:18.548825 2689 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:08:18.549950 env[1553]: time="2023-10-02T19:08:18.549901411Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:08:18.550840 kubelet[2689]: I1002 19:08:18.550640 2689 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:08:19.324120 kubelet[2689]: I1002 19:08:19.323997 2689 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:08:19.331391 systemd[1]: Created slice kubepods-besteffort-pod5ae21185_197a_430b_bd69_24756838afea.slice. Oct 2 19:08:19.404975 kubelet[2689]: I1002 19:08:19.404941 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5ae21185-197a-430b-bd69-24756838afea-lib-modules\") pod \"kube-proxy-d5nzb\" (UID: \"5ae21185-197a-430b-bd69-24756838afea\") " pod="kube-system/kube-proxy-d5nzb" Oct 2 19:08:19.405170 kubelet[2689]: I1002 19:08:19.404995 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5ae21185-197a-430b-bd69-24756838afea-xtables-lock\") pod \"kube-proxy-d5nzb\" (UID: \"5ae21185-197a-430b-bd69-24756838afea\") " pod="kube-system/kube-proxy-d5nzb" Oct 2 19:08:19.405170 kubelet[2689]: I1002 19:08:19.405029 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2qc2n\" (UniqueName: \"kubernetes.io/projected/5ae21185-197a-430b-bd69-24756838afea-kube-api-access-2qc2n\") pod \"kube-proxy-d5nzb\" (UID: \"5ae21185-197a-430b-bd69-24756838afea\") " pod="kube-system/kube-proxy-d5nzb" Oct 2 19:08:19.405170 kubelet[2689]: I1002 19:08:19.405058 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/5ae21185-197a-430b-bd69-24756838afea-kube-proxy\") pod \"kube-proxy-d5nzb\" (UID: \"5ae21185-197a-430b-bd69-24756838afea\") " pod="kube-system/kube-proxy-d5nzb" Oct 2 19:08:19.435114 kubelet[2689]: I1002 19:08:19.434922 2689 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:08:19.444152 systemd[1]: Created slice kubepods-besteffort-pod73a63d3c_ddaf_4c09_bb9f_5961a409b759.slice. Oct 2 19:08:19.506188 kubelet[2689]: I1002 19:08:19.506146 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x5dhl\" (UniqueName: \"kubernetes.io/projected/73a63d3c-ddaf-4c09-bb9f-5961a409b759-kube-api-access-x5dhl\") pod \"tigera-operator-54b47459dd-n84z5\" (UID: \"73a63d3c-ddaf-4c09-bb9f-5961a409b759\") " pod="tigera-operator/tigera-operator-54b47459dd-n84z5" Oct 2 19:08:19.506396 kubelet[2689]: I1002 19:08:19.506246 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/73a63d3c-ddaf-4c09-bb9f-5961a409b759-var-lib-calico\") pod \"tigera-operator-54b47459dd-n84z5\" (UID: \"73a63d3c-ddaf-4c09-bb9f-5961a409b759\") " pod="tigera-operator/tigera-operator-54b47459dd-n84z5" Oct 2 19:08:19.642556 env[1553]: time="2023-10-02T19:08:19.642446364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d5nzb,Uid:5ae21185-197a-430b-bd69-24756838afea,Namespace:kube-system,Attempt:0,}" Oct 2 19:08:19.667884 env[1553]: time="2023-10-02T19:08:19.667794678Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:19.668440 env[1553]: time="2023-10-02T19:08:19.667842294Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:19.668440 env[1553]: time="2023-10-02T19:08:19.667857700Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:19.668440 env[1553]: time="2023-10-02T19:08:19.668382511Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c7063b6a7303d3a4e617d9203a12323e9f687cd215f3711cbffe7fc02cb6693f pid=2794 runtime=io.containerd.runc.v2 Oct 2 19:08:19.699138 systemd[1]: Started cri-containerd-c7063b6a7303d3a4e617d9203a12323e9f687cd215f3711cbffe7fc02cb6693f.scope. Oct 2 19:08:19.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.736687 kernel: audit: type=1400 audit(1696273699.725:1004): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.737039 kernel: audit: type=1400 audit(1696273699.725:1005): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.737094 kernel: audit: type=1400 audit(1696273699.725:1006): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.748041 kernel: audit: type=1400 audit(1696273699.725:1007): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.748500 kernel: audit: type=1400 audit(1696273699.725:1008): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.754867 kernel: audit: type=1400 audit(1696273699.725:1009): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.755768 env[1553]: time="2023-10-02T19:08:19.755717719Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-54b47459dd-n84z5,Uid:73a63d3c-ddaf-4c09-bb9f-5961a409b759,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:08:19.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.765157 kernel: audit: type=1400 audit(1696273699.725:1010): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.731000 audit: BPF prog-id=112 op=LOAD Oct 2 19:08:19.736000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.736000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2794 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:19.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337303633623661373330336433613465363137643932303361313233 Oct 2 19:08:19.736000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.736000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2794 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:19.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337303633623661373330336433613465363137643932303361313233 Oct 2 19:08:19.736000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.736000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.736000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.736000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.736000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.736000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.736000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.736000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.736000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.736000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.736000 audit: BPF prog-id=113 op=LOAD Oct 2 19:08:19.736000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003bab70 items=0 ppid=2794 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:19.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337303633623661373330336433613465363137643932303361313233 Oct 2 19:08:19.741000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.741000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.741000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.741000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.741000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.741000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.741000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.741000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.741000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.741000 audit: BPF prog-id=114 op=LOAD Oct 2 19:08:19.741000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003babb8 items=0 ppid=2794 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:19.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337303633623661373330336433613465363137643932303361313233 Oct 2 19:08:19.758000 audit: BPF prog-id=114 op=UNLOAD Oct 2 19:08:19.759000 audit: BPF prog-id=113 op=UNLOAD Oct 2 19:08:19.759000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.759000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.759000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.759000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.759000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.759000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.759000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.759000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.759000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.759000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.759000 audit: BPF prog-id=115 op=LOAD Oct 2 19:08:19.759000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003bafc8 items=0 ppid=2794 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:19.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337303633623661373330336433613465363137643932303361313233 Oct 2 19:08:19.791772 env[1553]: time="2023-10-02T19:08:19.791717687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d5nzb,Uid:5ae21185-197a-430b-bd69-24756838afea,Namespace:kube-system,Attempt:0,} returns sandbox id \"c7063b6a7303d3a4e617d9203a12323e9f687cd215f3711cbffe7fc02cb6693f\"" Oct 2 19:08:19.801806 env[1553]: time="2023-10-02T19:08:19.801759282Z" level=info msg="CreateContainer within sandbox \"c7063b6a7303d3a4e617d9203a12323e9f687cd215f3711cbffe7fc02cb6693f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:08:19.819725 env[1553]: time="2023-10-02T19:08:19.808734906Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:19.819725 env[1553]: time="2023-10-02T19:08:19.808783281Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:19.819725 env[1553]: time="2023-10-02T19:08:19.808799533Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:19.819725 env[1553]: time="2023-10-02T19:08:19.809099449Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f5388af0eba3b7947bb51c971162140efaefa4e6c6b90e9b15cc329140257cb pid=2837 runtime=io.containerd.runc.v2 Oct 2 19:08:19.822727 env[1553]: time="2023-10-02T19:08:19.822474168Z" level=info msg="CreateContainer within sandbox \"c7063b6a7303d3a4e617d9203a12323e9f687cd215f3711cbffe7fc02cb6693f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4499e08ec3094de729b9d305acbdecd405951d0ff25e318fed0029e51cd1ace5\"" Oct 2 19:08:19.824670 env[1553]: time="2023-10-02T19:08:19.824631823Z" level=info msg="StartContainer for \"4499e08ec3094de729b9d305acbdecd405951d0ff25e318fed0029e51cd1ace5\"" Oct 2 19:08:19.845554 systemd[1]: Started cri-containerd-2f5388af0eba3b7947bb51c971162140efaefa4e6c6b90e9b15cc329140257cb.scope. Oct 2 19:08:19.866456 systemd[1]: Started cri-containerd-4499e08ec3094de729b9d305acbdecd405951d0ff25e318fed0029e51cd1ace5.scope. Oct 2 19:08:19.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.885000 audit: BPF prog-id=116 op=LOAD Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2837 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:19.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353338386166306562613362373934376262353163393731313632 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2837 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:19.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353338386166306562613362373934376262353163393731313632 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit: BPF prog-id=117 op=LOAD Oct 2 19:08:19.886000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024700 items=0 ppid=2837 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:19.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353338386166306562613362373934376262353163393731313632 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit: BPF prog-id=118 op=LOAD Oct 2 19:08:19.886000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024748 items=0 ppid=2837 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:19.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353338386166306562613362373934376262353163393731313632 Oct 2 19:08:19.886000 audit: BPF prog-id=118 op=UNLOAD Oct 2 19:08:19.886000 audit: BPF prog-id=117 op=UNLOAD Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.886000 audit: BPF prog-id=119 op=LOAD Oct 2 19:08:19.886000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000024b58 items=0 ppid=2837 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:19.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266353338386166306562613362373934376262353163393731313632 Oct 2 19:08:19.921000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.921000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2794 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:19.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434393965303865633330393464653732396239643330356163626465 Oct 2 19:08:19.921000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.921000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.921000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.921000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.921000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.921000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.921000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.921000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.921000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.921000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.921000 audit: BPF prog-id=120 op=LOAD Oct 2 19:08:19.921000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00032bbf0 items=0 ppid=2794 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:19.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434393965303865633330393464653732396239643330356163626465 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit: BPF prog-id=121 op=LOAD Oct 2 19:08:19.923000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00032bc38 items=0 ppid=2794 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:19.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434393965303865633330393464653732396239643330356163626465 Oct 2 19:08:19.923000 audit: BPF prog-id=121 op=UNLOAD Oct 2 19:08:19.923000 audit: BPF prog-id=120 op=UNLOAD Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:19.923000 audit: BPF prog-id=122 op=LOAD Oct 2 19:08:19.923000 audit[2861]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00032bcc8 items=0 ppid=2794 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:19.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434393965303865633330393464653732396239643330356163626465 Oct 2 19:08:19.963034 env[1553]: time="2023-10-02T19:08:19.962988916Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-54b47459dd-n84z5,Uid:73a63d3c-ddaf-4c09-bb9f-5961a409b759,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"2f5388af0eba3b7947bb51c971162140efaefa4e6c6b90e9b15cc329140257cb\"" Oct 2 19:08:19.963906 env[1553]: time="2023-10-02T19:08:19.963869554Z" level=info msg="StartContainer for \"4499e08ec3094de729b9d305acbdecd405951d0ff25e318fed0029e51cd1ace5\" returns successfully" Oct 2 19:08:19.967198 env[1553]: time="2023-10-02T19:08:19.967168245Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:08:20.407000 audit[2926]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.407000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd55d14180 a2=0 a3=7ffd55d1416c items=0 ppid=2882 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.407000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:08:20.409000 audit[2927]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_chain pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.409000 audit[2927]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca61a0060 a2=0 a3=7ffca61a004c items=0 ppid=2882 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:08:20.411000 audit[2928]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_chain pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.411000 audit[2928]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0fc94a00 a2=0 a3=7ffe0fc949ec items=0 ppid=2882 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:08:20.413000 audit[2929]: NETFILTER_CFG table=mangle:62 family=10 entries=1 op=nft_register_chain pid=2929 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.413000 audit[2929]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd9d69de0 a2=0 a3=7fffd9d69dcc items=0 ppid=2882 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.413000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:08:20.415000 audit[2930]: NETFILTER_CFG table=nat:63 family=10 entries=1 op=nft_register_chain pid=2930 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.415000 audit[2930]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0a682b30 a2=0 a3=7ffd0a682b1c items=0 ppid=2882 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:08:20.416000 audit[2931]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=2931 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.416000 audit[2931]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5d01ce00 a2=0 a3=7ffe5d01cdec items=0 ppid=2882 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.416000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:08:20.523000 audit[2932]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=2932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.523000 audit[2932]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd3e6e6380 a2=0 a3=7ffd3e6e636c items=0 ppid=2882 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:08:20.536000 audit[2934]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=2934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.536000 audit[2934]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffee753f950 a2=0 a3=7ffee753f93c items=0 ppid=2882 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.536000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:08:20.541000 audit[2937]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=2937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.541000 audit[2937]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd323302a0 a2=0 a3=7ffd3233028c items=0 ppid=2882 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:08:20.543000 audit[2938]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.543000 audit[2938]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff876780c0 a2=0 a3=7fff876780ac items=0 ppid=2882 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.543000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:08:20.546000 audit[2941]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.546000 audit[2941]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe3a4718a0 a2=0 a3=7ffe3a47188c items=0 ppid=2882 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.546000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:08:20.548000 audit[2942]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=2942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.548000 audit[2942]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf754a420 a2=0 a3=7ffdf754a40c items=0 ppid=2882 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.548000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:08:20.551000 audit[2944]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2944 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.551000 audit[2944]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdcc24cd00 a2=0 a3=7ffdcc24ccec items=0 ppid=2882 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.551000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:08:20.557000 audit[2947]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2947 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.557000 audit[2947]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd11b61390 a2=0 a3=7ffd11b6137c items=0 ppid=2882 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:08:20.559000 audit[2948]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2948 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.559000 audit[2948]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea05afd90 a2=0 a3=7ffea05afd7c items=0 ppid=2882 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.559000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:08:20.562000 audit[2950]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2950 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.562000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeff70f4b0 a2=0 a3=7ffeff70f49c items=0 ppid=2882 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:08:20.564000 audit[2951]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=2951 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.564000 audit[2951]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff44126040 a2=0 a3=7fff4412602c items=0 ppid=2882 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.564000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:08:20.567000 audit[2953]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2953 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.567000 audit[2953]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6d549120 a2=0 a3=7ffe6d54910c items=0 ppid=2882 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:08:20.572000 audit[2956]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2956 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.572000 audit[2956]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2c775f20 a2=0 a3=7ffc2c775f0c items=0 ppid=2882 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:08:20.577000 audit[2959]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.577000 audit[2959]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff5729de80 a2=0 a3=7fff5729de6c items=0 ppid=2882 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:08:20.579000 audit[2960]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.579000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff17715e70 a2=0 a3=7fff17715e5c items=0 ppid=2882 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:08:20.585000 audit[2962]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=2962 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.585000 audit[2962]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffef3d8f390 a2=0 a3=7ffef3d8f37c items=0 ppid=2882 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.585000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:08:20.591000 audit[2965]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:20.591000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdad1193e0 a2=0 a3=7ffdad1193cc items=0 ppid=2882 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:08:20.614000 audit[2969]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:20.614000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fff2a127ba0 a2=0 a3=7fff2a127b8c items=0 ppid=2882 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.614000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:20.623000 audit[2969]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:20.623000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff2a127ba0 a2=0 a3=7fff2a127b8c items=0 ppid=2882 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:20.625000 audit[2973]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.625000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe68c685f0 a2=0 a3=7ffe68c685dc items=0 ppid=2882 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.625000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:08:20.628000 audit[2975]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=2975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.628000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcae1dbad0 a2=0 a3=7ffcae1dbabc items=0 ppid=2882 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.628000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:08:20.633000 audit[2978]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=2978 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.633000 audit[2978]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe5e6baa80 a2=0 a3=7ffe5e6baa6c items=0 ppid=2882 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.633000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:08:20.635000 audit[2979]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2979 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.635000 audit[2979]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa5816ae0 a2=0 a3=7fffa5816acc items=0 ppid=2882 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:08:20.639000 audit[2981]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2981 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.639000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff1aa139a0 a2=0 a3=7fff1aa1398c items=0 ppid=2882 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.639000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:08:20.641000 audit[2982]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=2982 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.641000 audit[2982]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcdebf540 a2=0 a3=7ffdcdebf52c items=0 ppid=2882 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:08:20.645000 audit[2984]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.645000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff14771350 a2=0 a3=7fff1477133c items=0 ppid=2882 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.645000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:08:20.648000 audit[2987]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=2987 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.648000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffde25c930 a2=0 a3=7fffde25c91c items=0 ppid=2882 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:08:20.650000 audit[2988]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.650000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdc9c8240 a2=0 a3=7ffcdc9c822c items=0 ppid=2882 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:08:20.652000 audit[2990]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=2990 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.652000 audit[2990]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff003ccca0 a2=0 a3=7fff003ccc8c items=0 ppid=2882 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.652000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:08:20.654000 audit[2991]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=2991 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.654000 audit[2991]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7f00c380 a2=0 a3=7ffe7f00c36c items=0 ppid=2882 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:08:20.663000 audit[2993]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=2993 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.663000 audit[2993]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9de68ad0 a2=0 a3=7fff9de68abc items=0 ppid=2882 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.663000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:08:20.671000 audit[2996]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=2996 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.671000 audit[2996]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff82360f00 a2=0 a3=7fff82360eec items=0 ppid=2882 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.671000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:08:20.677000 audit[2999]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=2999 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.677000 audit[2999]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff77aa4ad0 a2=0 a3=7fff77aa4abc items=0 ppid=2882 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:08:20.680000 audit[3000]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=3000 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.680000 audit[3000]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcaf11a010 a2=0 a3=7ffcaf119ffc items=0 ppid=2882 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:08:20.683000 audit[3002]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=3002 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.683000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff06b3a5a0 a2=0 a3=7fff06b3a58c items=0 ppid=2882 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:08:20.688000 audit[3005]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=3005 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:20.688000 audit[3005]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd3f5fb9d0 a2=0 a3=7ffd3f5fb9bc items=0 ppid=2882 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.688000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:08:20.696000 audit[3009]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=3009 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:08:20.696000 audit[3009]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdc5c26130 a2=0 a3=7ffdc5c2611c items=0 ppid=2882 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.696000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:20.696000 audit[3009]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=3009 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:08:20.696000 audit[3009]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffdc5c26130 a2=0 a3=7ffdc5c2611c items=0 ppid=2882 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.696000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:20.964840 kubelet[2689]: I1002 19:08:20.964364 2689 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-d5nzb" podStartSLOduration=1.9643189749999999 pod.CreationTimestamp="2023-10-02 19:08:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:08:20.963937199 +0000 UTC m=+15.615658097" watchObservedRunningTime="2023-10-02 19:08:20.964318975 +0000 UTC m=+15.616039853" Oct 2 19:08:21.134523 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2364307226.mount: Deactivated successfully. Oct 2 19:08:22.652800 env[1553]: time="2023-10-02T19:08:22.652746197Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:22.656136 env[1553]: time="2023-10-02T19:08:22.656089541Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:22.658976 env[1553]: time="2023-10-02T19:08:22.658936681Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:22.672847 env[1553]: time="2023-10-02T19:08:22.672799857Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:22.680417 env[1553]: time="2023-10-02T19:08:22.680243333Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:08:22.689575 env[1553]: time="2023-10-02T19:08:22.689525014Z" level=info msg="CreateContainer within sandbox \"2f5388af0eba3b7947bb51c971162140efaefa4e6c6b90e9b15cc329140257cb\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:08:22.714310 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2620948766.mount: Deactivated successfully. Oct 2 19:08:22.725378 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount904645540.mount: Deactivated successfully. Oct 2 19:08:22.734967 env[1553]: time="2023-10-02T19:08:22.734901717Z" level=info msg="CreateContainer within sandbox \"2f5388af0eba3b7947bb51c971162140efaefa4e6c6b90e9b15cc329140257cb\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"ccbf11e8168a795f4afeed5ab1d8d879a7489d6b24e0950c560e10f3fa07e860\"" Oct 2 19:08:22.736722 env[1553]: time="2023-10-02T19:08:22.736682391Z" level=info msg="StartContainer for \"ccbf11e8168a795f4afeed5ab1d8d879a7489d6b24e0950c560e10f3fa07e860\"" Oct 2 19:08:22.783167 systemd[1]: Started cri-containerd-ccbf11e8168a795f4afeed5ab1d8d879a7489d6b24e0950c560e10f3fa07e860.scope. Oct 2 19:08:22.815848 kernel: kauditd_printk_skb: 282 callbacks suppressed Oct 2 19:08:22.816023 kernel: audit: type=1400 audit(1696273702.803:1090): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.816072 kernel: audit: type=1400 audit(1696273702.803:1091): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.827921 kernel: audit: type=1400 audit(1696273702.803:1092): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.828291 kernel: audit: type=1400 audit(1696273702.803:1093): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.834804 kernel: audit: type=1400 audit(1696273702.803:1094): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.834940 kernel: audit: type=1400 audit(1696273702.803:1095): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.845830 kernel: audit: type=1400 audit(1696273702.803:1096): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.846021 kernel: audit: type=1400 audit(1696273702.803:1097): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.860254 kernel: audit: type=1400 audit(1696273702.803:1098): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.814000 audit: BPF prog-id=123 op=LOAD Oct 2 19:08:22.815000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.815000 audit[3018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2837 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.869327 kernel: audit: type=1400 audit(1696273702.814:1099): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363626631316538313638613739356634616665656435616231643864 Oct 2 19:08:22.815000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.815000 audit[3018]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2837 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363626631316538313638613739356634616665656435616231643864 Oct 2 19:08:22.815000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.815000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.815000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.815000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.815000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.815000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.815000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.815000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.815000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.815000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.815000 audit: BPF prog-id=124 op=LOAD Oct 2 19:08:22.815000 audit[3018]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00027e310 items=0 ppid=2837 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363626631316538313638613739356634616665656435616231643864 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit: BPF prog-id=125 op=LOAD Oct 2 19:08:22.822000 audit[3018]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00027e358 items=0 ppid=2837 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363626631316538313638613739356634616665656435616231643864 Oct 2 19:08:22.822000 audit: BPF prog-id=125 op=UNLOAD Oct 2 19:08:22.822000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:22.822000 audit: BPF prog-id=126 op=LOAD Oct 2 19:08:22.822000 audit[3018]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00027e768 items=0 ppid=2837 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363626631316538313638613739356634616665656435616231643864 Oct 2 19:08:22.887296 env[1553]: time="2023-10-02T19:08:22.884720433Z" level=info msg="StartContainer for \"ccbf11e8168a795f4afeed5ab1d8d879a7489d6b24e0950c560e10f3fa07e860\" returns successfully" Oct 2 19:08:22.976254 kubelet[2689]: I1002 19:08:22.976055 2689 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-54b47459dd-n84z5" podStartSLOduration=-9.223372032878773e+09 pod.CreationTimestamp="2023-10-02 19:08:19 +0000 UTC" firstStartedPulling="2023-10-02 19:08:19.966647226 +0000 UTC m=+14.618368083" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:08:22.975591465 +0000 UTC m=+17.627312340" watchObservedRunningTime="2023-10-02 19:08:22.976003746 +0000 UTC m=+17.627724617" Oct 2 19:08:25.280000 audit[3073]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3073 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:25.280000 audit[3073]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffcc8c48890 a2=0 a3=7ffcc8c4887c items=0 ppid=2882 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.280000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:25.281000 audit[3073]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=3073 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:25.281000 audit[3073]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffcc8c48890 a2=0 a3=7ffcc8c4887c items=0 ppid=2882 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.281000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:25.323000 audit[3099]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:25.323000 audit[3099]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffc385f89e0 a2=0 a3=7ffc385f89cc items=0 ppid=2882 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:25.324000 audit[3099]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:25.324000 audit[3099]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffc385f89e0 a2=0 a3=7ffc385f89cc items=0 ppid=2882 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.324000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:25.477882 kubelet[2689]: I1002 19:08:25.477850 2689 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:08:25.487759 systemd[1]: Created slice kubepods-besteffort-pod7bec13ca_0e61_4334_9ddf_266e67e0b126.slice. Oct 2 19:08:25.565499 kubelet[2689]: I1002 19:08:25.565462 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7bec13ca-0e61-4334-9ddf-266e67e0b126-tigera-ca-bundle\") pod \"calico-typha-5c4fdf5cd7-c4fms\" (UID: \"7bec13ca-0e61-4334-9ddf-266e67e0b126\") " pod="calico-system/calico-typha-5c4fdf5cd7-c4fms" Oct 2 19:08:25.565668 kubelet[2689]: I1002 19:08:25.565530 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/7bec13ca-0e61-4334-9ddf-266e67e0b126-typha-certs\") pod \"calico-typha-5c4fdf5cd7-c4fms\" (UID: \"7bec13ca-0e61-4334-9ddf-266e67e0b126\") " pod="calico-system/calico-typha-5c4fdf5cd7-c4fms" Oct 2 19:08:25.565668 kubelet[2689]: I1002 19:08:25.565568 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8sfm8\" (UniqueName: \"kubernetes.io/projected/7bec13ca-0e61-4334-9ddf-266e67e0b126-kube-api-access-8sfm8\") pod \"calico-typha-5c4fdf5cd7-c4fms\" (UID: \"7bec13ca-0e61-4334-9ddf-266e67e0b126\") " pod="calico-system/calico-typha-5c4fdf5cd7-c4fms" Oct 2 19:08:25.607185 kubelet[2689]: I1002 19:08:25.607118 2689 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:08:25.615404 systemd[1]: Created slice kubepods-besteffort-pod2b4adf44_88dd_4510_bbf0_cc1c209afb7c.slice. Oct 2 19:08:25.666744 kubelet[2689]: I1002 19:08:25.666708 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2b4adf44-88dd-4510-bbf0-cc1c209afb7c-var-run-calico\") pod \"calico-node-xfg26\" (UID: \"2b4adf44-88dd-4510-bbf0-cc1c209afb7c\") " pod="calico-system/calico-node-xfg26" Oct 2 19:08:25.666943 kubelet[2689]: I1002 19:08:25.666772 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2b4adf44-88dd-4510-bbf0-cc1c209afb7c-xtables-lock\") pod \"calico-node-xfg26\" (UID: \"2b4adf44-88dd-4510-bbf0-cc1c209afb7c\") " pod="calico-system/calico-node-xfg26" Oct 2 19:08:25.666943 kubelet[2689]: I1002 19:08:25.666804 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2b4adf44-88dd-4510-bbf0-cc1c209afb7c-var-lib-calico\") pod \"calico-node-xfg26\" (UID: \"2b4adf44-88dd-4510-bbf0-cc1c209afb7c\") " pod="calico-system/calico-node-xfg26" Oct 2 19:08:25.666943 kubelet[2689]: I1002 19:08:25.666829 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2b4adf44-88dd-4510-bbf0-cc1c209afb7c-cni-bin-dir\") pod \"calico-node-xfg26\" (UID: \"2b4adf44-88dd-4510-bbf0-cc1c209afb7c\") " pod="calico-system/calico-node-xfg26" Oct 2 19:08:25.666943 kubelet[2689]: I1002 19:08:25.666855 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2b4adf44-88dd-4510-bbf0-cc1c209afb7c-cni-net-dir\") pod \"calico-node-xfg26\" (UID: \"2b4adf44-88dd-4510-bbf0-cc1c209afb7c\") " pod="calico-system/calico-node-xfg26" Oct 2 19:08:25.666943 kubelet[2689]: I1002 19:08:25.666886 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pfx9f\" (UniqueName: \"kubernetes.io/projected/2b4adf44-88dd-4510-bbf0-cc1c209afb7c-kube-api-access-pfx9f\") pod \"calico-node-xfg26\" (UID: \"2b4adf44-88dd-4510-bbf0-cc1c209afb7c\") " pod="calico-system/calico-node-xfg26" Oct 2 19:08:25.667181 kubelet[2689]: I1002 19:08:25.666916 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2b4adf44-88dd-4510-bbf0-cc1c209afb7c-flexvol-driver-host\") pod \"calico-node-xfg26\" (UID: \"2b4adf44-88dd-4510-bbf0-cc1c209afb7c\") " pod="calico-system/calico-node-xfg26" Oct 2 19:08:25.667181 kubelet[2689]: I1002 19:08:25.666945 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2b4adf44-88dd-4510-bbf0-cc1c209afb7c-lib-modules\") pod \"calico-node-xfg26\" (UID: \"2b4adf44-88dd-4510-bbf0-cc1c209afb7c\") " pod="calico-system/calico-node-xfg26" Oct 2 19:08:25.667181 kubelet[2689]: I1002 19:08:25.666977 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2b4adf44-88dd-4510-bbf0-cc1c209afb7c-cni-log-dir\") pod \"calico-node-xfg26\" (UID: \"2b4adf44-88dd-4510-bbf0-cc1c209afb7c\") " pod="calico-system/calico-node-xfg26" Oct 2 19:08:25.667181 kubelet[2689]: I1002 19:08:25.667052 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2b4adf44-88dd-4510-bbf0-cc1c209afb7c-tigera-ca-bundle\") pod \"calico-node-xfg26\" (UID: \"2b4adf44-88dd-4510-bbf0-cc1c209afb7c\") " pod="calico-system/calico-node-xfg26" Oct 2 19:08:25.667181 kubelet[2689]: I1002 19:08:25.667093 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2b4adf44-88dd-4510-bbf0-cc1c209afb7c-node-certs\") pod \"calico-node-xfg26\" (UID: \"2b4adf44-88dd-4510-bbf0-cc1c209afb7c\") " pod="calico-system/calico-node-xfg26" Oct 2 19:08:25.667518 kubelet[2689]: I1002 19:08:25.667148 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2b4adf44-88dd-4510-bbf0-cc1c209afb7c-policysync\") pod \"calico-node-xfg26\" (UID: \"2b4adf44-88dd-4510-bbf0-cc1c209afb7c\") " pod="calico-system/calico-node-xfg26" Oct 2 19:08:25.769542 kubelet[2689]: E1002 19:08:25.769511 2689 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:25.769542 kubelet[2689]: W1002 19:08:25.769537 2689 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:25.769847 kubelet[2689]: E1002 19:08:25.769561 2689 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:25.769905 kubelet[2689]: E1002 19:08:25.769877 2689 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:25.769905 kubelet[2689]: W1002 19:08:25.769888 2689 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:25.770002 kubelet[2689]: E1002 19:08:25.769906 2689 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:25.770135 kubelet[2689]: E1002 19:08:25.770119 2689 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:25.770196 kubelet[2689]: W1002 19:08:25.770143 2689 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:25.770196 kubelet[2689]: E1002 19:08:25.770160 2689 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:25.770450 kubelet[2689]: E1002 19:08:25.770434 2689 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:25.770450 kubelet[2689]: W1002 19:08:25.770450 2689 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:25.770646 kubelet[2689]: E1002 19:08:25.770466 2689 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:25.770907 kubelet[2689]: E1002 19:08:25.770883 2689 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:25.770907 kubelet[2689]: W1002 19:08:25.770906 2689 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:25.771031 kubelet[2689]: E1002 19:08:25.770927 2689 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:25.771248 kubelet[2689]: E1002 19:08:25.771135 2689 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:25.771373 kubelet[2689]: W1002 19:08:25.771256 2689 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:25.771434 kubelet[2689]: E1002 19:08:25.771415 2689 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:25.771734 kubelet[2689]: E1002 19:08:25.771579 2689 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:25.771734 kubelet[2689]: W1002 19:08:25.771729 2689 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:25.771925 kubelet[2689]: E1002 19:08:25.771899 2689 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:25.774326 kubelet[2689]: E1002 19:08:25.774302 2689 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:25.774326 kubelet[2689]: W1002 19:08:25.774325 2689 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:25.774524 kubelet[2689]: E1002 19:08:25.774453 2689 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:25.774663 kubelet[2689]: E1002 19:08:25.774637 2689 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:25.774663 kubelet[2689]: W1002 19:08:25.774654 2689 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:25.774773 kubelet[2689]: E1002 19:08:25.774745 2689 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:25.774934 kubelet[2689]: E1002 19:08:25.774921 2689 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:25.775010 kubelet[2689]: W1002 19:08:25.774936 2689 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:25.775010 kubelet[2689]: E1002 19:08:25.774955 2689 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:25.775179 kubelet[2689]: E1002 19:08:25.775164 2689 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:25.775284 kubelet[2689]: W1002 19:08:25.775179 2689 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:25.775284 kubelet[2689]: E1002 19:08:25.775199 2689 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:25.775479 kubelet[2689]: E1002 19:08:25.775454 2689 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:25.775479 kubelet[2689]: W1002 19:08:25.775470 2689 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:25.775586 kubelet[2689]: E1002 19:08:25.775490 2689 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:25.777279 kubelet[2689]: E1002 19:08:25.777240 2689 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:25.777279 kubelet[2689]: W1002 19:08:25.777261 2689 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:25.777279 kubelet[2689]: E1002 19:08:25.777281 2689 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:25.796578 kubelet[2689]: E1002 19:08:25.796548 2689 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:25.796578 kubelet[2689]: W1002 19:08:25.796575 2689 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:25.796815 kubelet[2689]: E1002 19:08:25.796608 2689 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:25.807437 env[1553]: time="2023-10-02T19:08:25.806915401Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5c4fdf5cd7-c4fms,Uid:7bec13ca-0e61-4334-9ddf-266e67e0b126,Namespace:calico-system,Attempt:0,}" Oct 2 19:08:25.810775 kubelet[2689]: E1002 19:08:25.810731 2689 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:25.810775 kubelet[2689]: W1002 19:08:25.810774 2689 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:25.810980 kubelet[2689]: E1002 19:08:25.810799 2689 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:25.847831 env[1553]: time="2023-10-02T19:08:25.847666869Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:25.848047 env[1553]: time="2023-10-02T19:08:25.848016622Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:25.848223 env[1553]: time="2023-10-02T19:08:25.848187146Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:25.850719 env[1553]: time="2023-10-02T19:08:25.850667885Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7e2a05d5264b548e034485ce96d515a7aa04101eb23b3f09b717690df4001b12 pid=3126 runtime=io.containerd.runc.v2 Oct 2 19:08:25.896234 systemd[1]: Started cri-containerd-7e2a05d5264b548e034485ce96d515a7aa04101eb23b3f09b717690df4001b12.scope. Oct 2 19:08:25.921229 env[1553]: time="2023-10-02T19:08:25.921168309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xfg26,Uid:2b4adf44-88dd-4510-bbf0-cc1c209afb7c,Namespace:calico-system,Attempt:0,}" Oct 2 19:08:25.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.940000 audit: BPF prog-id=127 op=LOAD Oct 2 19:08:25.942000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.942000 audit[3135]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3126 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765326130356435323634623534386530333434383563653936643531 Oct 2 19:08:25.942000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.942000 audit[3135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3126 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765326130356435323634623534386530333434383563653936643531 Oct 2 19:08:25.942000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.942000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.942000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.942000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.942000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.942000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.942000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.942000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.942000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.942000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.942000 audit: BPF prog-id=128 op=LOAD Oct 2 19:08:25.942000 audit[3135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000284570 items=0 ppid=3126 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765326130356435323634623534386530333434383563653936643531 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit: BPF prog-id=129 op=LOAD Oct 2 19:08:25.943000 audit[3135]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002845b8 items=0 ppid=3126 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765326130356435323634623534386530333434383563653936643531 Oct 2 19:08:25.943000 audit: BPF prog-id=129 op=UNLOAD Oct 2 19:08:25.943000 audit: BPF prog-id=128 op=UNLOAD Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { perfmon } for pid=3135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit[3135]: AVC avc: denied { bpf } for pid=3135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:25.943000 audit: BPF prog-id=130 op=LOAD Oct 2 19:08:25.943000 audit[3135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002849c8 items=0 ppid=3126 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:25.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765326130356435323634623534386530333434383563653936643531 Oct 2 19:08:25.960909 env[1553]: time="2023-10-02T19:08:25.960825074Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:25.961688 env[1553]: time="2023-10-02T19:08:25.961628999Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:25.961845 env[1553]: time="2023-10-02T19:08:25.961822426Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:25.964442 env[1553]: time="2023-10-02T19:08:25.964307351Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/71419571c331596a9f168b2bdc268f3cfa12990af3a246ef8ff7f743ae38fecc pid=3158 runtime=io.containerd.runc.v2 Oct 2 19:08:25.993489 systemd[1]: Started cri-containerd-71419571c331596a9f168b2bdc268f3cfa12990af3a246ef8ff7f743ae38fecc.scope. Oct 2 19:08:26.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.022000 audit: BPF prog-id=131 op=LOAD Oct 2 19:08:26.023000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.023000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3158 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:26.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731343139353731633333313539366139663136386232626463323638 Oct 2 19:08:26.024000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.024000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3158 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:26.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731343139353731633333313539366139663136386232626463323638 Oct 2 19:08:26.025000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.025000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.025000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.025000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.025000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.025000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.025000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.025000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.025000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.025000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.025000 audit: BPF prog-id=132 op=LOAD Oct 2 19:08:26.025000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000acce0 items=0 ppid=3158 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:26.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731343139353731633333313539366139663136386232626463323638 Oct 2 19:08:26.026000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.026000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.026000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.026000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.026000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.026000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.026000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.026000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.026000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.026000 audit: BPF prog-id=133 op=LOAD Oct 2 19:08:26.026000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000acd28 items=0 ppid=3158 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:26.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731343139353731633333313539366139663136386232626463323638 Oct 2 19:08:26.028000 audit: BPF prog-id=133 op=UNLOAD Oct 2 19:08:26.028000 audit: BPF prog-id=132 op=UNLOAD Oct 2 19:08:26.028000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.028000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.028000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.028000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.028000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.028000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.028000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.028000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.028000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.028000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:26.028000 audit: BPF prog-id=134 op=LOAD Oct 2 19:08:26.028000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000ad138 items=0 ppid=3158 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:26.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731343139353731633333313539366139663136386232626463323638 Oct 2 19:08:26.062420 env[1553]: time="2023-10-02T19:08:26.062366730Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xfg26,Uid:2b4adf44-88dd-4510-bbf0-cc1c209afb7c,Namespace:calico-system,Attempt:0,} returns sandbox id \"71419571c331596a9f168b2bdc268f3cfa12990af3a246ef8ff7f743ae38fecc\"" Oct 2 19:08:26.067751 env[1553]: time="2023-10-02T19:08:26.067671880Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:08:26.095402 env[1553]: time="2023-10-02T19:08:26.095354127Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5c4fdf5cd7-c4fms,Uid:7bec13ca-0e61-4334-9ddf-266e67e0b126,Namespace:calico-system,Attempt:0,} returns sandbox id \"7e2a05d5264b548e034485ce96d515a7aa04101eb23b3f09b717690df4001b12\"" Oct 2 19:08:26.434000 audit[3229]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=3229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:26.434000 audit[3229]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffdff6b4580 a2=0 a3=7ffdff6b456c items=0 ppid=2882 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:26.434000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:26.435000 audit[3229]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=3229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:26.435000 audit[3229]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffdff6b4580 a2=0 a3=7ffdff6b456c items=0 ppid=2882 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:26.435000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:27.368272 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3903295807.mount: Deactivated successfully. Oct 2 19:08:28.733640 env[1553]: time="2023-10-02T19:08:28.733589402Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:28.737281 env[1553]: time="2023-10-02T19:08:28.737236269Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:28.740739 env[1553]: time="2023-10-02T19:08:28.740693681Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:28.743820 env[1553]: time="2023-10-02T19:08:28.743757161Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:28.745059 env[1553]: time="2023-10-02T19:08:28.745017981Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:08:28.747422 env[1553]: time="2023-10-02T19:08:28.746958845Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 19:08:28.750136 env[1553]: time="2023-10-02T19:08:28.750100465Z" level=info msg="CreateContainer within sandbox \"71419571c331596a9f168b2bdc268f3cfa12990af3a246ef8ff7f743ae38fecc\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:08:28.790548 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3945332432.mount: Deactivated successfully. Oct 2 19:08:28.806979 env[1553]: time="2023-10-02T19:08:28.806917373Z" level=info msg="CreateContainer within sandbox \"71419571c331596a9f168b2bdc268f3cfa12990af3a246ef8ff7f743ae38fecc\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"139e9af260c57dd1d4c625738462293ceec9e6266ad2e52475bb4df8bea3256e\"" Oct 2 19:08:28.811049 env[1553]: time="2023-10-02T19:08:28.808144638Z" level=info msg="StartContainer for \"139e9af260c57dd1d4c625738462293ceec9e6266ad2e52475bb4df8bea3256e\"" Oct 2 19:08:28.852819 systemd[1]: Started cri-containerd-139e9af260c57dd1d4c625738462293ceec9e6266ad2e52475bb4df8bea3256e.scope. Oct 2 19:08:28.891000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.899761 kernel: kauditd_printk_skb: 179 callbacks suppressed Oct 2 19:08:28.899910 kernel: audit: type=1400 audit(1696273708.891:1150): avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.907594 kernel: audit: type=1300 audit(1696273708.891:1150): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3158 pid=3238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:28.891000 audit[3238]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3158 pid=3238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:28.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133396539616632363063353764643164346336323537333834363232 Oct 2 19:08:28.918342 kernel: audit: type=1327 audit(1696273708.891:1150): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133396539616632363063353764643164346336323537333834363232 Oct 2 19:08:28.891000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.927453 kernel: audit: type=1400 audit(1696273708.891:1151): avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.891000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.891000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.939151 kernel: audit: type=1400 audit(1696273708.891:1151): avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.939295 kernel: audit: type=1400 audit(1696273708.891:1151): avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.891000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.946402 kernel: audit: type=1400 audit(1696273708.891:1151): avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.953435 kernel: audit: type=1400 audit(1696273708.891:1151): avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.891000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.891000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.956378 env[1553]: time="2023-10-02T19:08:28.955988572Z" level=info msg="StartContainer for \"139e9af260c57dd1d4c625738462293ceec9e6266ad2e52475bb4df8bea3256e\" returns successfully" Oct 2 19:08:28.961244 kernel: audit: type=1400 audit(1696273708.891:1151): avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.891000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.891000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.891000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.891000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.891000 audit: BPF prog-id=135 op=LOAD Oct 2 19:08:28.891000 audit[3238]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003007b0 items=0 ppid=3158 pid=3238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:28.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133396539616632363063353764643164346336323537333834363232 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit: BPF prog-id=136 op=LOAD Oct 2 19:08:28.898000 audit[3238]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003007f8 items=0 ppid=3158 pid=3238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:28.969276 kernel: audit: type=1400 audit(1696273708.891:1151): avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133396539616632363063353764643164346336323537333834363232 Oct 2 19:08:28.898000 audit: BPF prog-id=136 op=UNLOAD Oct 2 19:08:28.898000 audit: BPF prog-id=135 op=UNLOAD Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { perfmon } for pid=3238 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:28.898000 audit: BPF prog-id=137 op=LOAD Oct 2 19:08:28.898000 audit[3238]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000300888 items=0 ppid=3158 pid=3238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:28.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133396539616632363063353764643164346336323537333834363232 Oct 2 19:08:28.974748 systemd[1]: cri-containerd-139e9af260c57dd1d4c625738462293ceec9e6266ad2e52475bb4df8bea3256e.scope: Deactivated successfully. Oct 2 19:08:28.977000 audit: BPF prog-id=137 op=UNLOAD Oct 2 19:08:29.112843 env[1553]: time="2023-10-02T19:08:29.112793913Z" level=info msg="shim disconnected" id=139e9af260c57dd1d4c625738462293ceec9e6266ad2e52475bb4df8bea3256e Oct 2 19:08:29.113667 env[1553]: time="2023-10-02T19:08:29.113634506Z" level=warning msg="cleaning up after shim disconnected" id=139e9af260c57dd1d4c625738462293ceec9e6266ad2e52475bb4df8bea3256e namespace=k8s.io Oct 2 19:08:29.113809 env[1553]: time="2023-10-02T19:08:29.113793483Z" level=info msg="cleaning up dead shim" Oct 2 19:08:29.130575 env[1553]: time="2023-10-02T19:08:29.130527946Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:08:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3285 runtime=io.containerd.runc.v2\n" Oct 2 19:08:29.785152 systemd[1]: run-containerd-runc-k8s.io-139e9af260c57dd1d4c625738462293ceec9e6266ad2e52475bb4df8bea3256e-runc.cKd4Rz.mount: Deactivated successfully. Oct 2 19:08:29.785366 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-139e9af260c57dd1d4c625738462293ceec9e6266ad2e52475bb4df8bea3256e-rootfs.mount: Deactivated successfully. Oct 2 19:08:29.997208 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4274097702.mount: Deactivated successfully. Oct 2 19:08:31.719746 env[1553]: time="2023-10-02T19:08:31.719675081Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:31.723891 env[1553]: time="2023-10-02T19:08:31.723845344Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:31.727379 env[1553]: time="2023-10-02T19:08:31.727337527Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:31.731353 env[1553]: time="2023-10-02T19:08:31.731309675Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:31.733509 env[1553]: time="2023-10-02T19:08:31.733408331Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\"" Oct 2 19:08:31.740246 env[1553]: time="2023-10-02T19:08:31.739120416Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:08:31.741168 env[1553]: time="2023-10-02T19:08:31.741008110Z" level=info msg="CreateContainer within sandbox \"7e2a05d5264b548e034485ce96d515a7aa04101eb23b3f09b717690df4001b12\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 19:08:31.759993 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount890107593.mount: Deactivated successfully. Oct 2 19:08:31.777513 env[1553]: time="2023-10-02T19:08:31.777462496Z" level=info msg="CreateContainer within sandbox \"7e2a05d5264b548e034485ce96d515a7aa04101eb23b3f09b717690df4001b12\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"fdc8b8d7fb12ce157597784c94dcf9ed7181b5e2248657e0ea2cdd66b6e63360\"" Oct 2 19:08:31.781585 env[1553]: time="2023-10-02T19:08:31.780264044Z" level=info msg="StartContainer for \"fdc8b8d7fb12ce157597784c94dcf9ed7181b5e2248657e0ea2cdd66b6e63360\"" Oct 2 19:08:31.814686 systemd[1]: Started cri-containerd-fdc8b8d7fb12ce157597784c94dcf9ed7181b5e2248657e0ea2cdd66b6e63360.scope. Oct 2 19:08:31.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.839000 audit: BPF prog-id=138 op=LOAD Oct 2 19:08:31.839000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.839000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3126 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:31.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664633862386437666231326365313537353937373834633934646366 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3126 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:31.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664633862386437666231326365313537353937373834633934646366 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit: BPF prog-id=139 op=LOAD Oct 2 19:08:31.840000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000392290 items=0 ppid=3126 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:31.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664633862386437666231326365313537353937373834633934646366 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit: BPF prog-id=140 op=LOAD Oct 2 19:08:31.840000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003922d8 items=0 ppid=3126 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:31.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664633862386437666231326365313537353937373834633934646366 Oct 2 19:08:31.840000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:08:31.840000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.840000 audit: BPF prog-id=141 op=LOAD Oct 2 19:08:31.840000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003926e8 items=0 ppid=3126 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:31.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664633862386437666231326365313537353937373834633934646366 Oct 2 19:08:31.882144 env[1553]: time="2023-10-02T19:08:31.882058709Z" level=info msg="StartContainer for \"fdc8b8d7fb12ce157597784c94dcf9ed7181b5e2248657e0ea2cdd66b6e63360\" returns successfully" Oct 2 19:08:32.047031 kubelet[2689]: I1002 19:08:32.046834 2689 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5c4fdf5cd7-c4fms" podStartSLOduration=-9.223372029807985e+09 pod.CreationTimestamp="2023-10-02 19:08:25 +0000 UTC" firstStartedPulling="2023-10-02 19:08:26.096889279 +0000 UTC m=+20.748610136" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:08:32.046302523 +0000 UTC m=+26.698023398" watchObservedRunningTime="2023-10-02 19:08:32.046791271 +0000 UTC m=+26.698512145" Oct 2 19:08:32.146000 audit[3363]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=3363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:32.146000 audit[3363]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffd94527d20 a2=0 a3=7ffd94527d0c items=0 ppid=2882 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:32.146000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:32.148000 audit[3363]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=3363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:32.148000 audit[3363]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffd94527d20 a2=0 a3=7ffd94527d0c items=0 ppid=2882 pid=3363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:32.148000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:32.755463 systemd[1]: run-containerd-runc-k8s.io-fdc8b8d7fb12ce157597784c94dcf9ed7181b5e2248657e0ea2cdd66b6e63360-runc.RpYc6X.mount: Deactivated successfully. Oct 2 19:08:33.068741 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount777301933.mount: Deactivated successfully. Oct 2 19:08:37.531301 env[1553]: time="2023-10-02T19:08:37.531246809Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:37.535287 env[1553]: time="2023-10-02T19:08:37.535245745Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:37.548157 env[1553]: time="2023-10-02T19:08:37.548110476Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:37.549506 env[1553]: time="2023-10-02T19:08:37.549463139Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:37.551592 env[1553]: time="2023-10-02T19:08:37.551550806Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:08:37.558144 env[1553]: time="2023-10-02T19:08:37.558052768Z" level=info msg="CreateContainer within sandbox \"71419571c331596a9f168b2bdc268f3cfa12990af3a246ef8ff7f743ae38fecc\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:08:37.576771 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2112322221.mount: Deactivated successfully. Oct 2 19:08:37.590806 env[1553]: time="2023-10-02T19:08:37.590751993Z" level=info msg="CreateContainer within sandbox \"71419571c331596a9f168b2bdc268f3cfa12990af3a246ef8ff7f743ae38fecc\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7a02929f8e3eefac1fba4781fbcbd5db585a0f4efa57c58acecd270b936f49fb\"" Oct 2 19:08:37.591724 env[1553]: time="2023-10-02T19:08:37.591687432Z" level=info msg="StartContainer for \"7a02929f8e3eefac1fba4781fbcbd5db585a0f4efa57c58acecd270b936f49fb\"" Oct 2 19:08:37.624707 systemd[1]: Started cri-containerd-7a02929f8e3eefac1fba4781fbcbd5db585a0f4efa57c58acecd270b936f49fb.scope. Oct 2 19:08:37.667517 kernel: kauditd_printk_skb: 97 callbacks suppressed Oct 2 19:08:37.667820 kernel: audit: type=1400 audit(1696273717.650:1177): avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.667895 kernel: audit: type=1300 audit(1696273717.650:1177): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3158 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:37.650000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.650000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3158 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:37.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761303239323966386533656566616331666261343738316662636264 Oct 2 19:08:37.678321 kernel: audit: type=1327 audit(1696273717.650:1177): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761303239323966386533656566616331666261343738316662636264 Oct 2 19:08:37.650000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.684653 kernel: audit: type=1400 audit(1696273717.650:1178): avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.684789 kernel: audit: type=1400 audit(1696273717.650:1178): avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.650000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.650000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.650000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.703362 kernel: audit: type=1400 audit(1696273717.650:1178): avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.703493 kernel: audit: type=1400 audit(1696273717.650:1178): avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.703533 kernel: audit: type=1400 audit(1696273717.650:1178): avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.650000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.650000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.723235 kernel: audit: type=1400 audit(1696273717.650:1178): avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.724642 env[1553]: time="2023-10-02T19:08:37.724592418Z" level=info msg="StartContainer for \"7a02929f8e3eefac1fba4781fbcbd5db585a0f4efa57c58acecd270b936f49fb\" returns successfully" Oct 2 19:08:37.650000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.736235 kernel: audit: type=1400 audit(1696273717.650:1178): avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.650000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.650000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.650000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.650000 audit: BPF prog-id=142 op=LOAD Oct 2 19:08:37.650000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002961f0 items=0 ppid=3158 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:37.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761303239323966386533656566616331666261343738316662636264 Oct 2 19:08:37.656000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.656000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.656000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.656000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.656000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.656000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.656000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.656000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.656000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.656000 audit: BPF prog-id=143 op=LOAD Oct 2 19:08:37.656000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000296238 items=0 ppid=3158 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:37.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761303239323966386533656566616331666261343738316662636264 Oct 2 19:08:37.666000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:08:37.666000 audit: BPF prog-id=142 op=UNLOAD Oct 2 19:08:37.666000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.666000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.666000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.666000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.666000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.666000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.666000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.666000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.666000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.666000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:37.666000 audit: BPF prog-id=144 op=LOAD Oct 2 19:08:37.666000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002962c8 items=0 ppid=3158 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:37.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761303239323966386533656566616331666261343738316662636264 Oct 2 19:08:38.801094 env[1553]: time="2023-10-02T19:08:38.800956414Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:08:38.804397 systemd[1]: cri-containerd-7a02929f8e3eefac1fba4781fbcbd5db585a0f4efa57c58acecd270b936f49fb.scope: Deactivated successfully. Oct 2 19:08:38.808000 audit: BPF prog-id=144 op=UNLOAD Oct 2 19:08:38.832023 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7a02929f8e3eefac1fba4781fbcbd5db585a0f4efa57c58acecd270b936f49fb-rootfs.mount: Deactivated successfully. Oct 2 19:08:38.892892 kubelet[2689]: I1002 19:08:38.892693 2689 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:08:38.947897 env[1553]: time="2023-10-02T19:08:38.947844626Z" level=info msg="shim disconnected" id=7a02929f8e3eefac1fba4781fbcbd5db585a0f4efa57c58acecd270b936f49fb Oct 2 19:08:38.948331 env[1553]: time="2023-10-02T19:08:38.947901758Z" level=warning msg="cleaning up after shim disconnected" id=7a02929f8e3eefac1fba4781fbcbd5db585a0f4efa57c58acecd270b936f49fb namespace=k8s.io Oct 2 19:08:38.948331 env[1553]: time="2023-10-02T19:08:38.947915051Z" level=info msg="cleaning up dead shim" Oct 2 19:08:38.970716 kubelet[2689]: I1002 19:08:38.970682 2689 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:08:38.971009 kubelet[2689]: I1002 19:08:38.970915 2689 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:08:38.971519 kubelet[2689]: I1002 19:08:38.971267 2689 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:08:38.988055 systemd[1]: Created slice kubepods-besteffort-pod8ad2c188_b599_42c8_80c6_aa9e317ad7cd.slice. Oct 2 19:08:38.990040 kubelet[2689]: I1002 19:08:38.990002 2689 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:08:39.002348 systemd[1]: Created slice kubepods-burstable-pod5dbac382_d9ca_4eaf_b680_9fe23b274acd.slice. Oct 2 19:08:39.019256 systemd[1]: Created slice kubepods-burstable-pod45f7a44b_baf9_4662_ae23_0d419c416bf2.slice. Oct 2 19:08:39.021679 env[1553]: time="2023-10-02T19:08:39.021631784Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:08:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3419 runtime=io.containerd.runc.v2\n" Oct 2 19:08:39.035030 systemd[1]: Created slice kubepods-besteffort-pode4104074_c237_4645_96b6_bc09192177f7.slice. Oct 2 19:08:39.071331 env[1553]: time="2023-10-02T19:08:39.071032290Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:08:39.123185 kubelet[2689]: I1002 19:08:39.123147 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jb9c9\" (UniqueName: \"kubernetes.io/projected/8ad2c188-b599-42c8-80c6-aa9e317ad7cd-kube-api-access-jb9c9\") pod \"calico-kube-controllers-69c848ddc6-fwbr7\" (UID: \"8ad2c188-b599-42c8-80c6-aa9e317ad7cd\") " pod="calico-system/calico-kube-controllers-69c848ddc6-fwbr7" Oct 2 19:08:39.123185 kubelet[2689]: I1002 19:08:39.123218 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k2zxb\" (UniqueName: \"kubernetes.io/projected/5dbac382-d9ca-4eaf-b680-9fe23b274acd-kube-api-access-k2zxb\") pod \"coredns-787d4945fb-5zzv5\" (UID: \"5dbac382-d9ca-4eaf-b680-9fe23b274acd\") " pod="kube-system/coredns-787d4945fb-5zzv5" Oct 2 19:08:39.123513 kubelet[2689]: I1002 19:08:39.123300 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cstgp\" (UniqueName: \"kubernetes.io/projected/45f7a44b-baf9-4662-ae23-0d419c416bf2-kube-api-access-cstgp\") pod \"coredns-787d4945fb-fhxq5\" (UID: \"45f7a44b-baf9-4662-ae23-0d419c416bf2\") " pod="kube-system/coredns-787d4945fb-fhxq5" Oct 2 19:08:39.123513 kubelet[2689]: I1002 19:08:39.123340 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e4104074-c237-4645-96b6-bc09192177f7-socket-dir\") pod \"csi-node-driver-nnw9l\" (UID: \"e4104074-c237-4645-96b6-bc09192177f7\") " pod="calico-system/csi-node-driver-nnw9l" Oct 2 19:08:39.123513 kubelet[2689]: I1002 19:08:39.123369 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/5dbac382-d9ca-4eaf-b680-9fe23b274acd-config-volume\") pod \"coredns-787d4945fb-5zzv5\" (UID: \"5dbac382-d9ca-4eaf-b680-9fe23b274acd\") " pod="kube-system/coredns-787d4945fb-5zzv5" Oct 2 19:08:39.123513 kubelet[2689]: I1002 19:08:39.123398 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/e4104074-c237-4645-96b6-bc09192177f7-etccalico\") pod \"csi-node-driver-nnw9l\" (UID: \"e4104074-c237-4645-96b6-bc09192177f7\") " pod="calico-system/csi-node-driver-nnw9l" Oct 2 19:08:39.123513 kubelet[2689]: I1002 19:08:39.123436 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e4104074-c237-4645-96b6-bc09192177f7-registration-dir\") pod \"csi-node-driver-nnw9l\" (UID: \"e4104074-c237-4645-96b6-bc09192177f7\") " pod="calico-system/csi-node-driver-nnw9l" Oct 2 19:08:39.123848 kubelet[2689]: I1002 19:08:39.123468 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fv2lg\" (UniqueName: \"kubernetes.io/projected/e4104074-c237-4645-96b6-bc09192177f7-kube-api-access-fv2lg\") pod \"csi-node-driver-nnw9l\" (UID: \"e4104074-c237-4645-96b6-bc09192177f7\") " pod="calico-system/csi-node-driver-nnw9l" Oct 2 19:08:39.123848 kubelet[2689]: I1002 19:08:39.123504 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e4104074-c237-4645-96b6-bc09192177f7-varrun\") pod \"csi-node-driver-nnw9l\" (UID: \"e4104074-c237-4645-96b6-bc09192177f7\") " pod="calico-system/csi-node-driver-nnw9l" Oct 2 19:08:39.123848 kubelet[2689]: I1002 19:08:39.123534 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e4104074-c237-4645-96b6-bc09192177f7-kubelet-dir\") pod \"csi-node-driver-nnw9l\" (UID: \"e4104074-c237-4645-96b6-bc09192177f7\") " pod="calico-system/csi-node-driver-nnw9l" Oct 2 19:08:39.123848 kubelet[2689]: I1002 19:08:39.123577 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/45f7a44b-baf9-4662-ae23-0d419c416bf2-config-volume\") pod \"coredns-787d4945fb-fhxq5\" (UID: \"45f7a44b-baf9-4662-ae23-0d419c416bf2\") " pod="kube-system/coredns-787d4945fb-fhxq5" Oct 2 19:08:39.597043 env[1553]: time="2023-10-02T19:08:39.596930946Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-fwbr7,Uid:8ad2c188-b599-42c8-80c6-aa9e317ad7cd,Namespace:calico-system,Attempt:0,}" Oct 2 19:08:39.641337 env[1553]: time="2023-10-02T19:08:39.641194761Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nnw9l,Uid:e4104074-c237-4645-96b6-bc09192177f7,Namespace:calico-system,Attempt:0,}" Oct 2 19:08:39.761441 env[1553]: time="2023-10-02T19:08:39.761365507Z" level=error msg="Failed to destroy network for sandbox \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:39.763668 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003-shm.mount: Deactivated successfully. Oct 2 19:08:39.764827 env[1553]: time="2023-10-02T19:08:39.764758168Z" level=error msg="encountered an error cleaning up failed sandbox \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:39.765056 env[1553]: time="2023-10-02T19:08:39.764853988Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-fwbr7,Uid:8ad2c188-b599-42c8-80c6-aa9e317ad7cd,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:39.765302 kubelet[2689]: E1002 19:08:39.765276 2689 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:39.765399 kubelet[2689]: E1002 19:08:39.765348 2689 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69c848ddc6-fwbr7" Oct 2 19:08:39.765399 kubelet[2689]: E1002 19:08:39.765382 2689 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69c848ddc6-fwbr7" Oct 2 19:08:39.765506 kubelet[2689]: E1002 19:08:39.765458 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-69c848ddc6-fwbr7_calico-system(8ad2c188-b599-42c8-80c6-aa9e317ad7cd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-69c848ddc6-fwbr7_calico-system(8ad2c188-b599-42c8-80c6-aa9e317ad7cd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69c848ddc6-fwbr7" podUID=8ad2c188-b599-42c8-80c6-aa9e317ad7cd Oct 2 19:08:39.810833 env[1553]: time="2023-10-02T19:08:39.810773485Z" level=error msg="Failed to destroy network for sandbox \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:39.811508 env[1553]: time="2023-10-02T19:08:39.811162051Z" level=error msg="encountered an error cleaning up failed sandbox \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:39.811508 env[1553]: time="2023-10-02T19:08:39.811255512Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nnw9l,Uid:e4104074-c237-4645-96b6-bc09192177f7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:39.811925 kubelet[2689]: E1002 19:08:39.811901 2689 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:39.812028 kubelet[2689]: E1002 19:08:39.811964 2689 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nnw9l" Oct 2 19:08:39.812028 kubelet[2689]: E1002 19:08:39.811996 2689 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nnw9l" Oct 2 19:08:39.813326 kubelet[2689]: E1002 19:08:39.813267 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-nnw9l_calico-system(e4104074-c237-4645-96b6-bc09192177f7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-nnw9l_calico-system(e4104074-c237-4645-96b6-bc09192177f7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nnw9l" podUID=e4104074-c237-4645-96b6-bc09192177f7 Oct 2 19:08:39.917786 env[1553]: time="2023-10-02T19:08:39.916437601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-5zzv5,Uid:5dbac382-d9ca-4eaf-b680-9fe23b274acd,Namespace:kube-system,Attempt:0,}" Oct 2 19:08:40.033836 env[1553]: time="2023-10-02T19:08:40.033776306Z" level=error msg="Failed to destroy network for sandbox \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:40.034149 env[1553]: time="2023-10-02T19:08:40.034109697Z" level=error msg="encountered an error cleaning up failed sandbox \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:40.034260 env[1553]: time="2023-10-02T19:08:40.034169413Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-5zzv5,Uid:5dbac382-d9ca-4eaf-b680-9fe23b274acd,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:40.034443 kubelet[2689]: E1002 19:08:40.034414 2689 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:40.034963 kubelet[2689]: E1002 19:08:40.034477 2689 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-5zzv5" Oct 2 19:08:40.034963 kubelet[2689]: E1002 19:08:40.034514 2689 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-5zzv5" Oct 2 19:08:40.034963 kubelet[2689]: E1002 19:08:40.034665 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-5zzv5_kube-system(5dbac382-d9ca-4eaf-b680-9fe23b274acd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-5zzv5_kube-system(5dbac382-d9ca-4eaf-b680-9fe23b274acd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-5zzv5" podUID=5dbac382-d9ca-4eaf-b680-9fe23b274acd Oct 2 19:08:40.072570 kubelet[2689]: I1002 19:08:40.072539 2689 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Oct 2 19:08:40.074616 env[1553]: time="2023-10-02T19:08:40.074526682Z" level=info msg="StopPodSandbox for \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\"" Oct 2 19:08:40.080485 kubelet[2689]: I1002 19:08:40.080447 2689 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Oct 2 19:08:40.084316 env[1553]: time="2023-10-02T19:08:40.083903351Z" level=info msg="StopPodSandbox for \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\"" Oct 2 19:08:40.086357 kubelet[2689]: I1002 19:08:40.086334 2689 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Oct 2 19:08:40.088714 env[1553]: time="2023-10-02T19:08:40.088677000Z" level=info msg="StopPodSandbox for \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\"" Oct 2 19:08:40.155097 env[1553]: time="2023-10-02T19:08:40.155024865Z" level=error msg="StopPodSandbox for \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\" failed" error="failed to destroy network for sandbox \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:40.155903 kubelet[2689]: E1002 19:08:40.155668 2689 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Oct 2 19:08:40.155903 kubelet[2689]: E1002 19:08:40.155771 2689 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003} Oct 2 19:08:40.155903 kubelet[2689]: E1002 19:08:40.155822 2689 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8ad2c188-b599-42c8-80c6-aa9e317ad7cd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:08:40.155903 kubelet[2689]: E1002 19:08:40.155877 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8ad2c188-b599-42c8-80c6-aa9e317ad7cd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69c848ddc6-fwbr7" podUID=8ad2c188-b599-42c8-80c6-aa9e317ad7cd Oct 2 19:08:40.176700 env[1553]: time="2023-10-02T19:08:40.175167463Z" level=error msg="StopPodSandbox for \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\" failed" error="failed to destroy network for sandbox \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:40.178034 kubelet[2689]: E1002 19:08:40.177835 2689 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Oct 2 19:08:40.178034 kubelet[2689]: E1002 19:08:40.177881 2689 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e} Oct 2 19:08:40.178034 kubelet[2689]: E1002 19:08:40.177945 2689 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5dbac382-d9ca-4eaf-b680-9fe23b274acd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:08:40.178034 kubelet[2689]: E1002 19:08:40.178008 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5dbac382-d9ca-4eaf-b680-9fe23b274acd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-5zzv5" podUID=5dbac382-d9ca-4eaf-b680-9fe23b274acd Oct 2 19:08:40.184644 env[1553]: time="2023-10-02T19:08:40.184534063Z" level=error msg="StopPodSandbox for \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\" failed" error="failed to destroy network for sandbox \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:40.184957 kubelet[2689]: E1002 19:08:40.184934 2689 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Oct 2 19:08:40.185151 kubelet[2689]: E1002 19:08:40.184981 2689 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8} Oct 2 19:08:40.185151 kubelet[2689]: E1002 19:08:40.185104 2689 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e4104074-c237-4645-96b6-bc09192177f7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:08:40.185300 kubelet[2689]: E1002 19:08:40.185154 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e4104074-c237-4645-96b6-bc09192177f7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nnw9l" podUID=e4104074-c237-4645-96b6-bc09192177f7 Oct 2 19:08:40.235800 env[1553]: time="2023-10-02T19:08:40.235497482Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-fhxq5,Uid:45f7a44b-baf9-4662-ae23-0d419c416bf2,Namespace:kube-system,Attempt:0,}" Oct 2 19:08:40.333244 env[1553]: time="2023-10-02T19:08:40.333168510Z" level=error msg="Failed to destroy network for sandbox \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:40.333906 env[1553]: time="2023-10-02T19:08:40.333544838Z" level=error msg="encountered an error cleaning up failed sandbox \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:40.333906 env[1553]: time="2023-10-02T19:08:40.333601992Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-fhxq5,Uid:45f7a44b-baf9-4662-ae23-0d419c416bf2,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:40.334042 kubelet[2689]: E1002 19:08:40.333879 2689 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:40.334042 kubelet[2689]: E1002 19:08:40.333941 2689 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-fhxq5" Oct 2 19:08:40.334042 kubelet[2689]: E1002 19:08:40.333973 2689 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-fhxq5" Oct 2 19:08:40.335150 kubelet[2689]: E1002 19:08:40.334043 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-fhxq5_kube-system(45f7a44b-baf9-4662-ae23-0d419c416bf2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-fhxq5_kube-system(45f7a44b-baf9-4662-ae23-0d419c416bf2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-fhxq5" podUID=45f7a44b-baf9-4662-ae23-0d419c416bf2 Oct 2 19:08:40.588941 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8-shm.mount: Deactivated successfully. Oct 2 19:08:41.092774 kubelet[2689]: I1002 19:08:41.092654 2689 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Oct 2 19:08:41.097044 env[1553]: time="2023-10-02T19:08:41.094555121Z" level=info msg="StopPodSandbox for \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\"" Oct 2 19:08:41.192647 env[1553]: time="2023-10-02T19:08:41.192583406Z" level=error msg="StopPodSandbox for \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\" failed" error="failed to destroy network for sandbox \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:41.192881 kubelet[2689]: E1002 19:08:41.192827 2689 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Oct 2 19:08:41.192881 kubelet[2689]: E1002 19:08:41.192868 2689 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb} Oct 2 19:08:41.193041 kubelet[2689]: E1002 19:08:41.192918 2689 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"45f7a44b-baf9-4662-ae23-0d419c416bf2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:08:41.193041 kubelet[2689]: E1002 19:08:41.192958 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"45f7a44b-baf9-4662-ae23-0d419c416bf2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-fhxq5" podUID=45f7a44b-baf9-4662-ae23-0d419c416bf2 Oct 2 19:08:45.211035 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2248156873.mount: Deactivated successfully. Oct 2 19:08:45.341057 env[1553]: time="2023-10-02T19:08:45.340992503Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:45.345316 env[1553]: time="2023-10-02T19:08:45.345148301Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:45.356623 env[1553]: time="2023-10-02T19:08:45.352020424Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:45.366475 env[1553]: time="2023-10-02T19:08:45.366425221Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:08:45.370284 env[1553]: time="2023-10-02T19:08:45.366784043Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:45.396318 env[1553]: time="2023-10-02T19:08:45.396093441Z" level=info msg="CreateContainer within sandbox \"71419571c331596a9f168b2bdc268f3cfa12990af3a246ef8ff7f743ae38fecc\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:08:45.422165 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3829669691.mount: Deactivated successfully. Oct 2 19:08:45.435708 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount23485986.mount: Deactivated successfully. Oct 2 19:08:45.445234 env[1553]: time="2023-10-02T19:08:45.445177356Z" level=info msg="CreateContainer within sandbox \"71419571c331596a9f168b2bdc268f3cfa12990af3a246ef8ff7f743ae38fecc\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b37ee9cbe9157565090298c0dfffece6df73d37fefa82e2d7979dc523454e319\"" Oct 2 19:08:45.446756 env[1553]: time="2023-10-02T19:08:45.446686747Z" level=info msg="StartContainer for \"b37ee9cbe9157565090298c0dfffece6df73d37fefa82e2d7979dc523454e319\"" Oct 2 19:08:45.474676 systemd[1]: Started cri-containerd-b37ee9cbe9157565090298c0dfffece6df73d37fefa82e2d7979dc523454e319.scope. Oct 2 19:08:45.508000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.512059 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:08:45.512227 kernel: audit: type=1400 audit(1696273725.508:1184): avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.517529 kernel: audit: type=1300 audit(1696273725.508:1184): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3158 pid=3657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:45.508000 audit[3657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3158 pid=3657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:45.546260 kernel: audit: type=1327 audit(1696273725.508:1184): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233376565396362653931353735363530393032393863306466666665 Oct 2 19:08:45.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233376565396362653931353735363530393032393863306466666665 Oct 2 19:08:45.508000 audit[3657]: AVC avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.555427 kernel: audit: type=1400 audit(1696273725.508:1185): avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.555567 kernel: audit: type=1400 audit(1696273725.508:1185): avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.508000 audit[3657]: AVC avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.561176 kernel: audit: type=1400 audit(1696273725.508:1185): avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.508000 audit[3657]: AVC avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.508000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.571282 kernel: audit: type=1400 audit(1696273725.508:1185): avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.571504 kernel: audit: type=1400 audit(1696273725.508:1185): avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.508000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.508000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.508000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.581392 kernel: audit: type=1400 audit(1696273725.508:1185): avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.581504 kernel: audit: type=1400 audit(1696273725.508:1185): avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.508000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.508000 audit[3657]: AVC avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.508000 audit[3657]: AVC avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.508000 audit: BPF prog-id=145 op=LOAD Oct 2 19:08:45.508000 audit[3657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000292790 items=0 ppid=3158 pid=3657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:45.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233376565396362653931353735363530393032393863306466666665 Oct 2 19:08:45.526000 audit[3657]: AVC avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.526000 audit[3657]: AVC avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.526000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.526000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.526000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.526000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.526000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.526000 audit[3657]: AVC avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.526000 audit[3657]: AVC avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.526000 audit: BPF prog-id=146 op=LOAD Oct 2 19:08:45.526000 audit[3657]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002927d8 items=0 ppid=3158 pid=3657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:45.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233376565396362653931353735363530393032393863306466666665 Oct 2 19:08:45.550000 audit: BPF prog-id=146 op=UNLOAD Oct 2 19:08:45.550000 audit: BPF prog-id=145 op=UNLOAD Oct 2 19:08:45.550000 audit[3657]: AVC avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.550000 audit[3657]: AVC avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.550000 audit[3657]: AVC avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.550000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.550000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.550000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.550000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.550000 audit[3657]: AVC avc: denied { perfmon } for pid=3657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.550000 audit[3657]: AVC avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.550000 audit[3657]: AVC avc: denied { bpf } for pid=3657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:45.550000 audit: BPF prog-id=147 op=LOAD Oct 2 19:08:45.550000 audit[3657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000292868 items=0 ppid=3158 pid=3657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:45.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233376565396362653931353735363530393032393863306466666665 Oct 2 19:08:45.605067 env[1553]: time="2023-10-02T19:08:45.605001045Z" level=info msg="StartContainer for \"b37ee9cbe9157565090298c0dfffece6df73d37fefa82e2d7979dc523454e319\" returns successfully" Oct 2 19:08:45.729839 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:08:45.729986 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:08:46.166898 kubelet[2689]: I1002 19:08:46.166866 2689 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-xfg26" podStartSLOduration=-9.223372015689947e+09 pod.CreationTimestamp="2023-10-02 19:08:25 +0000 UTC" firstStartedPulling="2023-10-02 19:08:26.066728232 +0000 UTC m=+20.718449099" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:08:46.164409567 +0000 UTC m=+40.816130443" watchObservedRunningTime="2023-10-02 19:08:46.164828954 +0000 UTC m=+40.816549829" Oct 2 19:08:47.157672 systemd[1]: run-containerd-runc-k8s.io-b37ee9cbe9157565090298c0dfffece6df73d37fefa82e2d7979dc523454e319-runc.4p2J6V.mount: Deactivated successfully. Oct 2 19:08:47.470000 audit[3802]: AVC avc: denied { write } for pid=3802 comm="tee" name="fd" dev="proc" ino=25249 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:08:47.480000 audit[3809]: AVC avc: denied { write } for pid=3809 comm="tee" name="fd" dev="proc" ino=25252 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:08:47.481000 audit[3821]: AVC avc: denied { write } for pid=3821 comm="tee" name="fd" dev="proc" ino=25255 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:08:47.484000 audit[3804]: AVC avc: denied { write } for pid=3804 comm="tee" name="fd" dev="proc" ino=25258 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:08:47.485000 audit[3815]: AVC avc: denied { write } for pid=3815 comm="tee" name="fd" dev="proc" ino=25261 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:08:47.485000 audit[3815]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6b834975 a2=241 a3=1b6 items=1 ppid=3784 pid=3815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:47.470000 audit[3802]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6458c976 a2=241 a3=1b6 items=1 ppid=3766 pid=3802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:47.470000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:08:47.470000 audit: PATH item=0 name="/dev/fd/63" inode=25231 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:47.470000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:08:47.485000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:08:47.484000 audit[3804]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe615c2986 a2=241 a3=1b6 items=1 ppid=3777 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:47.485000 audit: PATH item=0 name="/dev/fd/63" inode=25696 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:47.480000 audit[3809]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffefd1a3985 a2=241 a3=1b6 items=1 ppid=3773 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:47.485000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:08:47.484000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:08:47.480000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:08:47.484000 audit: PATH item=0 name="/dev/fd/63" inode=25234 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:47.480000 audit: PATH item=0 name="/dev/fd/63" inode=25239 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:47.484000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:08:47.480000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:08:47.481000 audit[3821]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff15be1985 a2=241 a3=1b6 items=1 ppid=3772 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:47.481000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:08:47.481000 audit: PATH item=0 name="/dev/fd/63" inode=25240 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:47.481000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:08:47.515000 audit[3830]: AVC avc: denied { write } for pid=3830 comm="tee" name="fd" dev="proc" ino=25271 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:08:47.515000 audit[3830]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc25b62985 a2=241 a3=1b6 items=1 ppid=3775 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:47.515000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:08:47.515000 audit: PATH item=0 name="/dev/fd/63" inode=25701 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:47.515000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:08:47.527000 audit[3806]: AVC avc: denied { write } for pid=3806 comm="tee" name="fd" dev="proc" ino=25711 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:08:47.527000 audit[3806]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc30d9b987 a2=241 a3=1b6 items=1 ppid=3770 pid=3806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:47.527000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:08:47.527000 audit: PATH item=0 name="/dev/fd/63" inode=25693 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:47.527000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:08:48.151810 systemd[1]: run-containerd-runc-k8s.io-b37ee9cbe9157565090298c0dfffece6df73d37fefa82e2d7979dc523454e319-runc.26ez3D.mount: Deactivated successfully. Oct 2 19:08:48.196274 (udev-worker)[3689]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:08:48.202437 (udev-worker)[3922]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:08:48.213000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.213000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.213000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.213000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.213000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.213000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.213000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.213000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.213000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.213000 audit: BPF prog-id=148 op=LOAD Oct 2 19:08:48.213000 audit[3924]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef521dfc0 a2=70 a3=7f0d7a19c000 items=0 ppid=3774 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.213000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:48.215000 audit: BPF prog-id=148 op=UNLOAD Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit: BPF prog-id=149 op=LOAD Oct 2 19:08:48.215000 audit[3924]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef521dfc0 a2=70 a3=6e items=0 ppid=3774 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.215000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:48.215000 audit: BPF prog-id=149 op=UNLOAD Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffef521df70 a2=70 a3=7ffef521dfc0 items=0 ppid=3774 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.215000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit: BPF prog-id=150 op=LOAD Oct 2 19:08:48.215000 audit[3924]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffef521df50 a2=70 a3=7ffef521dfc0 items=0 ppid=3774 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.215000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:48.215000 audit: BPF prog-id=150 op=UNLOAD Oct 2 19:08:48.215000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.215000 audit[3924]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef521e030 a2=70 a3=0 items=0 ppid=3774 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.215000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:48.218000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.218000 audit[3924]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef521e020 a2=70 a3=0 items=0 ppid=3774 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:48.218000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.218000 audit[3924]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffef521e060 a2=70 a3=0 items=0 ppid=3774 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:48.219000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.219000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.219000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.219000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.219000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.219000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.219000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.219000 audit[3924]: AVC avc: denied { perfmon } for pid=3924 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.219000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.219000 audit[3924]: AVC avc: denied { bpf } for pid=3924 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.219000 audit: BPF prog-id=151 op=LOAD Oct 2 19:08:48.219000 audit[3924]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffef521df80 a2=70 a3=ffffffff items=0 ppid=3774 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.219000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:48.248000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.248000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc6e8d8a70 a2=70 a3=fff80800 items=0 ppid=3774 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:08:48.249000 audit[3931]: AVC avc: denied { bpf } for pid=3931 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.249000 audit[3931]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc6e8d8940 a2=70 a3=3 items=0 ppid=3774 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.249000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:08:48.256000 audit: BPF prog-id=151 op=UNLOAD Oct 2 19:08:48.256000 audit[3914]: SYSCALL arch=c000003e syscall=35 success=yes exit=0 a0=7fede49dfda0 a1=0 a2=0 a3=8 items=0 ppid=3158 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="calico-node" exe="/usr/bin/calico-node" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.256000 audit: PROCTITLE proctitle=2F62696E2F63616C69636F2D6E6F6465002D626972642D7265616479002D66656C69782D7265616479 Oct 2 19:08:48.392000 audit[3961]: NETFILTER_CFG table=mangle:111 family=2 entries=19 op=nft_register_chain pid=3961 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:48.392000 audit[3961]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe6c46c7d0 a2=0 a3=7ffe6c46c7bc items=0 ppid=3774 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.392000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:48.404000 audit[3960]: NETFILTER_CFG table=nat:112 family=2 entries=16 op=nft_register_chain pid=3960 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:48.404000 audit[3960]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fff8f081a80 a2=0 a3=7fff8f081a6c items=0 ppid=3774 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.404000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:48.415000 audit[3963]: NETFILTER_CFG table=raw:113 family=2 entries=19 op=nft_register_chain pid=3963 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:48.415000 audit[3963]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff41535760 a2=0 a3=56474185f000 items=0 ppid=3774 pid=3963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.415000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:48.420000 audit[3964]: NETFILTER_CFG table=filter:114 family=2 entries=39 op=nft_register_chain pid=3964 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:48.420000 audit[3964]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fffe8f58ee0 a2=0 a3=56248e45d000 items=0 ppid=3774 pid=3964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.420000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:49.009849 systemd-networkd[1368]: vxlan.calico: Link UP Oct 2 19:08:49.009860 systemd-networkd[1368]: vxlan.calico: Gained carrier Oct 2 19:08:50.260725 systemd-networkd[1368]: vxlan.calico: Gained IPv6LL Oct 2 19:08:51.874243 env[1553]: time="2023-10-02T19:08:51.870438136Z" level=info msg="StopPodSandbox for \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\"" Oct 2 19:08:52.227625 env[1553]: 2023-10-02 19:08:52.018 [INFO][4006] k8s.go 576: Cleaning up netns ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Oct 2 19:08:52.227625 env[1553]: 2023-10-02 19:08:52.021 [INFO][4006] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" iface="eth0" netns="/var/run/netns/cni-ac5fc3c1-cd3d-d1e6-de15-9b3c84c5d3e9" Oct 2 19:08:52.227625 env[1553]: 2023-10-02 19:08:52.025 [INFO][4006] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" iface="eth0" netns="/var/run/netns/cni-ac5fc3c1-cd3d-d1e6-de15-9b3c84c5d3e9" Oct 2 19:08:52.227625 env[1553]: 2023-10-02 19:08:52.026 [INFO][4006] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" iface="eth0" netns="/var/run/netns/cni-ac5fc3c1-cd3d-d1e6-de15-9b3c84c5d3e9" Oct 2 19:08:52.227625 env[1553]: 2023-10-02 19:08:52.026 [INFO][4006] k8s.go 583: Releasing IP address(es) ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Oct 2 19:08:52.227625 env[1553]: 2023-10-02 19:08:52.026 [INFO][4006] utils.go 196: Calico CNI releasing IP address ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Oct 2 19:08:52.227625 env[1553]: 2023-10-02 19:08:52.198 [INFO][4012] ipam_plugin.go 416: Releasing address using handleID ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" HandleID="k8s-pod-network.a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Workload="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:08:52.227625 env[1553]: time="2023-10-02T19:08:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:52.227625 env[1553]: time="2023-10-02T19:08:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:52.227625 env[1553]: 2023-10-02 19:08:52.219 [WARNING][4012] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" HandleID="k8s-pod-network.a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Workload="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:08:52.227625 env[1553]: 2023-10-02 19:08:52.219 [INFO][4012] ipam_plugin.go 444: Releasing address using workloadID ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" HandleID="k8s-pod-network.a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Workload="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:08:52.227625 env[1553]: time="2023-10-02T19:08:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:52.227625 env[1553]: 2023-10-02 19:08:52.224 [INFO][4006] k8s.go 589: Teardown processing complete. ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Oct 2 19:08:52.229395 env[1553]: time="2023-10-02T19:08:52.229347789Z" level=info msg="TearDown network for sandbox \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\" successfully" Oct 2 19:08:52.229539 env[1553]: time="2023-10-02T19:08:52.229516371Z" level=info msg="StopPodSandbox for \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\" returns successfully" Oct 2 19:08:52.231982 systemd[1]: run-netns-cni\x2dac5fc3c1\x2dcd3d\x2dd1e6\x2dde15\x2d9b3c84c5d3e9.mount: Deactivated successfully. Oct 2 19:08:52.234234 env[1553]: time="2023-10-02T19:08:52.234181706Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nnw9l,Uid:e4104074-c237-4645-96b6-bc09192177f7,Namespace:calico-system,Attempt:1,}" Oct 2 19:08:52.439234 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:08:52.439390 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2ce2870a855: link becomes ready Oct 2 19:08:52.451473 systemd-networkd[1368]: cali2ce2870a855: Link UP Oct 2 19:08:52.451484 systemd-networkd[1368]: cali2ce2870a855: Gained carrier Oct 2 19:08:52.454196 (udev-worker)[4041]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.331 [INFO][4018] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0 csi-node-driver- calico-system e4104074-c237-4645-96b6-bc09192177f7 674 0 2023-10-02 19:08:38 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5877dcb8f5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-27-162 csi-node-driver-nnw9l eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali2ce2870a855 [] []}} ContainerID="f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" Namespace="calico-system" Pod="csi-node-driver-nnw9l" WorkloadEndpoint="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-" Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.331 [INFO][4018] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" Namespace="calico-system" Pod="csi-node-driver-nnw9l" WorkloadEndpoint="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.379 [INFO][4030] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" HandleID="k8s-pod-network.f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" Workload="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.391 [INFO][4030] ipam_plugin.go 269: Auto assigning IP ContainerID="f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" HandleID="k8s-pod-network.f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" Workload="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001b8040), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-27-162", "pod":"csi-node-driver-nnw9l", "timestamp":"2023-10-02 19:08:52.379169589 +0000 UTC"}, Hostname:"ip-172-31-27-162", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:08:52.484729 env[1553]: time="2023-10-02T19:08:52Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:52.484729 env[1553]: time="2023-10-02T19:08:52Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.391 [INFO][4030] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-162' Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.395 [INFO][4030] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" host="ip-172-31-27-162" Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.401 [INFO][4030] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-162" Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.406 [INFO][4030] ipam.go 489: Trying affinity for 192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.409 [INFO][4030] ipam.go 155: Attempting to load block cidr=192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.415 [INFO][4030] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.416 [INFO][4030] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.192/26 handle="k8s-pod-network.f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" host="ip-172-31-27-162" Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.417 [INFO][4030] ipam.go 1682: Creating new handle: k8s-pod-network.f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.422 [INFO][4030] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.192/26 handle="k8s-pod-network.f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" host="ip-172-31-27-162" Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.428 [INFO][4030] ipam.go 1216: Successfully claimed IPs: [192.168.123.193/26] block=192.168.123.192/26 handle="k8s-pod-network.f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" host="ip-172-31-27-162" Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.428 [INFO][4030] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.193/26] handle="k8s-pod-network.f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" host="ip-172-31-27-162" Oct 2 19:08:52.484729 env[1553]: time="2023-10-02T19:08:52Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:52.484729 env[1553]: 2023-10-02 19:08:52.429 [INFO][4030] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.123.193/26] IPv6=[] ContainerID="f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" HandleID="k8s-pod-network.f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" Workload="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:08:52.487265 env[1553]: 2023-10-02 19:08:52.434 [INFO][4018] k8s.go 383: Populated endpoint ContainerID="f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" Namespace="calico-system" Pod="csi-node-driver-nnw9l" WorkloadEndpoint="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e4104074-c237-4645-96b6-bc09192177f7", ResourceVersion:"674", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"", Pod:"csi-node-driver-nnw9l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.123.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2ce2870a855", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:52.487265 env[1553]: 2023-10-02 19:08:52.434 [INFO][4018] k8s.go 384: Calico CNI using IPs: [192.168.123.193/32] ContainerID="f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" Namespace="calico-system" Pod="csi-node-driver-nnw9l" WorkloadEndpoint="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:08:52.487265 env[1553]: 2023-10-02 19:08:52.434 [INFO][4018] dataplane_linux.go 68: Setting the host side veth name to cali2ce2870a855 ContainerID="f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" Namespace="calico-system" Pod="csi-node-driver-nnw9l" WorkloadEndpoint="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:08:52.487265 env[1553]: 2023-10-02 19:08:52.439 [INFO][4018] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" Namespace="calico-system" Pod="csi-node-driver-nnw9l" WorkloadEndpoint="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:08:52.487265 env[1553]: 2023-10-02 19:08:52.454 [INFO][4018] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" Namespace="calico-system" Pod="csi-node-driver-nnw9l" WorkloadEndpoint="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e4104074-c237-4645-96b6-bc09192177f7", ResourceVersion:"674", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c", Pod:"csi-node-driver-nnw9l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.123.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2ce2870a855", MAC:"d6:01:d0:96:fa:1a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:52.487265 env[1553]: 2023-10-02 19:08:52.481 [INFO][4018] k8s.go 489: Wrote updated endpoint to datastore ContainerID="f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c" Namespace="calico-system" Pod="csi-node-driver-nnw9l" WorkloadEndpoint="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:08:52.509780 env[1553]: time="2023-10-02T19:08:52.509558207Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:52.509780 env[1553]: time="2023-10-02T19:08:52.509609194Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:52.509780 env[1553]: time="2023-10-02T19:08:52.509620387Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:52.510168 env[1553]: time="2023-10-02T19:08:52.510113709Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c pid=4062 runtime=io.containerd.runc.v2 Oct 2 19:08:52.561135 systemd[1]: Started cri-containerd-f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c.scope. Oct 2 19:08:52.600000 audit[4094]: NETFILTER_CFG table=filter:115 family=2 entries=36 op=nft_register_chain pid=4094 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:52.603915 kernel: kauditd_printk_skb: 153 callbacks suppressed Oct 2 19:08:52.604642 kernel: audit: type=1325 audit(1696273732.600:1215): table=filter:115 family=2 entries=36 op=nft_register_chain pid=4094 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:52.600000 audit[4094]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe9e8250d0 a2=0 a3=7ffe9e8250bc items=0 ppid=3774 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:52.617655 kernel: audit: type=1300 audit(1696273732.600:1215): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe9e8250d0 a2=0 a3=7ffe9e8250bc items=0 ppid=3774 pid=4094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:52.600000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:52.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.633389 kernel: audit: type=1327 audit(1696273732.600:1215): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:52.633963 kernel: audit: type=1400 audit(1696273732.618:1216): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.640548 kernel: audit: type=1400 audit(1696273732.618:1217): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.648179 kernel: audit: type=1400 audit(1696273732.618:1218): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.648342 kernel: audit: type=1400 audit(1696273732.618:1219): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.660459 kernel: audit: type=1400 audit(1696273732.618:1220): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.672743 kernel: audit: type=1400 audit(1696273732.618:1221): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.672852 kernel: audit: type=1400 audit(1696273732.618:1222): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.625000 audit: BPF prog-id=152 op=LOAD Oct 2 19:08:52.625000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.625000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4062 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:52.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637643238663266333961353561336236616236363261323539333635 Oct 2 19:08:52.625000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.625000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4062 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:52.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637643238663266333961353561336236616236363261323539333635 Oct 2 19:08:52.625000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.625000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.625000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.625000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.625000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.625000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.625000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.625000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.625000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.625000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.625000 audit: BPF prog-id=153 op=LOAD Oct 2 19:08:52.625000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00018d510 items=0 ppid=4062 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:52.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637643238663266333961353561336236616236363261323539333635 Oct 2 19:08:52.640000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.640000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.640000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.640000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.640000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.640000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.640000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.640000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.640000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.640000 audit: BPF prog-id=154 op=LOAD Oct 2 19:08:52.640000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00018d558 items=0 ppid=4062 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:52.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637643238663266333961353561336236616236363261323539333635 Oct 2 19:08:52.652000 audit: BPF prog-id=154 op=UNLOAD Oct 2 19:08:52.653000 audit: BPF prog-id=153 op=UNLOAD Oct 2 19:08:52.653000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.653000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.653000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.653000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.653000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.653000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.653000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.653000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.653000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.653000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:52.653000 audit: BPF prog-id=155 op=LOAD Oct 2 19:08:52.653000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00018d968 items=0 ppid=4062 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:52.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637643238663266333961353561336236616236363261323539333635 Oct 2 19:08:52.695143 env[1553]: time="2023-10-02T19:08:52.694797840Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nnw9l,Uid:e4104074-c237-4645-96b6-bc09192177f7,Namespace:calico-system,Attempt:1,} returns sandbox id \"f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c\"" Oct 2 19:08:52.698916 env[1553]: time="2023-10-02T19:08:52.698869421Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:08:52.869794 env[1553]: time="2023-10-02T19:08:52.869630256Z" level=info msg="StopPodSandbox for \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\"" Oct 2 19:08:52.901509 env[1553]: time="2023-10-02T19:08:52.901444105Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:08:52.903622 env[1553]: time="2023-10-02T19:08:52.903526584Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:08:52.908108 kubelet[2689]: E1002 19:08:52.905058 2689 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:08:52.908108 kubelet[2689]: E1002 19:08:52.905144 2689 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:08:52.915930 kubelet[2689]: E1002 19:08:52.915503 2689 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-fv2lg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-nnw9l_calico-system(e4104074-c237-4645-96b6-bc09192177f7): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:08:52.929143 env[1553]: time="2023-10-02T19:08:52.929087336Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:08:53.048138 env[1553]: 2023-10-02 19:08:52.978 [INFO][4115] k8s.go 576: Cleaning up netns ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Oct 2 19:08:53.048138 env[1553]: 2023-10-02 19:08:52.978 [INFO][4115] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" iface="eth0" netns="/var/run/netns/cni-549b11b5-e79c-2738-b59f-6ff80d622c90" Oct 2 19:08:53.048138 env[1553]: 2023-10-02 19:08:52.979 [INFO][4115] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" iface="eth0" netns="/var/run/netns/cni-549b11b5-e79c-2738-b59f-6ff80d622c90" Oct 2 19:08:53.048138 env[1553]: 2023-10-02 19:08:52.979 [INFO][4115] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" iface="eth0" netns="/var/run/netns/cni-549b11b5-e79c-2738-b59f-6ff80d622c90" Oct 2 19:08:53.048138 env[1553]: 2023-10-02 19:08:52.979 [INFO][4115] k8s.go 583: Releasing IP address(es) ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Oct 2 19:08:53.048138 env[1553]: 2023-10-02 19:08:52.979 [INFO][4115] utils.go 196: Calico CNI releasing IP address ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Oct 2 19:08:53.048138 env[1553]: 2023-10-02 19:08:53.014 [INFO][4121] ipam_plugin.go 416: Releasing address using handleID ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" HandleID="k8s-pod-network.54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:08:53.048138 env[1553]: time="2023-10-02T19:08:53Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:53.048138 env[1553]: time="2023-10-02T19:08:53Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:53.048138 env[1553]: 2023-10-02 19:08:53.039 [WARNING][4121] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" HandleID="k8s-pod-network.54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:08:53.048138 env[1553]: 2023-10-02 19:08:53.039 [INFO][4121] ipam_plugin.go 444: Releasing address using workloadID ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" HandleID="k8s-pod-network.54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:08:53.048138 env[1553]: time="2023-10-02T19:08:53Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:53.048138 env[1553]: 2023-10-02 19:08:53.046 [INFO][4115] k8s.go 589: Teardown processing complete. ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Oct 2 19:08:53.049138 env[1553]: time="2023-10-02T19:08:53.048490574Z" level=info msg="TearDown network for sandbox \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\" successfully" Oct 2 19:08:53.049138 env[1553]: time="2023-10-02T19:08:53.048792043Z" level=info msg="StopPodSandbox for \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\" returns successfully" Oct 2 19:08:53.049892 env[1553]: time="2023-10-02T19:08:53.049858131Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-5zzv5,Uid:5dbac382-d9ca-4eaf-b680-9fe23b274acd,Namespace:kube-system,Attempt:1,}" Oct 2 19:08:53.130604 env[1553]: time="2023-10-02T19:08:53.130466030Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:08:53.132500 env[1553]: time="2023-10-02T19:08:53.132426801Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:08:53.134301 kubelet[2689]: E1002 19:08:53.132973 2689 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:08:53.134301 kubelet[2689]: E1002 19:08:53.133022 2689 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:08:53.134301 kubelet[2689]: E1002 19:08:53.133165 2689 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-fv2lg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-nnw9l_calico-system(e4104074-c237-4645-96b6-bc09192177f7): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:08:53.134301 kubelet[2689]: E1002 19:08:53.133279 2689 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-nnw9l" podUID=e4104074-c237-4645-96b6-bc09192177f7 Oct 2 19:08:53.151294 kubelet[2689]: E1002 19:08:53.151041 2689 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nnw9l" podUID=e4104074-c237-4645-96b6-bc09192177f7 Oct 2 19:08:53.234166 systemd[1]: run-containerd-runc-k8s.io-f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c-runc.Ns53pA.mount: Deactivated successfully. Oct 2 19:08:53.234305 systemd[1]: run-netns-cni\x2d549b11b5\x2de79c\x2d2738\x2db59f\x2d6ff80d622c90.mount: Deactivated successfully. Oct 2 19:08:53.339049 systemd-networkd[1368]: cali26d60f05dc2: Link UP Oct 2 19:08:53.339060 systemd-networkd[1368]: cali26d60f05dc2: Gained carrier Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.131 [INFO][4128] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0 coredns-787d4945fb- kube-system 5dbac382-d9ca-4eaf-b680-9fe23b274acd 685 0 2023-10-02 19:08:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-27-162 coredns-787d4945fb-5zzv5 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali26d60f05dc2 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" Namespace="kube-system" Pod="coredns-787d4945fb-5zzv5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-" Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.132 [INFO][4128] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" Namespace="kube-system" Pod="coredns-787d4945fb-5zzv5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.213 [INFO][4138] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" HandleID="k8s-pod-network.e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.225 [INFO][4138] ipam_plugin.go 269: Auto assigning IP ContainerID="e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" HandleID="k8s-pod-network.e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004db00), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-27-162", "pod":"coredns-787d4945fb-5zzv5", "timestamp":"2023-10-02 19:08:53.213632153 +0000 UTC"}, Hostname:"ip-172-31-27-162", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:08:53.372240 env[1553]: time="2023-10-02T19:08:53Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:53.372240 env[1553]: time="2023-10-02T19:08:53Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.225 [INFO][4138] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-162' Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.237 [INFO][4138] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" host="ip-172-31-27-162" Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.246 [INFO][4138] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-162" Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.251 [INFO][4138] ipam.go 489: Trying affinity for 192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.254 [INFO][4138] ipam.go 155: Attempting to load block cidr=192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.256 [INFO][4138] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.257 [INFO][4138] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.192/26 handle="k8s-pod-network.e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" host="ip-172-31-27-162" Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.267 [INFO][4138] ipam.go 1682: Creating new handle: k8s-pod-network.e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.286 [INFO][4138] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.192/26 handle="k8s-pod-network.e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" host="ip-172-31-27-162" Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.326 [INFO][4138] ipam.go 1216: Successfully claimed IPs: [192.168.123.194/26] block=192.168.123.192/26 handle="k8s-pod-network.e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" host="ip-172-31-27-162" Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.327 [INFO][4138] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.194/26] handle="k8s-pod-network.e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" host="ip-172-31-27-162" Oct 2 19:08:53.372240 env[1553]: time="2023-10-02T19:08:53Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:53.372240 env[1553]: 2023-10-02 19:08:53.327 [INFO][4138] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.123.194/26] IPv6=[] ContainerID="e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" HandleID="k8s-pod-network.e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:08:53.373707 env[1553]: 2023-10-02 19:08:53.329 [INFO][4128] k8s.go 383: Populated endpoint ContainerID="e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" Namespace="kube-system" Pod="coredns-787d4945fb-5zzv5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"5dbac382-d9ca-4eaf-b680-9fe23b274acd", ResourceVersion:"685", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"", Pod:"coredns-787d4945fb-5zzv5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali26d60f05dc2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:53.373707 env[1553]: 2023-10-02 19:08:53.329 [INFO][4128] k8s.go 384: Calico CNI using IPs: [192.168.123.194/32] ContainerID="e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" Namespace="kube-system" Pod="coredns-787d4945fb-5zzv5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:08:53.373707 env[1553]: 2023-10-02 19:08:53.330 [INFO][4128] dataplane_linux.go 68: Setting the host side veth name to cali26d60f05dc2 ContainerID="e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" Namespace="kube-system" Pod="coredns-787d4945fb-5zzv5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:08:53.373707 env[1553]: 2023-10-02 19:08:53.331 [INFO][4128] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" Namespace="kube-system" Pod="coredns-787d4945fb-5zzv5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:08:53.373707 env[1553]: 2023-10-02 19:08:53.340 [INFO][4128] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" Namespace="kube-system" Pod="coredns-787d4945fb-5zzv5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"5dbac382-d9ca-4eaf-b680-9fe23b274acd", ResourceVersion:"685", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f", Pod:"coredns-787d4945fb-5zzv5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali26d60f05dc2", MAC:"26:70:c3:f4:df:54", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:53.373707 env[1553]: 2023-10-02 19:08:53.366 [INFO][4128] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f" Namespace="kube-system" Pod="coredns-787d4945fb-5zzv5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:08:53.400922 env[1553]: time="2023-10-02T19:08:53.400724883Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:53.400922 env[1553]: time="2023-10-02T19:08:53.400860676Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:53.400922 env[1553]: time="2023-10-02T19:08:53.400895036Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:53.401187 env[1553]: time="2023-10-02T19:08:53.401151989Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f pid=4161 runtime=io.containerd.runc.v2 Oct 2 19:08:53.441369 systemd[1]: Started cri-containerd-e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f.scope. Oct 2 19:08:53.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.502000 audit: BPF prog-id=156 op=LOAD Oct 2 19:08:53.504000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.504000 audit[4169]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4161 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:53.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532336563343931376166346663636662613161336361396365346164 Oct 2 19:08:53.504000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.504000 audit[4169]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4161 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:53.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532336563343931376166346663636662613161336361396365346164 Oct 2 19:08:53.504000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.504000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.504000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.504000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.504000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.504000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.504000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.504000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.504000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.504000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.504000 audit: BPF prog-id=157 op=LOAD Oct 2 19:08:53.504000 audit[4169]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003d8930 items=0 ppid=4161 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:53.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532336563343931376166346663636662613161336361396365346164 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit: BPF prog-id=158 op=LOAD Oct 2 19:08:53.505000 audit[4169]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003d8978 items=0 ppid=4161 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:53.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532336563343931376166346663636662613161336361396365346164 Oct 2 19:08:53.505000 audit: BPF prog-id=158 op=UNLOAD Oct 2 19:08:53.505000 audit: BPF prog-id=157 op=UNLOAD Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.505000 audit: BPF prog-id=159 op=LOAD Oct 2 19:08:53.505000 audit[4169]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d8d88 items=0 ppid=4161 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:53.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532336563343931376166346663636662613161336361396365346164 Oct 2 19:08:53.586109 env[1553]: time="2023-10-02T19:08:53.586064165Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-5zzv5,Uid:5dbac382-d9ca-4eaf-b680-9fe23b274acd,Namespace:kube-system,Attempt:1,} returns sandbox id \"e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f\"" Oct 2 19:08:53.592311 env[1553]: time="2023-10-02T19:08:53.592265351Z" level=info msg="CreateContainer within sandbox \"e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:08:53.618107 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount118910533.mount: Deactivated successfully. Oct 2 19:08:53.619244 env[1553]: time="2023-10-02T19:08:53.619169580Z" level=info msg="CreateContainer within sandbox \"e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"60b65f3ba45ada01a8e0d2712522e6e6fe4fd67442c5e1f9da6ca023e9e18446\"" Oct 2 19:08:53.620471 env[1553]: time="2023-10-02T19:08:53.620393434Z" level=info msg="StartContainer for \"60b65f3ba45ada01a8e0d2712522e6e6fe4fd67442c5e1f9da6ca023e9e18446\"" Oct 2 19:08:53.626000 audit[4203]: NETFILTER_CFG table=filter:116 family=2 entries=40 op=nft_register_chain pid=4203 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:53.626000 audit[4203]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffd65a97310 a2=0 a3=7ffd65a972fc items=0 ppid=3774 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:53.626000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:53.646278 systemd[1]: Started cri-containerd-60b65f3ba45ada01a8e0d2712522e6e6fe4fd67442c5e1f9da6ca023e9e18446.scope. Oct 2 19:08:53.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.663000 audit: BPF prog-id=160 op=LOAD Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4161 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:53.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630623635663362613435616461303161386530643237313235323265 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4161 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:53.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630623635663362613435616461303161386530643237313235323265 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit: BPF prog-id=161 op=LOAD Oct 2 19:08:53.667000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001af520 items=0 ppid=4161 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:53.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630623635663362613435616461303161386530643237313235323265 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit: BPF prog-id=162 op=LOAD Oct 2 19:08:53.667000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001af568 items=0 ppid=4161 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:53.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630623635663362613435616461303161386530643237313235323265 Oct 2 19:08:53.667000 audit: BPF prog-id=162 op=UNLOAD Oct 2 19:08:53.667000 audit: BPF prog-id=161 op=UNLOAD Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:53.667000 audit: BPF prog-id=163 op=LOAD Oct 2 19:08:53.667000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001af978 items=0 ppid=4161 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:53.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630623635663362613435616461303161386530643237313235323265 Oct 2 19:08:53.689364 env[1553]: time="2023-10-02T19:08:53.689298429Z" level=info msg="StartContainer for \"60b65f3ba45ada01a8e0d2712522e6e6fe4fd67442c5e1f9da6ca023e9e18446\" returns successfully" Oct 2 19:08:53.874379 env[1553]: time="2023-10-02T19:08:53.874329543Z" level=info msg="StopPodSandbox for \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\"" Oct 2 19:08:54.037381 systemd-networkd[1368]: cali2ce2870a855: Gained IPv6LL Oct 2 19:08:54.107318 env[1553]: 2023-10-02 19:08:53.981 [INFO][4251] k8s.go 576: Cleaning up netns ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Oct 2 19:08:54.107318 env[1553]: 2023-10-02 19:08:53.982 [INFO][4251] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" iface="eth0" netns="/var/run/netns/cni-6d3a74aa-20f2-9bd6-c6c1-d0e782c7eecf" Oct 2 19:08:54.107318 env[1553]: 2023-10-02 19:08:53.982 [INFO][4251] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" iface="eth0" netns="/var/run/netns/cni-6d3a74aa-20f2-9bd6-c6c1-d0e782c7eecf" Oct 2 19:08:54.107318 env[1553]: 2023-10-02 19:08:53.982 [INFO][4251] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" iface="eth0" netns="/var/run/netns/cni-6d3a74aa-20f2-9bd6-c6c1-d0e782c7eecf" Oct 2 19:08:54.107318 env[1553]: 2023-10-02 19:08:53.982 [INFO][4251] k8s.go 583: Releasing IP address(es) ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Oct 2 19:08:54.107318 env[1553]: 2023-10-02 19:08:53.982 [INFO][4251] utils.go 196: Calico CNI releasing IP address ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Oct 2 19:08:54.107318 env[1553]: 2023-10-02 19:08:54.036 [INFO][4258] ipam_plugin.go 416: Releasing address using handleID ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" HandleID="k8s-pod-network.a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Workload="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:08:54.107318 env[1553]: time="2023-10-02T19:08:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:54.107318 env[1553]: time="2023-10-02T19:08:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:54.107318 env[1553]: 2023-10-02 19:08:54.090 [WARNING][4258] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" HandleID="k8s-pod-network.a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Workload="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:08:54.107318 env[1553]: 2023-10-02 19:08:54.091 [INFO][4258] ipam_plugin.go 444: Releasing address using workloadID ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" HandleID="k8s-pod-network.a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Workload="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:08:54.107318 env[1553]: time="2023-10-02T19:08:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:54.107318 env[1553]: 2023-10-02 19:08:54.097 [INFO][4251] k8s.go 589: Teardown processing complete. ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Oct 2 19:08:54.145545 env[1553]: time="2023-10-02T19:08:54.145488383Z" level=info msg="TearDown network for sandbox \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\" successfully" Oct 2 19:08:54.145747 env[1553]: time="2023-10-02T19:08:54.145727410Z" level=info msg="StopPodSandbox for \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\" returns successfully" Oct 2 19:08:54.146890 env[1553]: time="2023-10-02T19:08:54.146771445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-fwbr7,Uid:8ad2c188-b599-42c8-80c6-aa9e317ad7cd,Namespace:calico-system,Attempt:1,}" Oct 2 19:08:54.159258 kubelet[2689]: E1002 19:08:54.155593 2689 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nnw9l" podUID=e4104074-c237-4645-96b6-bc09192177f7 Oct 2 19:08:54.235974 systemd[1]: run-netns-cni\x2d6d3a74aa\x2d20f2\x2d9bd6\x2dc6c1\x2dd0e782c7eecf.mount: Deactivated successfully. Oct 2 19:08:54.403000 audit[4312]: NETFILTER_CFG table=filter:117 family=2 entries=12 op=nft_register_rule pid=4312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:54.403000 audit[4312]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffca73bf190 a2=0 a3=7ffca73bf17c items=0 ppid=2882 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:54.403000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:54.405000 audit[4312]: NETFILTER_CFG table=nat:118 family=2 entries=30 op=nft_register_rule pid=4312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:54.405000 audit[4312]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffca73bf190 a2=0 a3=7ffca73bf17c items=0 ppid=2882 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:54.405000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:54.423257 systemd-networkd[1368]: cali594947269dc: Link UP Oct 2 19:08:54.423270 systemd-networkd[1368]: cali594947269dc: Gained carrier Oct 2 19:08:54.444562 kubelet[2689]: I1002 19:08:54.444019 2689 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-5zzv5" podStartSLOduration=35.4439385 pod.CreationTimestamp="2023-10-02 19:08:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:08:54.202544964 +0000 UTC m=+48.854265848" watchObservedRunningTime="2023-10-02 19:08:54.4439385 +0000 UTC m=+49.095659375" Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.266 [INFO][4268] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0 calico-kube-controllers-69c848ddc6- calico-system 8ad2c188-b599-42c8-80c6-aa9e317ad7cd 703 0 2023-10-02 19:08:25 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:69c848ddc6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-27-162 calico-kube-controllers-69c848ddc6-fwbr7 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali594947269dc [] []}} ContainerID="b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-fwbr7" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-" Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.266 [INFO][4268] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-fwbr7" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.339 [INFO][4284] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" HandleID="k8s-pod-network.b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" Workload="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.357 [INFO][4284] ipam_plugin.go 269: Auto assigning IP ContainerID="b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" HandleID="k8s-pod-network.b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" Workload="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010c3e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-27-162", "pod":"calico-kube-controllers-69c848ddc6-fwbr7", "timestamp":"2023-10-02 19:08:54.339427154 +0000 UTC"}, Hostname:"ip-172-31-27-162", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:08:54.449581 env[1553]: time="2023-10-02T19:08:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:54.449581 env[1553]: time="2023-10-02T19:08:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.357 [INFO][4284] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-162' Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.360 [INFO][4284] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" host="ip-172-31-27-162" Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.369 [INFO][4284] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-162" Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.376 [INFO][4284] ipam.go 489: Trying affinity for 192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.380 [INFO][4284] ipam.go 155: Attempting to load block cidr=192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.384 [INFO][4284] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.384 [INFO][4284] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.192/26 handle="k8s-pod-network.b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" host="ip-172-31-27-162" Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.391 [INFO][4284] ipam.go 1682: Creating new handle: k8s-pod-network.b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931 Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.400 [INFO][4284] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.192/26 handle="k8s-pod-network.b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" host="ip-172-31-27-162" Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.411 [INFO][4284] ipam.go 1216: Successfully claimed IPs: [192.168.123.195/26] block=192.168.123.192/26 handle="k8s-pod-network.b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" host="ip-172-31-27-162" Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.411 [INFO][4284] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.195/26] handle="k8s-pod-network.b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" host="ip-172-31-27-162" Oct 2 19:08:54.449581 env[1553]: time="2023-10-02T19:08:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:54.449581 env[1553]: 2023-10-02 19:08:54.411 [INFO][4284] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.123.195/26] IPv6=[] ContainerID="b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" HandleID="k8s-pod-network.b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" Workload="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:08:54.450938 env[1553]: 2023-10-02 19:08:54.413 [INFO][4268] k8s.go 383: Populated endpoint ContainerID="b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-fwbr7" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"8ad2c188-b599-42c8-80c6-aa9e317ad7cd", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"", Pod:"calico-kube-controllers-69c848ddc6-fwbr7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.123.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali594947269dc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:54.450938 env[1553]: 2023-10-02 19:08:54.413 [INFO][4268] k8s.go 384: Calico CNI using IPs: [192.168.123.195/32] ContainerID="b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-fwbr7" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:08:54.450938 env[1553]: 2023-10-02 19:08:54.413 [INFO][4268] dataplane_linux.go 68: Setting the host side veth name to cali594947269dc ContainerID="b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-fwbr7" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:08:54.450938 env[1553]: 2023-10-02 19:08:54.415 [INFO][4268] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-fwbr7" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:08:54.450938 env[1553]: 2023-10-02 19:08:54.422 [INFO][4268] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-fwbr7" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"8ad2c188-b599-42c8-80c6-aa9e317ad7cd", ResourceVersion:"703", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931", Pod:"calico-kube-controllers-69c848ddc6-fwbr7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.123.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali594947269dc", MAC:"32:25:8f:1b:2c:11", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:54.450938 env[1553]: 2023-10-02 19:08:54.446 [INFO][4268] k8s.go 489: Wrote updated endpoint to datastore ContainerID="b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-fwbr7" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:08:54.507571 env[1553]: time="2023-10-02T19:08:54.507431881Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:54.508293 env[1553]: time="2023-10-02T19:08:54.508242560Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:54.508599 env[1553]: time="2023-10-02T19:08:54.508567391Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:54.509329 env[1553]: time="2023-10-02T19:08:54.509284554Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931 pid=4333 runtime=io.containerd.runc.v2 Oct 2 19:08:54.523000 audit[4342]: NETFILTER_CFG table=filter:119 family=2 entries=44 op=nft_register_chain pid=4342 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:54.523000 audit[4342]: SYSCALL arch=c000003e syscall=46 success=yes exit=22360 a0=3 a1=7ffd57339b60 a2=0 a3=7ffd57339b4c items=0 ppid=3774 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:54.523000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:54.557254 systemd[1]: run-containerd-runc-k8s.io-b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931-runc.6PxyZV.mount: Deactivated successfully. Oct 2 19:08:54.568186 systemd[1]: Started cri-containerd-b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931.scope. Oct 2 19:08:54.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.587000 audit: BPF prog-id=164 op=LOAD Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4333 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:54.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239613633336666393134323031383031316366623934316165336662 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4333 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:54.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239613633336666393134323031383031316366623934316165336662 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit: BPF prog-id=165 op=LOAD Oct 2 19:08:54.588000 audit[4343]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000222180 items=0 ppid=4333 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:54.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239613633336666393134323031383031316366623934316165336662 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit: BPF prog-id=166 op=LOAD Oct 2 19:08:54.588000 audit[4343]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002221c8 items=0 ppid=4333 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:54.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239613633336666393134323031383031316366623934316165336662 Oct 2 19:08:54.588000 audit: BPF prog-id=166 op=UNLOAD Oct 2 19:08:54.588000 audit: BPF prog-id=165 op=UNLOAD Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { perfmon } for pid=4343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit[4343]: AVC avc: denied { bpf } for pid=4343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:54.588000 audit: BPF prog-id=167 op=LOAD Oct 2 19:08:54.588000 audit[4343]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002225d8 items=0 ppid=4333 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:54.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239613633336666393134323031383031316366623934316165336662 Oct 2 19:08:54.646677 env[1553]: time="2023-10-02T19:08:54.646641201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-fwbr7,Uid:8ad2c188-b599-42c8-80c6-aa9e317ad7cd,Namespace:calico-system,Attempt:1,} returns sandbox id \"b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931\"" Oct 2 19:08:54.650032 env[1553]: time="2023-10-02T19:08:54.649993182Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:08:54.997394 systemd-networkd[1368]: cali26d60f05dc2: Gained IPv6LL Oct 2 19:08:55.233000 audit[4394]: NETFILTER_CFG table=filter:120 family=2 entries=9 op=nft_register_rule pid=4394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:55.233000 audit[4394]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe50f506a0 a2=0 a3=7ffe50f5068c items=0 ppid=2882 pid=4394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:55.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:55.235000 audit[4394]: NETFILTER_CFG table=nat:121 family=2 entries=51 op=nft_register_chain pid=4394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:55.235000 audit[4394]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffe50f506a0 a2=0 a3=7ffe50f5068c items=0 ppid=2882 pid=4394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:55.235000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:55.872746 env[1553]: time="2023-10-02T19:08:55.872686558Z" level=info msg="StopPodSandbox for \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\"" Oct 2 19:08:55.895815 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount107969059.mount: Deactivated successfully. Oct 2 19:08:56.022082 systemd-networkd[1368]: cali594947269dc: Gained IPv6LL Oct 2 19:08:56.096046 systemd[1]: run-containerd-runc-k8s.io-b37ee9cbe9157565090298c0dfffece6df73d37fefa82e2d7979dc523454e319-runc.mBWeet.mount: Deactivated successfully. Oct 2 19:08:56.248729 env[1553]: 2023-10-02 19:08:56.158 [INFO][4413] k8s.go 576: Cleaning up netns ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Oct 2 19:08:56.248729 env[1553]: 2023-10-02 19:08:56.158 [INFO][4413] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" iface="eth0" netns="/var/run/netns/cni-9b4a2e73-a7bb-a547-918b-3c34ae458f3f" Oct 2 19:08:56.248729 env[1553]: 2023-10-02 19:08:56.159 [INFO][4413] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" iface="eth0" netns="/var/run/netns/cni-9b4a2e73-a7bb-a547-918b-3c34ae458f3f" Oct 2 19:08:56.248729 env[1553]: 2023-10-02 19:08:56.159 [INFO][4413] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" iface="eth0" netns="/var/run/netns/cni-9b4a2e73-a7bb-a547-918b-3c34ae458f3f" Oct 2 19:08:56.248729 env[1553]: 2023-10-02 19:08:56.159 [INFO][4413] k8s.go 583: Releasing IP address(es) ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Oct 2 19:08:56.248729 env[1553]: 2023-10-02 19:08:56.159 [INFO][4413] utils.go 196: Calico CNI releasing IP address ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Oct 2 19:08:56.248729 env[1553]: 2023-10-02 19:08:56.221 [INFO][4438] ipam_plugin.go 416: Releasing address using handleID ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" HandleID="k8s-pod-network.4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:08:56.248729 env[1553]: time="2023-10-02T19:08:56Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:56.248729 env[1553]: time="2023-10-02T19:08:56Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:56.248729 env[1553]: 2023-10-02 19:08:56.234 [WARNING][4438] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" HandleID="k8s-pod-network.4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:08:56.248729 env[1553]: 2023-10-02 19:08:56.234 [INFO][4438] ipam_plugin.go 444: Releasing address using workloadID ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" HandleID="k8s-pod-network.4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:08:56.248729 env[1553]: time="2023-10-02T19:08:56Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:56.248729 env[1553]: 2023-10-02 19:08:56.243 [INFO][4413] k8s.go 589: Teardown processing complete. ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Oct 2 19:08:56.264937 env[1553]: time="2023-10-02T19:08:56.264890718Z" level=info msg="TearDown network for sandbox \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\" successfully" Oct 2 19:08:56.265152 env[1553]: time="2023-10-02T19:08:56.265130725Z" level=info msg="StopPodSandbox for \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\" returns successfully" Oct 2 19:08:56.296629 env[1553]: time="2023-10-02T19:08:56.296579819Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-fhxq5,Uid:45f7a44b-baf9-4662-ae23-0d419c416bf2,Namespace:kube-system,Attempt:1,}" Oct 2 19:08:56.703518 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:08:56.703690 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie74e5cbcbda: link becomes ready Oct 2 19:08:56.712119 systemd-networkd[1368]: calie74e5cbcbda: Link UP Oct 2 19:08:56.712130 systemd-networkd[1368]: calie74e5cbcbda: Gained carrier Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.537 [INFO][4449] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0 coredns-787d4945fb- kube-system 45f7a44b-baf9-4662-ae23-0d419c416bf2 726 0 2023-10-02 19:08:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-27-162 coredns-787d4945fb-fhxq5 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie74e5cbcbda [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" Namespace="kube-system" Pod="coredns-787d4945fb-fhxq5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-" Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.537 [INFO][4449] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" Namespace="kube-system" Pod="coredns-787d4945fb-fhxq5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.609 [INFO][4466] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" HandleID="k8s-pod-network.d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.623 [INFO][4466] ipam_plugin.go 269: Auto assigning IP ContainerID="d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" HandleID="k8s-pod-network.d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a3e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-27-162", "pod":"coredns-787d4945fb-fhxq5", "timestamp":"2023-10-02 19:08:56.60931578 +0000 UTC"}, Hostname:"ip-172-31-27-162", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:08:56.754685 env[1553]: time="2023-10-02T19:08:56Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:56.754685 env[1553]: time="2023-10-02T19:08:56Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.623 [INFO][4466] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-162' Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.627 [INFO][4466] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" host="ip-172-31-27-162" Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.650 [INFO][4466] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-162" Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.661 [INFO][4466] ipam.go 489: Trying affinity for 192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.666 [INFO][4466] ipam.go 155: Attempting to load block cidr=192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.674 [INFO][4466] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.674 [INFO][4466] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.192/26 handle="k8s-pod-network.d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" host="ip-172-31-27-162" Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.679 [INFO][4466] ipam.go 1682: Creating new handle: k8s-pod-network.d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.685 [INFO][4466] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.192/26 handle="k8s-pod-network.d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" host="ip-172-31-27-162" Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.693 [INFO][4466] ipam.go 1216: Successfully claimed IPs: [192.168.123.196/26] block=192.168.123.192/26 handle="k8s-pod-network.d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" host="ip-172-31-27-162" Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.693 [INFO][4466] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.196/26] handle="k8s-pod-network.d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" host="ip-172-31-27-162" Oct 2 19:08:56.754685 env[1553]: time="2023-10-02T19:08:56Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:56.754685 env[1553]: 2023-10-02 19:08:56.693 [INFO][4466] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.123.196/26] IPv6=[] ContainerID="d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" HandleID="k8s-pod-network.d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:08:56.762460 env[1553]: 2023-10-02 19:08:56.696 [INFO][4449] k8s.go 383: Populated endpoint ContainerID="d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" Namespace="kube-system" Pod="coredns-787d4945fb-fhxq5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"45f7a44b-baf9-4662-ae23-0d419c416bf2", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"", Pod:"coredns-787d4945fb-fhxq5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie74e5cbcbda", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:56.762460 env[1553]: 2023-10-02 19:08:56.697 [INFO][4449] k8s.go 384: Calico CNI using IPs: [192.168.123.196/32] ContainerID="d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" Namespace="kube-system" Pod="coredns-787d4945fb-fhxq5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:08:56.762460 env[1553]: 2023-10-02 19:08:56.697 [INFO][4449] dataplane_linux.go 68: Setting the host side veth name to calie74e5cbcbda ContainerID="d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" Namespace="kube-system" Pod="coredns-787d4945fb-fhxq5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:08:56.762460 env[1553]: 2023-10-02 19:08:56.704 [INFO][4449] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" Namespace="kube-system" Pod="coredns-787d4945fb-fhxq5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:08:56.762460 env[1553]: 2023-10-02 19:08:56.722 [INFO][4449] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" Namespace="kube-system" Pod="coredns-787d4945fb-fhxq5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"45f7a44b-baf9-4662-ae23-0d419c416bf2", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b", Pod:"coredns-787d4945fb-fhxq5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie74e5cbcbda", MAC:"02:4e:99:36:a8:cf", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:56.762460 env[1553]: 2023-10-02 19:08:56.751 [INFO][4449] k8s.go 489: Wrote updated endpoint to datastore ContainerID="d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b" Namespace="kube-system" Pod="coredns-787d4945fb-fhxq5" WorkloadEndpoint="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:08:56.854000 audit[4495]: NETFILTER_CFG table=filter:122 family=2 entries=34 op=nft_register_chain pid=4495 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:56.854000 audit[4495]: SYSCALL arch=c000003e syscall=46 success=yes exit=17884 a0=3 a1=7ffdc25f05b0 a2=0 a3=7ffdc25f059c items=0 ppid=3774 pid=4495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.854000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:56.867445 env[1553]: time="2023-10-02T19:08:56.854738989Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:56.867445 env[1553]: time="2023-10-02T19:08:56.854848822Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:56.867445 env[1553]: time="2023-10-02T19:08:56.854949148Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:56.867445 env[1553]: time="2023-10-02T19:08:56.855482837Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b pid=4494 runtime=io.containerd.runc.v2 Oct 2 19:08:56.895782 systemd[1]: run-netns-cni\x2d9b4a2e73\x2da7bb\x2da547\x2d918b\x2d3c34ae458f3f.mount: Deactivated successfully. Oct 2 19:08:56.934668 systemd[1]: Started cri-containerd-d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b.scope. Oct 2 19:08:56.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.976000 audit: BPF prog-id=168 op=LOAD Oct 2 19:08:56.978000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.978000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4494 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653466646638323738613531626237303131623364323936353364 Oct 2 19:08:56.979000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.979000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4494 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653466646638323738613531626237303131623364323936353364 Oct 2 19:08:56.979000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.979000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.979000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.979000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.979000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.979000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.979000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.979000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.979000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.979000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.979000 audit: BPF prog-id=169 op=LOAD Oct 2 19:08:56.979000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000399220 items=0 ppid=4494 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653466646638323738613531626237303131623364323936353364 Oct 2 19:08:56.981000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.981000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.981000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.981000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.981000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.981000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.981000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.981000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.981000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.981000 audit: BPF prog-id=170 op=LOAD Oct 2 19:08:56.981000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000399268 items=0 ppid=4494 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653466646638323738613531626237303131623364323936353364 Oct 2 19:08:56.982000 audit: BPF prog-id=170 op=UNLOAD Oct 2 19:08:56.982000 audit: BPF prog-id=169 op=UNLOAD Oct 2 19:08:56.982000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.982000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.982000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.982000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.982000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.982000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.982000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.982000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.982000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.982000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.982000 audit: BPF prog-id=171 op=LOAD Oct 2 19:08:56.982000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000399678 items=0 ppid=4494 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653466646638323738613531626237303131623364323936353364 Oct 2 19:08:57.062094 env[1553]: time="2023-10-02T19:08:57.062043049Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-fhxq5,Uid:45f7a44b-baf9-4662-ae23-0d419c416bf2,Namespace:kube-system,Attempt:1,} returns sandbox id \"d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b\"" Oct 2 19:08:57.073767 env[1553]: time="2023-10-02T19:08:57.073712044Z" level=info msg="CreateContainer within sandbox \"d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:08:57.100809 env[1553]: time="2023-10-02T19:08:57.100756679Z" level=info msg="CreateContainer within sandbox \"d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6528ff131918fe5d0d5e6afb33ac29bd64c0c27d2462646607aafdc3e44a5866\"" Oct 2 19:08:57.102255 env[1553]: time="2023-10-02T19:08:57.102095683Z" level=info msg="StartContainer for \"6528ff131918fe5d0d5e6afb33ac29bd64c0c27d2462646607aafdc3e44a5866\"" Oct 2 19:08:57.103106 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3489994142.mount: Deactivated successfully. Oct 2 19:08:57.162953 systemd[1]: Started cri-containerd-6528ff131918fe5d0d5e6afb33ac29bd64c0c27d2462646607aafdc3e44a5866.scope. Oct 2 19:08:57.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.209000 audit: BPF prog-id=172 op=LOAD Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4494 pid=4533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:57.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635323866663133313931386665356430643565366166623333616332 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4494 pid=4533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:57.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635323866663133313931386665356430643565366166623333616332 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit: BPF prog-id=173 op=LOAD Oct 2 19:08:57.210000 audit[4533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001afbe0 items=0 ppid=4494 pid=4533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:57.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635323866663133313931386665356430643565366166623333616332 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit: BPF prog-id=174 op=LOAD Oct 2 19:08:57.210000 audit[4533]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001afc28 items=0 ppid=4494 pid=4533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:57.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635323866663133313931386665356430643565366166623333616332 Oct 2 19:08:57.210000 audit: BPF prog-id=174 op=UNLOAD Oct 2 19:08:57.210000 audit: BPF prog-id=173 op=UNLOAD Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { perfmon } for pid=4533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit[4533]: AVC avc: denied { bpf } for pid=4533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:57.210000 audit: BPF prog-id=175 op=LOAD Oct 2 19:08:57.210000 audit[4533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000238038 items=0 ppid=4494 pid=4533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:57.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635323866663133313931386665356430643565366166623333616332 Oct 2 19:08:57.250744 env[1553]: time="2023-10-02T19:08:57.250633317Z" level=info msg="StartContainer for \"6528ff131918fe5d0d5e6afb33ac29bd64c0c27d2462646607aafdc3e44a5866\" returns successfully" Oct 2 19:08:58.243077 kubelet[2689]: I1002 19:08:58.243044 2689 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-fhxq5" podStartSLOduration=39.242980382 pod.CreationTimestamp="2023-10-02 19:08:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:08:58.211078986 +0000 UTC m=+52.862799861" watchObservedRunningTime="2023-10-02 19:08:58.242980382 +0000 UTC m=+52.894701257" Oct 2 19:08:58.316818 env[1553]: time="2023-10-02T19:08:58.316768291Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:58.322923 env[1553]: time="2023-10-02T19:08:58.322878014Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:58.328729 env[1553]: time="2023-10-02T19:08:58.328683019Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:58.334693 env[1553]: time="2023-10-02T19:08:58.334645268Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:58.337996 env[1553]: time="2023-10-02T19:08:58.337861555Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 19:08:58.349527 env[1553]: time="2023-10-02T19:08:58.349396301Z" level=info msg="CreateContainer within sandbox \"b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:08:58.376913 env[1553]: time="2023-10-02T19:08:58.376707703Z" level=info msg="CreateContainer within sandbox \"b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d\"" Oct 2 19:08:58.378181 env[1553]: time="2023-10-02T19:08:58.378143130Z" level=info msg="StartContainer for \"6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d\"" Oct 2 19:08:58.405721 kernel: kauditd_printk_skb: 356 callbacks suppressed Oct 2 19:08:58.406329 kernel: audit: type=1325 audit(1696273738.398:1331): table=filter:123 family=2 entries=6 op=nft_register_rule pid=4595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:58.398000 audit[4595]: NETFILTER_CFG table=filter:123 family=2 entries=6 op=nft_register_rule pid=4595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:58.398000 audit[4595]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe77d77bb0 a2=0 a3=7ffe77d77b9c items=0 ppid=2882 pid=4595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.415273 kernel: audit: type=1300 audit(1696273738.398:1331): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe77d77bb0 a2=0 a3=7ffe77d77b9c items=0 ppid=2882 pid=4595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.415344 systemd[1]: Started cri-containerd-6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d.scope. Oct 2 19:08:58.398000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:58.456060 kernel: audit: type=1327 audit(1696273738.398:1331): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:58.451000 audit[4595]: NETFILTER_CFG table=nat:124 family=2 entries=60 op=nft_register_rule pid=4595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:58.462405 kernel: audit: type=1325 audit(1696273738.451:1332): table=nat:124 family=2 entries=60 op=nft_register_rule pid=4595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:58.451000 audit[4595]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffe77d77bb0 a2=0 a3=7ffe77d77b9c items=0 ppid=2882 pid=4595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.473450 kernel: audit: type=1300 audit(1696273738.451:1332): arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffe77d77bb0 a2=0 a3=7ffe77d77b9c items=0 ppid=2882 pid=4595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.473782 kernel: audit: type=1327 audit(1696273738.451:1332): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:58.451000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:58.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.522097 kernel: audit: type=1400 audit(1696273738.508:1333): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.522290 kernel: audit: type=1400 audit(1696273738.508:1334): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.536865 kernel: audit: type=1400 audit(1696273738.508:1335): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.537070 kernel: audit: type=1400 audit(1696273738.508:1336): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.508000 audit: BPF prog-id=176 op=LOAD Oct 2 19:08:58.511000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.511000 audit[4596]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4333 pid=4596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630323963376633643636623664303534303937346132303263383764 Oct 2 19:08:58.511000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.511000 audit[4596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4333 pid=4596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630323963376633643636623664303534303937346132303263383764 Oct 2 19:08:58.511000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.511000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.511000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.511000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.511000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.511000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.511000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.511000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.511000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.511000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.511000 audit: BPF prog-id=177 op=LOAD Oct 2 19:08:58.511000 audit[4596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000380950 items=0 ppid=4333 pid=4596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630323963376633643636623664303534303937346132303263383764 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit: BPF prog-id=178 op=LOAD Oct 2 19:08:58.521000 audit[4596]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000380998 items=0 ppid=4333 pid=4596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630323963376633643636623664303534303937346132303263383764 Oct 2 19:08:58.521000 audit: BPF prog-id=178 op=UNLOAD Oct 2 19:08:58.521000 audit: BPF prog-id=177 op=UNLOAD Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { perfmon } for pid=4596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit[4596]: AVC avc: denied { bpf } for pid=4596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.521000 audit: BPF prog-id=179 op=LOAD Oct 2 19:08:58.521000 audit[4596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000380da8 items=0 ppid=4333 pid=4596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630323963376633643636623664303534303937346132303263383764 Oct 2 19:08:58.595658 env[1553]: time="2023-10-02T19:08:58.595575897Z" level=info msg="StartContainer for \"6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d\" returns successfully" Oct 2 19:08:58.617000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:58.617000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:58.617000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000f657c0 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:08:58.617000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:58.617000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017cfb30 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:08:58.617000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:58.676000 audit[4651]: NETFILTER_CFG table=filter:125 family=2 entries=6 op=nft_register_rule pid=4651 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:58.676000 audit[4651]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe345cc070 a2=0 a3=7ffe345cc05c items=0 ppid=2882 pid=4651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.676000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:58.688000 audit[4651]: NETFILTER_CFG table=nat:126 family=2 entries=72 op=nft_register_chain pid=4651 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:58.688000 audit[4651]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe345cc070 a2=0 a3=7ffe345cc05c items=0 ppid=2882 pid=4651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.688000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:58.773794 systemd-networkd[1368]: calie74e5cbcbda: Gained IPv6LL Oct 2 19:08:58.886286 systemd[1]: run-containerd-runc-k8s.io-6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d-runc.NMKYWz.mount: Deactivated successfully. Oct 2 19:08:59.246700 systemd[1]: run-containerd-runc-k8s.io-6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d-runc.VKCEp0.mount: Deactivated successfully. Oct 2 19:08:59.307909 kubelet[2689]: I1002 19:08:59.307870 2689 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-69c848ddc6-fwbr7" podStartSLOduration=-9.223372002546957e+09 pod.CreationTimestamp="2023-10-02 19:08:25 +0000 UTC" firstStartedPulling="2023-10-02 19:08:54.649254164 +0000 UTC m=+49.300975031" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:08:59.237303599 +0000 UTC m=+53.889024477" watchObservedRunningTime="2023-10-02 19:08:59.307818311 +0000 UTC m=+53.959539187" Oct 2 19:08:59.885473 systemd[1]: run-containerd-runc-k8s.io-6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d-runc.CCdbZ5.mount: Deactivated successfully. Oct 2 19:09:01.443000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:01.443000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0127160c0 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:09:01.443000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:01.443000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:01.443000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0027c6840 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:09:01.443000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:01.447000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:01.447000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c012716180 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:09:01.447000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:01.516000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:01.516000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0127162d0 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:09:01.516000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:01.532000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:01.532000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:01.532000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c002778720 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:09:01.532000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:01.532000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c012333b00 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:09:01.532000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:04.233539 systemd[1]: Started sshd@7-172.31.27.162:22-139.178.89.65:33206.service. Oct 2 19:09:04.241242 kernel: kauditd_printk_skb: 83 callbacks suppressed Oct 2 19:09:04.241384 kernel: audit: type=1130 audit(1696273744.233:1361): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.162:22-139.178.89.65:33206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:04.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.162:22-139.178.89.65:33206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:04.445491 sshd[4701]: Accepted publickey for core from 139.178.89.65 port 33206 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:04.444000 audit[4701]: USER_ACCT pid=4701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:04.455391 kernel: audit: type=1101 audit(1696273744.444:1362): pid=4701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:04.455000 audit[4701]: CRED_ACQ pid=4701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:04.469178 kernel: audit: type=1103 audit(1696273744.455:1363): pid=4701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:04.469452 kernel: audit: type=1006 audit(1696273744.455:1364): pid=4701 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Oct 2 19:09:04.469740 sshd[4701]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:04.455000 audit[4701]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeea4eb220 a2=3 a3=0 items=0 ppid=1 pid=4701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:04.479593 kernel: audit: type=1300 audit(1696273744.455:1364): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeea4eb220 a2=3 a3=0 items=0 ppid=1 pid=4701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:04.455000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:04.484273 kernel: audit: type=1327 audit(1696273744.455:1364): proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:04.491760 systemd-logind[1543]: New session 8 of user core. Oct 2 19:09:04.493729 systemd[1]: Started session-8.scope. Oct 2 19:09:04.513000 audit[4701]: USER_START pid=4701 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:04.523515 kernel: audit: type=1105 audit(1696273744.513:1365): pid=4701 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:04.532249 kernel: audit: type=1103 audit(1696273744.522:1366): pid=4711 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:04.522000 audit[4711]: CRED_ACQ pid=4711 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:05.059147 sshd[4701]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:05.071832 kernel: audit: type=1106 audit(1696273745.060:1367): pid=4701 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:05.060000 audit[4701]: USER_END pid=4701 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:05.070580 systemd[1]: sshd@7-172.31.27.162:22-139.178.89.65:33206.service: Deactivated successfully. Oct 2 19:09:05.073489 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:09:05.074814 systemd-logind[1543]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:09:05.076238 systemd-logind[1543]: Removed session 8. Oct 2 19:09:05.060000 audit[4701]: CRED_DISP pid=4701 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:05.083441 kernel: audit: type=1104 audit(1696273745.060:1368): pid=4701 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:05.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.162:22-139.178.89.65:33206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:05.468371 kubelet[2689]: I1002 19:09:05.468252 2689 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:09:05.479326 systemd[1]: Created slice kubepods-besteffort-pod5ffcebc4_e54f_4075_a6f5_84fc6b79a087.slice. Oct 2 19:09:05.511360 kubelet[2689]: I1002 19:09:05.511169 2689 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:09:05.521310 systemd[1]: Created slice kubepods-besteffort-pod35566a51_2907_4613_92de_25cabd8c7231.slice. Oct 2 19:09:05.529384 kubelet[2689]: I1002 19:09:05.529355 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5ffcebc4-e54f-4075-a6f5-84fc6b79a087-calico-apiserver-certs\") pod \"calico-apiserver-865b75d78d-np9wn\" (UID: \"5ffcebc4-e54f-4075-a6f5-84fc6b79a087\") " pod="calico-apiserver/calico-apiserver-865b75d78d-np9wn" Oct 2 19:09:05.529849 kubelet[2689]: I1002 19:09:05.529831 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t4dks\" (UniqueName: \"kubernetes.io/projected/5ffcebc4-e54f-4075-a6f5-84fc6b79a087-kube-api-access-t4dks\") pod \"calico-apiserver-865b75d78d-np9wn\" (UID: \"5ffcebc4-e54f-4075-a6f5-84fc6b79a087\") " pod="calico-apiserver/calico-apiserver-865b75d78d-np9wn" Oct 2 19:09:05.574493 env[1553]: time="2023-10-02T19:09:05.574449183Z" level=info msg="StopPodSandbox for \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\"" Oct 2 19:09:05.631244 kubelet[2689]: I1002 19:09:05.631129 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/35566a51-2907-4613-92de-25cabd8c7231-calico-apiserver-certs\") pod \"calico-apiserver-865b75d78d-wxp7q\" (UID: \"35566a51-2907-4613-92de-25cabd8c7231\") " pod="calico-apiserver/calico-apiserver-865b75d78d-wxp7q" Oct 2 19:09:05.631624 kubelet[2689]: I1002 19:09:05.631606 2689 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vnw9w\" (UniqueName: \"kubernetes.io/projected/35566a51-2907-4613-92de-25cabd8c7231-kube-api-access-vnw9w\") pod \"calico-apiserver-865b75d78d-wxp7q\" (UID: \"35566a51-2907-4613-92de-25cabd8c7231\") " pod="calico-apiserver/calico-apiserver-865b75d78d-wxp7q" Oct 2 19:09:05.645341 kubelet[2689]: E1002 19:09:05.645285 2689 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Oct 2 19:09:05.646407 kubelet[2689]: E1002 19:09:05.646308 2689 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/5ffcebc4-e54f-4075-a6f5-84fc6b79a087-calico-apiserver-certs podName:5ffcebc4-e54f-4075-a6f5-84fc6b79a087 nodeName:}" failed. No retries permitted until 2023-10-02 19:09:06.145635828 +0000 UTC m=+60.797356694 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/5ffcebc4-e54f-4075-a6f5-84fc6b79a087-calico-apiserver-certs") pod "calico-apiserver-865b75d78d-np9wn" (UID: "5ffcebc4-e54f-4075-a6f5-84fc6b79a087") : secret "calico-apiserver-certs" not found Oct 2 19:09:05.732741 kubelet[2689]: E1002 19:09:05.732633 2689 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Oct 2 19:09:05.733004 kubelet[2689]: E1002 19:09:05.732987 2689 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/35566a51-2907-4613-92de-25cabd8c7231-calico-apiserver-certs podName:35566a51-2907-4613-92de-25cabd8c7231 nodeName:}" failed. No retries permitted until 2023-10-02 19:09:06.232964094 +0000 UTC m=+60.884684962 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/35566a51-2907-4613-92de-25cabd8c7231-calico-apiserver-certs") pod "calico-apiserver-865b75d78d-wxp7q" (UID: "35566a51-2907-4613-92de-25cabd8c7231") : secret "calico-apiserver-certs" not found Oct 2 19:09:05.848264 env[1553]: 2023-10-02 19:09:05.719 [WARNING][4740] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"8ad2c188-b599-42c8-80c6-aa9e317ad7cd", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931", Pod:"calico-kube-controllers-69c848ddc6-fwbr7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.123.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali594947269dc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:05.848264 env[1553]: 2023-10-02 19:09:05.720 [INFO][4740] k8s.go 576: Cleaning up netns ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Oct 2 19:09:05.848264 env[1553]: 2023-10-02 19:09:05.720 [INFO][4740] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" iface="eth0" netns="" Oct 2 19:09:05.848264 env[1553]: 2023-10-02 19:09:05.720 [INFO][4740] k8s.go 583: Releasing IP address(es) ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Oct 2 19:09:05.848264 env[1553]: 2023-10-02 19:09:05.720 [INFO][4740] utils.go 196: Calico CNI releasing IP address ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Oct 2 19:09:05.848264 env[1553]: 2023-10-02 19:09:05.816 [INFO][4762] ipam_plugin.go 416: Releasing address using handleID ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" HandleID="k8s-pod-network.a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Workload="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:09:05.848264 env[1553]: time="2023-10-02T19:09:05Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:05.848264 env[1553]: time="2023-10-02T19:09:05Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:05.848264 env[1553]: 2023-10-02 19:09:05.839 [WARNING][4762] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" HandleID="k8s-pod-network.a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Workload="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:09:05.848264 env[1553]: 2023-10-02 19:09:05.839 [INFO][4762] ipam_plugin.go 444: Releasing address using workloadID ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" HandleID="k8s-pod-network.a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Workload="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:09:05.848264 env[1553]: time="2023-10-02T19:09:05Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:05.848264 env[1553]: 2023-10-02 19:09:05.844 [INFO][4740] k8s.go 589: Teardown processing complete. ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Oct 2 19:09:05.849187 env[1553]: time="2023-10-02T19:09:05.848309712Z" level=info msg="TearDown network for sandbox \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\" successfully" Oct 2 19:09:05.849187 env[1553]: time="2023-10-02T19:09:05.848346038Z" level=info msg="StopPodSandbox for \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\" returns successfully" Oct 2 19:09:05.849187 env[1553]: time="2023-10-02T19:09:05.849081539Z" level=info msg="RemovePodSandbox for \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\"" Oct 2 19:09:05.849187 env[1553]: time="2023-10-02T19:09:05.849124643Z" level=info msg="Forcibly stopping sandbox \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\"" Oct 2 19:09:05.897000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:05.897000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026d0aa0 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:09:05.897000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:05.906000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:05.906000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026d0ac0 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:09:05.906000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:05.915000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:05.916000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:05.915000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001d93920 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:09:05.915000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:05.916000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0026d0be0 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:09:05.916000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:05.981522 systemd[1]: run-containerd-runc-k8s.io-b37ee9cbe9157565090298c0dfffece6df73d37fefa82e2d7979dc523454e319-runc.cyuf0j.mount: Deactivated successfully. Oct 2 19:09:05.985000 audit[4799]: NETFILTER_CFG table=filter:127 family=2 entries=7 op=nft_register_rule pid=4799 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:05.985000 audit[4799]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffda0140540 a2=0 a3=7ffda014052c items=0 ppid=2882 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:05.985000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:06.061000 audit[4799]: NETFILTER_CFG table=nat:128 family=2 entries=78 op=nft_register_rule pid=4799 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:06.061000 audit[4799]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffda0140540 a2=0 a3=7ffda014052c items=0 ppid=2882 pid=4799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.061000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:06.119261 env[1553]: 2023-10-02 19:09:05.973 [WARNING][4793] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"8ad2c188-b599-42c8-80c6-aa9e317ad7cd", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"b9a633ff9142018011cfb941ae3fbccf5ec719917a9d30446a1b1dab13031931", Pod:"calico-kube-controllers-69c848ddc6-fwbr7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.123.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali594947269dc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:06.119261 env[1553]: 2023-10-02 19:09:05.974 [INFO][4793] k8s.go 576: Cleaning up netns ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Oct 2 19:09:06.119261 env[1553]: 2023-10-02 19:09:05.974 [INFO][4793] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" iface="eth0" netns="" Oct 2 19:09:06.119261 env[1553]: 2023-10-02 19:09:05.974 [INFO][4793] k8s.go 583: Releasing IP address(es) ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Oct 2 19:09:06.119261 env[1553]: 2023-10-02 19:09:05.974 [INFO][4793] utils.go 196: Calico CNI releasing IP address ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Oct 2 19:09:06.119261 env[1553]: 2023-10-02 19:09:06.078 [INFO][4811] ipam_plugin.go 416: Releasing address using handleID ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" HandleID="k8s-pod-network.a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Workload="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:09:06.119261 env[1553]: time="2023-10-02T19:09:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:06.119261 env[1553]: time="2023-10-02T19:09:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:06.119261 env[1553]: 2023-10-02 19:09:06.107 [WARNING][4811] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" HandleID="k8s-pod-network.a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Workload="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:09:06.119261 env[1553]: 2023-10-02 19:09:06.107 [INFO][4811] ipam_plugin.go 444: Releasing address using workloadID ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" HandleID="k8s-pod-network.a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Workload="ip--172--31--27--162-k8s-calico--kube--controllers--69c848ddc6--fwbr7-eth0" Oct 2 19:09:06.119261 env[1553]: time="2023-10-02T19:09:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:06.119261 env[1553]: 2023-10-02 19:09:06.117 [INFO][4793] k8s.go 589: Teardown processing complete. ContainerID="a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003" Oct 2 19:09:06.120569 env[1553]: time="2023-10-02T19:09:06.119310580Z" level=info msg="TearDown network for sandbox \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\" successfully" Oct 2 19:09:06.139907 env[1553]: time="2023-10-02T19:09:06.139853889Z" level=info msg="RemovePodSandbox \"a594f02e92e430e3115d13742f9d215f578d55de3f198468c87f07ea63891003\" returns successfully" Oct 2 19:09:06.141408 env[1553]: time="2023-10-02T19:09:06.141191494Z" level=info msg="StopPodSandbox for \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\"" Oct 2 19:09:06.381652 env[1553]: 2023-10-02 19:09:06.272 [WARNING][4842] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e4104074-c237-4645-96b6-bc09192177f7", ResourceVersion:"706", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c", Pod:"csi-node-driver-nnw9l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.123.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2ce2870a855", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:06.381652 env[1553]: 2023-10-02 19:09:06.272 [INFO][4842] k8s.go 576: Cleaning up netns ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Oct 2 19:09:06.381652 env[1553]: 2023-10-02 19:09:06.272 [INFO][4842] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" iface="eth0" netns="" Oct 2 19:09:06.381652 env[1553]: 2023-10-02 19:09:06.272 [INFO][4842] k8s.go 583: Releasing IP address(es) ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Oct 2 19:09:06.381652 env[1553]: 2023-10-02 19:09:06.272 [INFO][4842] utils.go 196: Calico CNI releasing IP address ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Oct 2 19:09:06.381652 env[1553]: 2023-10-02 19:09:06.356 [INFO][4862] ipam_plugin.go 416: Releasing address using handleID ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" HandleID="k8s-pod-network.a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Workload="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:09:06.381652 env[1553]: time="2023-10-02T19:09:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:06.381652 env[1553]: time="2023-10-02T19:09:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:06.381652 env[1553]: 2023-10-02 19:09:06.374 [WARNING][4862] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" HandleID="k8s-pod-network.a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Workload="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:09:06.381652 env[1553]: 2023-10-02 19:09:06.374 [INFO][4862] ipam_plugin.go 444: Releasing address using workloadID ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" HandleID="k8s-pod-network.a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Workload="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:09:06.381652 env[1553]: time="2023-10-02T19:09:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:06.381652 env[1553]: 2023-10-02 19:09:06.379 [INFO][4842] k8s.go 589: Teardown processing complete. ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Oct 2 19:09:06.382502 env[1553]: time="2023-10-02T19:09:06.381702074Z" level=info msg="TearDown network for sandbox \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\" successfully" Oct 2 19:09:06.382502 env[1553]: time="2023-10-02T19:09:06.381739967Z" level=info msg="StopPodSandbox for \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\" returns successfully" Oct 2 19:09:06.384460 env[1553]: time="2023-10-02T19:09:06.384399093Z" level=info msg="RemovePodSandbox for \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\"" Oct 2 19:09:06.384598 env[1553]: time="2023-10-02T19:09:06.384462629Z" level=info msg="Forcibly stopping sandbox \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\"" Oct 2 19:09:06.385997 env[1553]: time="2023-10-02T19:09:06.385957679Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-865b75d78d-np9wn,Uid:5ffcebc4-e54f-4075-a6f5-84fc6b79a087,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:09:06.429007 env[1553]: time="2023-10-02T19:09:06.428953922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-865b75d78d-wxp7q,Uid:35566a51-2907-4613-92de-25cabd8c7231,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:09:06.810093 env[1553]: 2023-10-02 19:09:06.570 [WARNING][4889] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e4104074-c237-4645-96b6-bc09192177f7", ResourceVersion:"706", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"f7d28f2f39a55a3b6ab662a25936590277352920c281e7591373a42ba295dc7c", Pod:"csi-node-driver-nnw9l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.123.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2ce2870a855", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:06.810093 env[1553]: 2023-10-02 19:09:06.571 [INFO][4889] k8s.go 576: Cleaning up netns ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Oct 2 19:09:06.810093 env[1553]: 2023-10-02 19:09:06.571 [INFO][4889] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" iface="eth0" netns="" Oct 2 19:09:06.810093 env[1553]: 2023-10-02 19:09:06.571 [INFO][4889] k8s.go 583: Releasing IP address(es) ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Oct 2 19:09:06.810093 env[1553]: 2023-10-02 19:09:06.571 [INFO][4889] utils.go 196: Calico CNI releasing IP address ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Oct 2 19:09:06.810093 env[1553]: 2023-10-02 19:09:06.751 [INFO][4919] ipam_plugin.go 416: Releasing address using handleID ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" HandleID="k8s-pod-network.a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Workload="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:09:06.810093 env[1553]: time="2023-10-02T19:09:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:06.810093 env[1553]: time="2023-10-02T19:09:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:06.810093 env[1553]: 2023-10-02 19:09:06.800 [WARNING][4919] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" HandleID="k8s-pod-network.a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Workload="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:09:06.810093 env[1553]: 2023-10-02 19:09:06.800 [INFO][4919] ipam_plugin.go 444: Releasing address using workloadID ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" HandleID="k8s-pod-network.a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Workload="ip--172--31--27--162-k8s-csi--node--driver--nnw9l-eth0" Oct 2 19:09:06.810093 env[1553]: time="2023-10-02T19:09:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:06.810093 env[1553]: 2023-10-02 19:09:06.806 [INFO][4889] k8s.go 589: Teardown processing complete. ContainerID="a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8" Oct 2 19:09:06.810093 env[1553]: time="2023-10-02T19:09:06.808596881Z" level=info msg="TearDown network for sandbox \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\" successfully" Oct 2 19:09:06.816296 env[1553]: time="2023-10-02T19:09:06.814177688Z" level=info msg="RemovePodSandbox \"a07758e540d81633de3925149d1b8dd4e6a75d697c92bf62f60e7483ed4e33c8\" returns successfully" Oct 2 19:09:06.816296 env[1553]: time="2023-10-02T19:09:06.814954443Z" level=info msg="StopPodSandbox for \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\"" Oct 2 19:09:06.894979 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:09:06.895140 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia0f5da5194e: link becomes ready Oct 2 19:09:06.904384 systemd-networkd[1368]: calia0f5da5194e: Link UP Oct 2 19:09:06.904394 systemd-networkd[1368]: calia0f5da5194e: Gained carrier Oct 2 19:09:06.906000 audit[4966]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=4966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:06.913458 (udev-worker)[4967]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:09:06.906000 audit[4966]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff7af282b0 a2=0 a3=7fff7af2829c items=0 ppid=2882 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.906000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:06.924000 audit[4966]: NETFILTER_CFG table=nat:130 family=2 entries=78 op=nft_register_rule pid=4966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.593 [INFO][4890] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--np9wn-eth0 calico-apiserver-865b75d78d- calico-apiserver 5ffcebc4-e54f-4075-a6f5-84fc6b79a087 833 0 2023-10-02 19:09:05 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:865b75d78d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-27-162 calico-apiserver-865b75d78d-np9wn eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia0f5da5194e [] []}} ContainerID="32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-np9wn" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--np9wn-" Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.594 [INFO][4890] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-np9wn" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--np9wn-eth0" Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.813 [INFO][4926] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" HandleID="k8s-pod-network.32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" Workload="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--np9wn-eth0" Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.832 [INFO][4926] ipam_plugin.go 269: Auto assigning IP ContainerID="32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" HandleID="k8s-pod-network.32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" Workload="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--np9wn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a3e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-27-162", "pod":"calico-apiserver-865b75d78d-np9wn", "timestamp":"2023-10-02 19:09:06.812916557 +0000 UTC"}, Hostname:"ip-172-31-27-162", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:09:06.929483 env[1553]: time="2023-10-02T19:09:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:06.929483 env[1553]: time="2023-10-02T19:09:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.832 [INFO][4926] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-162' Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.836 [INFO][4926] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" host="ip-172-31-27-162" Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.842 [INFO][4926] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-162" Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.854 [INFO][4926] ipam.go 489: Trying affinity for 192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.858 [INFO][4926] ipam.go 155: Attempting to load block cidr=192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.861 [INFO][4926] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.861 [INFO][4926] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.192/26 handle="k8s-pod-network.32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" host="ip-172-31-27-162" Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.866 [INFO][4926] ipam.go 1682: Creating new handle: k8s-pod-network.32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3 Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.873 [INFO][4926] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.192/26 handle="k8s-pod-network.32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" host="ip-172-31-27-162" Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.885 [INFO][4926] ipam.go 1216: Successfully claimed IPs: [192.168.123.197/26] block=192.168.123.192/26 handle="k8s-pod-network.32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" host="ip-172-31-27-162" Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.885 [INFO][4926] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.197/26] handle="k8s-pod-network.32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" host="ip-172-31-27-162" Oct 2 19:09:06.929483 env[1553]: time="2023-10-02T19:09:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:06.929483 env[1553]: 2023-10-02 19:09:06.886 [INFO][4926] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.123.197/26] IPv6=[] ContainerID="32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" HandleID="k8s-pod-network.32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" Workload="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--np9wn-eth0" Oct 2 19:09:06.931138 env[1553]: 2023-10-02 19:09:06.888 [INFO][4890] k8s.go 383: Populated endpoint ContainerID="32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-np9wn" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--np9wn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--np9wn-eth0", GenerateName:"calico-apiserver-865b75d78d-", Namespace:"calico-apiserver", SelfLink:"", UID:"5ffcebc4-e54f-4075-a6f5-84fc6b79a087", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"865b75d78d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"", Pod:"calico-apiserver-865b75d78d-np9wn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.123.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia0f5da5194e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:06.931138 env[1553]: 2023-10-02 19:09:06.888 [INFO][4890] k8s.go 384: Calico CNI using IPs: [192.168.123.197/32] ContainerID="32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-np9wn" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--np9wn-eth0" Oct 2 19:09:06.931138 env[1553]: 2023-10-02 19:09:06.888 [INFO][4890] dataplane_linux.go 68: Setting the host side veth name to calia0f5da5194e ContainerID="32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-np9wn" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--np9wn-eth0" Oct 2 19:09:06.931138 env[1553]: 2023-10-02 19:09:06.895 [INFO][4890] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-np9wn" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--np9wn-eth0" Oct 2 19:09:06.931138 env[1553]: 2023-10-02 19:09:06.903 [INFO][4890] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-np9wn" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--np9wn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--np9wn-eth0", GenerateName:"calico-apiserver-865b75d78d-", Namespace:"calico-apiserver", SelfLink:"", UID:"5ffcebc4-e54f-4075-a6f5-84fc6b79a087", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"865b75d78d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3", Pod:"calico-apiserver-865b75d78d-np9wn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.123.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia0f5da5194e", MAC:"26:42:4d:48:d5:f6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:06.931138 env[1553]: 2023-10-02 19:09:06.923 [INFO][4890] k8s.go 489: Wrote updated endpoint to datastore ContainerID="32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-np9wn" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--np9wn-eth0" Oct 2 19:09:06.924000 audit[4966]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff7af282b0 a2=0 a3=7fff7af2829c items=0 ppid=2882 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.924000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:06.996929 env[1553]: time="2023-10-02T19:09:06.996833087Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:06.997121 env[1553]: time="2023-10-02T19:09:06.996945111Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:06.997121 env[1553]: time="2023-10-02T19:09:06.996974238Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:06.997264 env[1553]: time="2023-10-02T19:09:06.997155555Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3 pid=4988 runtime=io.containerd.runc.v2 Oct 2 19:09:07.049238 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7c1229322dd: link becomes ready Oct 2 19:09:07.069028 systemd-networkd[1368]: cali7c1229322dd: Link UP Oct 2 19:09:07.069037 systemd-networkd[1368]: cali7c1229322dd: Gained carrier Oct 2 19:09:07.078865 systemd[1]: Started cri-containerd-32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3.scope. Oct 2 19:09:07.124143 systemd[1]: run-containerd-runc-k8s.io-32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3-runc.6uDH5w.mount: Deactivated successfully. Oct 2 19:09:07.129000 audit[5012]: NETFILTER_CFG table=filter:131 family=2 entries=55 op=nft_register_chain pid=5012 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:07.129000 audit[5012]: SYSCALL arch=c000003e syscall=46 success=yes exit=28088 a0=3 a1=7ffc1bac4120 a2=0 a3=7ffc1bac410c items=0 ppid=3774 pid=5012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.129000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:06.716 [INFO][4907] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--wxp7q-eth0 calico-apiserver-865b75d78d- calico-apiserver 35566a51-2907-4613-92de-25cabd8c7231 838 0 2023-10-02 19:09:05 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:865b75d78d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-27-162 calico-apiserver-865b75d78d-wxp7q eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7c1229322dd [] []}} ContainerID="c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-wxp7q" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--wxp7q-" Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:06.716 [INFO][4907] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-wxp7q" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--wxp7q-eth0" Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:06.878 [INFO][4935] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" HandleID="k8s-pod-network.c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" Workload="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--wxp7q-eth0" Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:06.917 [INFO][4935] ipam_plugin.go 269: Auto assigning IP ContainerID="c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" HandleID="k8s-pod-network.c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" Workload="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--wxp7q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00071d340), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-27-162", "pod":"calico-apiserver-865b75d78d-wxp7q", "timestamp":"2023-10-02 19:09:06.878369707 +0000 UTC"}, Hostname:"ip-172-31-27-162", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:09:07.142361 env[1553]: time="2023-10-02T19:09:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:07.142361 env[1553]: time="2023-10-02T19:09:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:06.917 [INFO][4935] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-162' Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:06.932 [INFO][4935] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" host="ip-172-31-27-162" Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:06.950 [INFO][4935] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-162" Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:06.977 [INFO][4935] ipam.go 489: Trying affinity for 192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:06.982 [INFO][4935] ipam.go 155: Attempting to load block cidr=192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:06.996 [INFO][4935] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.123.192/26 host="ip-172-31-27-162" Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:06.996 [INFO][4935] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.123.192/26 handle="k8s-pod-network.c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" host="ip-172-31-27-162" Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:07.014 [INFO][4935] ipam.go 1682: Creating new handle: k8s-pod-network.c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:07.024 [INFO][4935] ipam.go 1203: Writing block in order to claim IPs block=192.168.123.192/26 handle="k8s-pod-network.c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" host="ip-172-31-27-162" Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:07.036 [INFO][4935] ipam.go 1216: Successfully claimed IPs: [192.168.123.198/26] block=192.168.123.192/26 handle="k8s-pod-network.c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" host="ip-172-31-27-162" Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:07.036 [INFO][4935] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.123.198/26] handle="k8s-pod-network.c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" host="ip-172-31-27-162" Oct 2 19:09:07.142361 env[1553]: time="2023-10-02T19:09:07Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:07.142361 env[1553]: 2023-10-02 19:09:07.036 [INFO][4935] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.123.198/26] IPv6=[] ContainerID="c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" HandleID="k8s-pod-network.c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" Workload="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--wxp7q-eth0" Oct 2 19:09:07.144029 env[1553]: 2023-10-02 19:09:07.046 [INFO][4907] k8s.go 383: Populated endpoint ContainerID="c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-wxp7q" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--wxp7q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--wxp7q-eth0", GenerateName:"calico-apiserver-865b75d78d-", Namespace:"calico-apiserver", SelfLink:"", UID:"35566a51-2907-4613-92de-25cabd8c7231", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"865b75d78d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"", Pod:"calico-apiserver-865b75d78d-wxp7q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.123.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7c1229322dd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:07.144029 env[1553]: 2023-10-02 19:09:07.046 [INFO][4907] k8s.go 384: Calico CNI using IPs: [192.168.123.198/32] ContainerID="c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-wxp7q" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--wxp7q-eth0" Oct 2 19:09:07.144029 env[1553]: 2023-10-02 19:09:07.046 [INFO][4907] dataplane_linux.go 68: Setting the host side veth name to cali7c1229322dd ContainerID="c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-wxp7q" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--wxp7q-eth0" Oct 2 19:09:07.144029 env[1553]: 2023-10-02 19:09:07.049 [INFO][4907] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-wxp7q" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--wxp7q-eth0" Oct 2 19:09:07.144029 env[1553]: 2023-10-02 19:09:07.072 [INFO][4907] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-wxp7q" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--wxp7q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--wxp7q-eth0", GenerateName:"calico-apiserver-865b75d78d-", Namespace:"calico-apiserver", SelfLink:"", UID:"35566a51-2907-4613-92de-25cabd8c7231", ResourceVersion:"838", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"865b75d78d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd", Pod:"calico-apiserver-865b75d78d-wxp7q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.123.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7c1229322dd", MAC:"96:bd:17:15:62:0a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:07.144029 env[1553]: 2023-10-02 19:09:07.138 [INFO][4907] k8s.go 489: Wrote updated endpoint to datastore ContainerID="c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd" Namespace="calico-apiserver" Pod="calico-apiserver-865b75d78d-wxp7q" WorkloadEndpoint="ip--172--31--27--162-k8s-calico--apiserver--865b75d78d--wxp7q-eth0" Oct 2 19:09:07.180140 env[1553]: 2023-10-02 19:09:07.060 [WARNING][4959] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"5dbac382-d9ca-4eaf-b680-9fe23b274acd", ResourceVersion:"719", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f", Pod:"coredns-787d4945fb-5zzv5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali26d60f05dc2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:07.180140 env[1553]: 2023-10-02 19:09:07.061 [INFO][4959] k8s.go 576: Cleaning up netns ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Oct 2 19:09:07.180140 env[1553]: 2023-10-02 19:09:07.061 [INFO][4959] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" iface="eth0" netns="" Oct 2 19:09:07.180140 env[1553]: 2023-10-02 19:09:07.062 [INFO][4959] k8s.go 583: Releasing IP address(es) ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Oct 2 19:09:07.180140 env[1553]: 2023-10-02 19:09:07.062 [INFO][4959] utils.go 196: Calico CNI releasing IP address ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Oct 2 19:09:07.180140 env[1553]: 2023-10-02 19:09:07.155 [INFO][5010] ipam_plugin.go 416: Releasing address using handleID ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" HandleID="k8s-pod-network.54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:09:07.180140 env[1553]: time="2023-10-02T19:09:07Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:07.180140 env[1553]: time="2023-10-02T19:09:07Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:07.180140 env[1553]: 2023-10-02 19:09:07.172 [WARNING][5010] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" HandleID="k8s-pod-network.54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:09:07.180140 env[1553]: 2023-10-02 19:09:07.172 [INFO][5010] ipam_plugin.go 444: Releasing address using workloadID ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" HandleID="k8s-pod-network.54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:09:07.180140 env[1553]: time="2023-10-02T19:09:07Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:07.180140 env[1553]: 2023-10-02 19:09:07.177 [INFO][4959] k8s.go 589: Teardown processing complete. ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Oct 2 19:09:07.180973 env[1553]: time="2023-10-02T19:09:07.180925401Z" level=info msg="TearDown network for sandbox \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\" successfully" Oct 2 19:09:07.181082 env[1553]: time="2023-10-02T19:09:07.181062682Z" level=info msg="StopPodSandbox for \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\" returns successfully" Oct 2 19:09:07.187505 env[1553]: time="2023-10-02T19:09:07.187463624Z" level=info msg="RemovePodSandbox for \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\"" Oct 2 19:09:07.189503 env[1553]: time="2023-10-02T19:09:07.189417510Z" level=info msg="Forcibly stopping sandbox \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\"" Oct 2 19:09:07.196640 env[1553]: time="2023-10-02T19:09:07.195528622Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:07.196640 env[1553]: time="2023-10-02T19:09:07.195591414Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:07.196640 env[1553]: time="2023-10-02T19:09:07.195609486Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:07.196640 env[1553]: time="2023-10-02T19:09:07.195758381Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd pid=5042 runtime=io.containerd.runc.v2 Oct 2 19:09:07.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.204000 audit: BPF prog-id=180 op=LOAD Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4988 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332613534313732613965636636383263356230623431336563663137 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4988 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332613534313732613965636636383263356230623431336563663137 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit: BPF prog-id=181 op=LOAD Oct 2 19:09:07.205000 audit[4999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d67a0 items=0 ppid=4988 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332613534313732613965636636383263356230623431336563663137 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit: BPF prog-id=182 op=LOAD Oct 2 19:09:07.205000 audit[4999]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d67e8 items=0 ppid=4988 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332613534313732613965636636383263356230623431336563663137 Oct 2 19:09:07.205000 audit: BPF prog-id=182 op=UNLOAD Oct 2 19:09:07.205000 audit: BPF prog-id=181 op=UNLOAD Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.205000 audit: BPF prog-id=183 op=LOAD Oct 2 19:09:07.205000 audit[4999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d6bf8 items=0 ppid=4988 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332613534313732613965636636383263356230623431336563663137 Oct 2 19:09:07.215000 audit[5059]: NETFILTER_CFG table=filter:132 family=2 entries=46 op=nft_register_chain pid=5059 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:07.215000 audit[5059]: SYSCALL arch=c000003e syscall=46 success=yes exit=23292 a0=3 a1=7ffc8f7996d0 a2=0 a3=7ffc8f7996bc items=0 ppid=3774 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.215000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:07.245117 systemd[1]: Started cri-containerd-c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd.scope. Oct 2 19:09:07.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit: BPF prog-id=184 op=LOAD Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { bpf } for pid=5061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5042 pid=5061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336386164306237386539636436346333653039636438323835656230 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5042 pid=5061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336386164306237386539636436346333653039636438323835656230 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { bpf } for pid=5061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { bpf } for pid=5061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { bpf } for pid=5061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { bpf } for pid=5061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { bpf } for pid=5061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit: BPF prog-id=185 op=LOAD Oct 2 19:09:07.291000 audit[5061]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000288f90 items=0 ppid=5042 pid=5061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336386164306237386539636436346333653039636438323835656230 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { bpf } for pid=5061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { bpf } for pid=5061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { bpf } for pid=5061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { bpf } for pid=5061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit: BPF prog-id=186 op=LOAD Oct 2 19:09:07.291000 audit[5061]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000288fd8 items=0 ppid=5042 pid=5061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336386164306237386539636436346333653039636438323835656230 Oct 2 19:09:07.291000 audit: BPF prog-id=186 op=UNLOAD Oct 2 19:09:07.291000 audit: BPF prog-id=185 op=UNLOAD Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { bpf } for pid=5061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { bpf } for pid=5061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { bpf } for pid=5061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { perfmon } for pid=5061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { bpf } for pid=5061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit[5061]: AVC avc: denied { bpf } for pid=5061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.291000 audit: BPF prog-id=187 op=LOAD Oct 2 19:09:07.291000 audit[5061]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002893e8 items=0 ppid=5042 pid=5061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336386164306237386539636436346333653039636438323835656230 Oct 2 19:09:07.329493 env[1553]: time="2023-10-02T19:09:07.323865215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-865b75d78d-np9wn,Uid:5ffcebc4-e54f-4075-a6f5-84fc6b79a087,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"32a54172a9ecf682c5b0b413ecf17fab58e9490da778397700a2cc4812bccfb3\"" Oct 2 19:09:07.336336 env[1553]: time="2023-10-02T19:09:07.336298912Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:09:07.355454 env[1553]: time="2023-10-02T19:09:07.355412454Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-865b75d78d-wxp7q,Uid:35566a51-2907-4613-92de-25cabd8c7231,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"c68ad0b78e9cd64c3e09cd8285eb03a8109c8edde830044dcce992675c17bedd\"" Oct 2 19:09:07.392608 env[1553]: 2023-10-02 19:09:07.340 [WARNING][5071] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"5dbac382-d9ca-4eaf-b680-9fe23b274acd", ResourceVersion:"719", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"e23ec4917af4fccfba1a3ca9ce4ad422957d2d994aeb36823e00ac4b621fd66f", Pod:"coredns-787d4945fb-5zzv5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali26d60f05dc2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:07.392608 env[1553]: 2023-10-02 19:09:07.341 [INFO][5071] k8s.go 576: Cleaning up netns ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Oct 2 19:09:07.392608 env[1553]: 2023-10-02 19:09:07.341 [INFO][5071] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" iface="eth0" netns="" Oct 2 19:09:07.392608 env[1553]: 2023-10-02 19:09:07.341 [INFO][5071] k8s.go 583: Releasing IP address(es) ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Oct 2 19:09:07.392608 env[1553]: 2023-10-02 19:09:07.341 [INFO][5071] utils.go 196: Calico CNI releasing IP address ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Oct 2 19:09:07.392608 env[1553]: 2023-10-02 19:09:07.382 [INFO][5093] ipam_plugin.go 416: Releasing address using handleID ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" HandleID="k8s-pod-network.54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:09:07.392608 env[1553]: time="2023-10-02T19:09:07Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:07.392608 env[1553]: time="2023-10-02T19:09:07Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:07.392608 env[1553]: 2023-10-02 19:09:07.388 [WARNING][5093] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" HandleID="k8s-pod-network.54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:09:07.392608 env[1553]: 2023-10-02 19:09:07.388 [INFO][5093] ipam_plugin.go 444: Releasing address using workloadID ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" HandleID="k8s-pod-network.54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--5zzv5-eth0" Oct 2 19:09:07.392608 env[1553]: time="2023-10-02T19:09:07Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:07.392608 env[1553]: 2023-10-02 19:09:07.391 [INFO][5071] k8s.go 589: Teardown processing complete. ContainerID="54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e" Oct 2 19:09:07.393336 env[1553]: time="2023-10-02T19:09:07.392639046Z" level=info msg="TearDown network for sandbox \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\" successfully" Oct 2 19:09:07.397038 env[1553]: time="2023-10-02T19:09:07.396983227Z" level=info msg="RemovePodSandbox \"54f72233f1314d67bca18c2429c54f3fd090818fb79f3352070d802cdb731f6e\" returns successfully" Oct 2 19:09:07.397710 env[1553]: time="2023-10-02T19:09:07.397680394Z" level=info msg="StopPodSandbox for \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\"" Oct 2 19:09:07.491237 env[1553]: 2023-10-02 19:09:07.444 [WARNING][5116] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"45f7a44b-baf9-4662-ae23-0d419c416bf2", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b", Pod:"coredns-787d4945fb-fhxq5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie74e5cbcbda", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:07.491237 env[1553]: 2023-10-02 19:09:07.444 [INFO][5116] k8s.go 576: Cleaning up netns ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Oct 2 19:09:07.491237 env[1553]: 2023-10-02 19:09:07.444 [INFO][5116] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" iface="eth0" netns="" Oct 2 19:09:07.491237 env[1553]: 2023-10-02 19:09:07.444 [INFO][5116] k8s.go 583: Releasing IP address(es) ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Oct 2 19:09:07.491237 env[1553]: 2023-10-02 19:09:07.444 [INFO][5116] utils.go 196: Calico CNI releasing IP address ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Oct 2 19:09:07.491237 env[1553]: 2023-10-02 19:09:07.473 [INFO][5122] ipam_plugin.go 416: Releasing address using handleID ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" HandleID="k8s-pod-network.4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:09:07.491237 env[1553]: time="2023-10-02T19:09:07Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:07.491237 env[1553]: time="2023-10-02T19:09:07Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:07.491237 env[1553]: 2023-10-02 19:09:07.486 [WARNING][5122] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" HandleID="k8s-pod-network.4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:09:07.491237 env[1553]: 2023-10-02 19:09:07.487 [INFO][5122] ipam_plugin.go 444: Releasing address using workloadID ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" HandleID="k8s-pod-network.4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:09:07.491237 env[1553]: time="2023-10-02T19:09:07Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:07.491237 env[1553]: 2023-10-02 19:09:07.489 [INFO][5116] k8s.go 589: Teardown processing complete. ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Oct 2 19:09:07.491872 env[1553]: time="2023-10-02T19:09:07.491284252Z" level=info msg="TearDown network for sandbox \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\" successfully" Oct 2 19:09:07.491872 env[1553]: time="2023-10-02T19:09:07.491331331Z" level=info msg="StopPodSandbox for \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\" returns successfully" Oct 2 19:09:07.492479 env[1553]: time="2023-10-02T19:09:07.492437591Z" level=info msg="RemovePodSandbox for \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\"" Oct 2 19:09:07.492585 env[1553]: time="2023-10-02T19:09:07.492474712Z" level=info msg="Forcibly stopping sandbox \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\"" Oct 2 19:09:07.548098 env[1553]: time="2023-10-02T19:09:07.548028259Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:07.549730 env[1553]: time="2023-10-02T19:09:07.549661621Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:07.550074 kubelet[2689]: E1002 19:09:07.550053 2689 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:07.550505 kubelet[2689]: E1002 19:09:07.550121 2689 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:07.552366 kubelet[2689]: E1002 19:09:07.552341 2689 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-t4dks,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-865b75d78d-np9wn_calico-apiserver(5ffcebc4-e54f-4075-a6f5-84fc6b79a087): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:07.552573 kubelet[2689]: E1002 19:09:07.552423 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-865b75d78d-np9wn" podUID=5ffcebc4-e54f-4075-a6f5-84fc6b79a087 Oct 2 19:09:07.553900 env[1553]: time="2023-10-02T19:09:07.553855039Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:09:07.581399 env[1553]: 2023-10-02 19:09:07.535 [WARNING][5141] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"45f7a44b-baf9-4662-ae23-0d419c416bf2", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-162", ContainerID:"d9e4fdf8278a51bb7011b3d29653d933c56fce96ea0452144ebcca128dfd1d2b", Pod:"coredns-787d4945fb-fhxq5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.123.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie74e5cbcbda", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:07.581399 env[1553]: 2023-10-02 19:09:07.536 [INFO][5141] k8s.go 576: Cleaning up netns ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Oct 2 19:09:07.581399 env[1553]: 2023-10-02 19:09:07.536 [INFO][5141] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" iface="eth0" netns="" Oct 2 19:09:07.581399 env[1553]: 2023-10-02 19:09:07.536 [INFO][5141] k8s.go 583: Releasing IP address(es) ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Oct 2 19:09:07.581399 env[1553]: 2023-10-02 19:09:07.536 [INFO][5141] utils.go 196: Calico CNI releasing IP address ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Oct 2 19:09:07.581399 env[1553]: 2023-10-02 19:09:07.568 [INFO][5147] ipam_plugin.go 416: Releasing address using handleID ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" HandleID="k8s-pod-network.4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:09:07.581399 env[1553]: time="2023-10-02T19:09:07Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:07.581399 env[1553]: time="2023-10-02T19:09:07Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:07.581399 env[1553]: 2023-10-02 19:09:07.574 [WARNING][5147] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" HandleID="k8s-pod-network.4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:09:07.581399 env[1553]: 2023-10-02 19:09:07.575 [INFO][5147] ipam_plugin.go 444: Releasing address using workloadID ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" HandleID="k8s-pod-network.4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Workload="ip--172--31--27--162-k8s-coredns--787d4945fb--fhxq5-eth0" Oct 2 19:09:07.581399 env[1553]: time="2023-10-02T19:09:07Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:07.581399 env[1553]: 2023-10-02 19:09:07.578 [INFO][5141] k8s.go 589: Teardown processing complete. ContainerID="4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb" Oct 2 19:09:07.582015 env[1553]: time="2023-10-02T19:09:07.581959914Z" level=info msg="TearDown network for sandbox \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\" successfully" Oct 2 19:09:07.586405 env[1553]: time="2023-10-02T19:09:07.586358593Z" level=info msg="RemovePodSandbox \"4cbb7ed9d1f84cf446bc1bf8ad81f6542526cd1db2bd8c04f3733ae1e90f06cb\" returns successfully" Oct 2 19:09:07.760170 env[1553]: time="2023-10-02T19:09:07.760103809Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:07.761475 env[1553]: time="2023-10-02T19:09:07.761423365Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:07.761680 kubelet[2689]: E1002 19:09:07.761648 2689 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:07.761784 kubelet[2689]: E1002 19:09:07.761697 2689 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:07.761835 kubelet[2689]: E1002 19:09:07.761824 2689 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-vnw9w,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-865b75d78d-wxp7q_calico-apiserver(35566a51-2907-4613-92de-25cabd8c7231): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:07.761960 kubelet[2689]: E1002 19:09:07.761876 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-865b75d78d-wxp7q" podUID=35566a51-2907-4613-92de-25cabd8c7231 Oct 2 19:09:08.266900 kubelet[2689]: E1002 19:09:08.266869 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865b75d78d-np9wn" podUID=5ffcebc4-e54f-4075-a6f5-84fc6b79a087 Oct 2 19:09:08.270785 kubelet[2689]: E1002 19:09:08.270762 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865b75d78d-wxp7q" podUID=35566a51-2907-4613-92de-25cabd8c7231 Oct 2 19:09:08.386000 audit[5180]: NETFILTER_CFG table=filter:133 family=2 entries=8 op=nft_register_rule pid=5180 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:08.386000 audit[5180]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff0f2fe390 a2=0 a3=7fff0f2fe37c items=0 ppid=2882 pid=5180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.386000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:08.389000 audit[5180]: NETFILTER_CFG table=nat:134 family=2 entries=78 op=nft_register_rule pid=5180 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:08.389000 audit[5180]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff0f2fe390 a2=0 a3=7fff0f2fe37c items=0 ppid=2882 pid=5180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:08.439362 systemd-networkd[1368]: calia0f5da5194e: Gained IPv6LL Oct 2 19:09:08.581000 audit[5206]: NETFILTER_CFG table=filter:135 family=2 entries=8 op=nft_register_rule pid=5206 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:08.581000 audit[5206]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc3101cf00 a2=0 a3=7ffc3101ceec items=0 ppid=2882 pid=5206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.581000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:08.584000 audit[5206]: NETFILTER_CFG table=nat:136 family=2 entries=78 op=nft_register_rule pid=5206 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:08.584000 audit[5206]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc3101cf00 a2=0 a3=7ffc3101ceec items=0 ppid=2882 pid=5206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.584000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:08.948414 systemd-networkd[1368]: cali7c1229322dd: Gained IPv6LL Oct 2 19:09:09.273482 kubelet[2689]: E1002 19:09:09.273326 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865b75d78d-np9wn" podUID=5ffcebc4-e54f-4075-a6f5-84fc6b79a087 Oct 2 19:09:09.275035 kubelet[2689]: E1002 19:09:09.275012 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865b75d78d-wxp7q" podUID=35566a51-2907-4613-92de-25cabd8c7231 Oct 2 19:09:09.634148 systemd[1]: run-containerd-runc-k8s.io-6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d-runc.Seir1Q.mount: Deactivated successfully. Oct 2 19:09:09.719010 systemd[1]: run-containerd-runc-k8s.io-6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d-runc.T50hcL.mount: Deactivated successfully. Oct 2 19:09:09.874039 env[1553]: time="2023-10-02T19:09:09.873920556Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:09:10.096369 env[1553]: time="2023-10-02T19:09:10.096313550Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:10.097695 env[1553]: time="2023-10-02T19:09:10.097631602Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:10.098669 kubelet[2689]: E1002 19:09:10.098601 2689 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:09:10.098791 kubelet[2689]: E1002 19:09:10.098694 2689 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:09:10.098908 kubelet[2689]: E1002 19:09:10.098876 2689 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-fv2lg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-nnw9l_calico-system(e4104074-c237-4645-96b6-bc09192177f7): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:10.101491 env[1553]: time="2023-10-02T19:09:10.101447934Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:09:10.292095 env[1553]: time="2023-10-02T19:09:10.292041659Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:10.295048 env[1553]: time="2023-10-02T19:09:10.294496523Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:10.297336 kubelet[2689]: E1002 19:09:10.297308 2689 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:10.298162 kubelet[2689]: E1002 19:09:10.297359 2689 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:10.298162 kubelet[2689]: E1002 19:09:10.297471 2689 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-fv2lg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-nnw9l_calico-system(e4104074-c237-4645-96b6-bc09192177f7): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:10.298162 kubelet[2689]: E1002 19:09:10.297543 2689 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-nnw9l" podUID=e4104074-c237-4645-96b6-bc09192177f7 Oct 2 19:09:15.089275 systemd[1]: Started sshd@8-172.31.27.162:22-139.178.89.65:56544.service. Oct 2 19:09:15.098794 kernel: kauditd_printk_skb: 157 callbacks suppressed Oct 2 19:09:15.099014 kernel: audit: type=1130 audit(1696273755.088:1420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.162:22-139.178.89.65:56544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:15.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.162:22-139.178.89.65:56544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:15.293000 audit[5252]: USER_ACCT pid=5252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:15.305572 sshd[5252]: Accepted publickey for core from 139.178.89.65 port 56544 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:15.306568 kernel: audit: type=1101 audit(1696273755.293:1421): pid=5252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:15.307407 sshd[5252]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:15.304000 audit[5252]: CRED_ACQ pid=5252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:15.317322 kernel: audit: type=1103 audit(1696273755.304:1422): pid=5252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:15.322348 kernel: audit: type=1006 audit(1696273755.304:1423): pid=5252 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Oct 2 19:09:15.304000 audit[5252]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5f91bf80 a2=3 a3=0 items=0 ppid=1 pid=5252 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:15.304000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:15.339770 kernel: audit: type=1300 audit(1696273755.304:1423): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5f91bf80 a2=3 a3=0 items=0 ppid=1 pid=5252 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:15.339877 kernel: audit: type=1327 audit(1696273755.304:1423): proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:15.344519 systemd-logind[1543]: New session 9 of user core. Oct 2 19:09:15.346160 systemd[1]: Started session-9.scope. Oct 2 19:09:15.352000 audit[5252]: USER_START pid=5252 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:15.362853 kernel: audit: type=1105 audit(1696273755.352:1424): pid=5252 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:15.363025 kernel: audit: type=1103 audit(1696273755.360:1425): pid=5256 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:15.360000 audit[5256]: CRED_ACQ pid=5256 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:15.654481 sshd[5252]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:15.658000 audit[5252]: USER_END pid=5252 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:15.669320 kernel: audit: type=1106 audit(1696273755.658:1426): pid=5252 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:15.662308 systemd-logind[1543]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:09:15.658000 audit[5252]: CRED_DISP pid=5252 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:15.664343 systemd[1]: sshd@8-172.31.27.162:22-139.178.89.65:56544.service: Deactivated successfully. Oct 2 19:09:15.665747 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:09:15.668610 systemd-logind[1543]: Removed session 9. Oct 2 19:09:15.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.162:22-139.178.89.65:56544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:15.676384 kernel: audit: type=1104 audit(1696273755.658:1427): pid=5252 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:15.952715 systemd[1]: run-containerd-runc-k8s.io-b37ee9cbe9157565090298c0dfffece6df73d37fefa82e2d7979dc523454e319-runc.IBAbLu.mount: Deactivated successfully. Oct 2 19:09:19.642577 systemd[1]: run-containerd-runc-k8s.io-6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d-runc.fHxzKk.mount: Deactivated successfully. Oct 2 19:09:19.696091 systemd[1]: run-containerd-runc-k8s.io-6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d-runc.Gmte5T.mount: Deactivated successfully. Oct 2 19:09:21.873115 env[1553]: time="2023-10-02T19:09:21.873070470Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:09:22.049716 env[1553]: time="2023-10-02T19:09:22.049457427Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:22.050917 env[1553]: time="2023-10-02T19:09:22.050858962Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:22.051133 kubelet[2689]: E1002 19:09:22.051107 2689 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:22.051595 kubelet[2689]: E1002 19:09:22.051156 2689 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:22.051657 env[1553]: time="2023-10-02T19:09:22.051565922Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:09:22.051948 kubelet[2689]: E1002 19:09:22.051930 2689 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-vnw9w,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-865b75d78d-wxp7q_calico-apiserver(35566a51-2907-4613-92de-25cabd8c7231): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:22.052221 kubelet[2689]: E1002 19:09:22.052188 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-865b75d78d-wxp7q" podUID=35566a51-2907-4613-92de-25cabd8c7231 Oct 2 19:09:22.235270 env[1553]: time="2023-10-02T19:09:22.235094597Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:22.236609 env[1553]: time="2023-10-02T19:09:22.236517515Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:22.237152 kubelet[2689]: E1002 19:09:22.237123 2689 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:22.237297 kubelet[2689]: E1002 19:09:22.237179 2689 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:22.237358 kubelet[2689]: E1002 19:09:22.237328 2689 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-t4dks,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-865b75d78d-np9wn_calico-apiserver(5ffcebc4-e54f-4075-a6f5-84fc6b79a087): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:22.239658 kubelet[2689]: E1002 19:09:22.237381 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-865b75d78d-np9wn" podUID=5ffcebc4-e54f-4075-a6f5-84fc6b79a087 Oct 2 19:09:23.870563 kubelet[2689]: E1002 19:09:23.870536 2689 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nnw9l" podUID=e4104074-c237-4645-96b6-bc09192177f7 Oct 2 19:09:25.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.162:22-139.178.89.65:38834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:25.685472 systemd[1]: Started sshd@9-172.31.27.162:22-139.178.89.65:38834.service. Oct 2 19:09:25.687257 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:09:25.687341 kernel: audit: type=1130 audit(1696273765.684:1429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.162:22-139.178.89.65:38834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:25.871000 audit[5341]: USER_ACCT pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:25.873383 sshd[5341]: Accepted publickey for core from 139.178.89.65 port 38834 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:25.880240 kernel: audit: type=1101 audit(1696273765.871:1430): pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:25.879000 audit[5341]: CRED_ACQ pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:25.882187 sshd[5341]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:25.896985 kernel: audit: type=1103 audit(1696273765.879:1431): pid=5341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:25.897114 kernel: audit: type=1006 audit(1696273765.879:1432): pid=5341 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 19:09:25.897151 kernel: audit: type=1300 audit(1696273765.879:1432): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe09681cc0 a2=3 a3=0 items=0 ppid=1 pid=5341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:25.879000 audit[5341]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe09681cc0 a2=3 a3=0 items=0 ppid=1 pid=5341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:25.895717 systemd[1]: Started session-10.scope. Oct 2 19:09:25.900695 systemd-logind[1543]: New session 10 of user core. Oct 2 19:09:25.904815 kernel: audit: type=1327 audit(1696273765.879:1432): proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:25.879000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:25.916000 audit[5341]: USER_START pid=5341 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:25.928115 kernel: audit: type=1105 audit(1696273765.916:1433): pid=5341 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:25.920000 audit[5343]: CRED_ACQ pid=5343 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:25.938239 kernel: audit: type=1103 audit(1696273765.920:1434): pid=5343 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:25.999611 systemd[1]: run-containerd-runc-k8s.io-b37ee9cbe9157565090298c0dfffece6df73d37fefa82e2d7979dc523454e319-runc.WWAxcl.mount: Deactivated successfully. Oct 2 19:09:26.222171 sshd[5341]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:26.224000 audit[5341]: USER_END pid=5341 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:26.237322 systemd[1]: sshd@9-172.31.27.162:22-139.178.89.65:38834.service: Deactivated successfully. Oct 2 19:09:26.238550 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:09:26.243430 kernel: audit: type=1106 audit(1696273766.224:1435): pid=5341 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:26.224000 audit[5341]: CRED_DISP pid=5341 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:26.243600 systemd-logind[1543]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:09:26.249237 kernel: audit: type=1104 audit(1696273766.224:1436): pid=5341 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:26.253381 systemd-logind[1543]: Removed session 10. Oct 2 19:09:26.259661 systemd[1]: Started sshd@10-172.31.27.162:22-139.178.89.65:46518.service. Oct 2 19:09:26.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.162:22-139.178.89.65:38834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:26.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.162:22-139.178.89.65:46518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:26.426000 audit[5374]: USER_ACCT pid=5374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:26.427986 sshd[5374]: Accepted publickey for core from 139.178.89.65 port 46518 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:26.429000 audit[5374]: CRED_ACQ pid=5374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:26.430000 audit[5374]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb451c230 a2=3 a3=0 items=0 ppid=1 pid=5374 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:26.430000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:26.432107 sshd[5374]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:26.440950 systemd[1]: Started session-11.scope. Oct 2 19:09:26.441971 systemd-logind[1543]: New session 11 of user core. Oct 2 19:09:26.454000 audit[5374]: USER_START pid=5374 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:26.457000 audit[5376]: CRED_ACQ pid=5376 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:28.567509 sshd[5374]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:28.567000 audit[5374]: USER_END pid=5374 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:28.567000 audit[5374]: CRED_DISP pid=5374 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:28.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.162:22-139.178.89.65:46518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:28.587369 systemd[1]: sshd@10-172.31.27.162:22-139.178.89.65:46518.service: Deactivated successfully. Oct 2 19:09:28.590202 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:09:28.590958 systemd-logind[1543]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:09:28.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.162:22-139.178.89.65:46534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:28.606304 systemd[1]: Started sshd@11-172.31.27.162:22-139.178.89.65:46534.service. Oct 2 19:09:28.623154 systemd-logind[1543]: Removed session 11. Oct 2 19:09:28.829000 audit[5389]: USER_ACCT pid=5389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:28.832192 sshd[5389]: Accepted publickey for core from 139.178.89.65 port 46534 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:28.831000 audit[5389]: CRED_ACQ pid=5389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:28.831000 audit[5389]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff44a2d0b0 a2=3 a3=0 items=0 ppid=1 pid=5389 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:28.831000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:28.833781 sshd[5389]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:28.841846 systemd-logind[1543]: New session 12 of user core. Oct 2 19:09:28.842989 systemd[1]: Started session-12.scope. Oct 2 19:09:28.851000 audit[5389]: USER_START pid=5389 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:28.854000 audit[5391]: CRED_ACQ pid=5391 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.163855 sshd[5389]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:29.164000 audit[5389]: USER_END pid=5389 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.165000 audit[5389]: CRED_DISP pid=5389 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.168074 systemd[1]: sshd@11-172.31.27.162:22-139.178.89.65:46534.service: Deactivated successfully. Oct 2 19:09:29.169041 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:09:29.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.162:22-139.178.89.65:46534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:29.170044 systemd-logind[1543]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:09:29.171010 systemd-logind[1543]: Removed session 12. Oct 2 19:09:36.005260 systemd[1]: run-containerd-runc-k8s.io-b37ee9cbe9157565090298c0dfffece6df73d37fefa82e2d7979dc523454e319-runc.cxnqGT.mount: Deactivated successfully. Oct 2 19:09:36.871343 kubelet[2689]: E1002 19:09:36.871316 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865b75d78d-wxp7q" podUID=35566a51-2907-4613-92de-25cabd8c7231 Oct 2 19:09:36.872020 kubelet[2689]: E1002 19:09:36.871423 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865b75d78d-np9wn" podUID=5ffcebc4-e54f-4075-a6f5-84fc6b79a087 Oct 2 19:09:38.871705 env[1553]: time="2023-10-02T19:09:38.871390440Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:09:39.054456 env[1553]: time="2023-10-02T19:09:39.054397368Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:39.056161 env[1553]: time="2023-10-02T19:09:39.056106057Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:39.056404 kubelet[2689]: E1002 19:09:39.056369 2689 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:09:39.056868 kubelet[2689]: E1002 19:09:39.056416 2689 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:09:39.056868 kubelet[2689]: E1002 19:09:39.056663 2689 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-fv2lg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-nnw9l_calico-system(e4104074-c237-4645-96b6-bc09192177f7): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:39.058000 env[1553]: time="2023-10-02T19:09:39.057961845Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:09:39.205001 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:09:39.205152 kernel: audit: type=1130 audit(1696273779.194:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.162:22-139.178.89.65:49384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:39.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.162:22-139.178.89.65:49384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:39.195457 systemd[1]: Started sshd@12-172.31.27.162:22-139.178.89.65:49384.service. Oct 2 19:09:39.249614 env[1553]: time="2023-10-02T19:09:39.249422849Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:39.255609 env[1553]: time="2023-10-02T19:09:39.254667364Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:39.255992 kubelet[2689]: E1002 19:09:39.255967 2689 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:39.256170 kubelet[2689]: E1002 19:09:39.256157 2689 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:39.256604 kubelet[2689]: E1002 19:09:39.256585 2689 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-fv2lg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-nnw9l_calico-system(e4104074-c237-4645-96b6-bc09192177f7): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:39.256871 kubelet[2689]: E1002 19:09:39.256857 2689 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-nnw9l" podUID=e4104074-c237-4645-96b6-bc09192177f7 Oct 2 19:09:39.381644 sshd[5464]: Accepted publickey for core from 139.178.89.65 port 49384 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:39.380000 audit[5464]: USER_ACCT pid=5464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:39.391240 kernel: audit: type=1101 audit(1696273779.380:1457): pid=5464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:39.389000 audit[5464]: CRED_ACQ pid=5464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:39.392698 sshd[5464]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:39.398380 kernel: audit: type=1103 audit(1696273779.389:1458): pid=5464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:39.390000 audit[5464]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7e9cf780 a2=3 a3=0 items=0 ppid=1 pid=5464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.407852 systemd[1]: Started session-13.scope. Oct 2 19:09:39.409981 systemd-logind[1543]: New session 13 of user core. Oct 2 19:09:39.412262 kernel: audit: type=1006 audit(1696273779.390:1459): pid=5464 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 2 19:09:39.412354 kernel: audit: type=1300 audit(1696273779.390:1459): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7e9cf780 a2=3 a3=0 items=0 ppid=1 pid=5464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:39.390000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:39.426280 kernel: audit: type=1327 audit(1696273779.390:1459): proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:39.419000 audit[5464]: USER_START pid=5464 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:39.436241 kernel: audit: type=1105 audit(1696273779.419:1460): pid=5464 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:39.421000 audit[5468]: CRED_ACQ pid=5468 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:39.443262 kernel: audit: type=1103 audit(1696273779.421:1461): pid=5468 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:39.647909 systemd[1]: run-containerd-runc-k8s.io-6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d-runc.wBmpwj.mount: Deactivated successfully. Oct 2 19:09:39.777789 sshd[5464]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:39.779000 audit[5464]: USER_END pid=5464 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:39.793280 kernel: audit: type=1106 audit(1696273779.779:1462): pid=5464 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:39.794032 systemd[1]: sshd@12-172.31.27.162:22-139.178.89.65:49384.service: Deactivated successfully. Oct 2 19:09:39.795248 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:09:39.779000 audit[5464]: CRED_DISP pid=5464 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:39.796334 systemd-logind[1543]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:09:39.797827 systemd-logind[1543]: Removed session 13. Oct 2 19:09:39.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.162:22-139.178.89.65:49384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:39.803297 kernel: audit: type=1104 audit(1696273779.779:1463): pid=5464 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:45.949017 systemd[1]: run-containerd-runc-k8s.io-b37ee9cbe9157565090298c0dfffece6df73d37fefa82e2d7979dc523454e319-runc.dEtuTY.mount: Deactivated successfully. Oct 2 19:09:47.871506 env[1553]: time="2023-10-02T19:09:47.871440738Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:09:48.059046 env[1553]: time="2023-10-02T19:09:48.058973266Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:48.060505 env[1553]: time="2023-10-02T19:09:48.060394647Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:48.060986 kubelet[2689]: E1002 19:09:48.060959 2689 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:48.061618 kubelet[2689]: E1002 19:09:48.061009 2689 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:48.061618 kubelet[2689]: E1002 19:09:48.061154 2689 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-vnw9w,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-865b75d78d-wxp7q_calico-apiserver(35566a51-2907-4613-92de-25cabd8c7231): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:48.061618 kubelet[2689]: E1002 19:09:48.061204 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-865b75d78d-wxp7q" podUID=35566a51-2907-4613-92de-25cabd8c7231 Oct 2 19:09:48.872372 env[1553]: time="2023-10-02T19:09:48.870862092Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:09:49.054903 env[1553]: time="2023-10-02T19:09:49.054834019Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:49.056654 env[1553]: time="2023-10-02T19:09:49.056510326Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:49.056982 kubelet[2689]: E1002 19:09:49.056949 2689 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:49.057099 kubelet[2689]: E1002 19:09:49.057010 2689 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:49.058141 kubelet[2689]: E1002 19:09:49.058117 2689 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-t4dks,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-865b75d78d-np9wn_calico-apiserver(5ffcebc4-e54f-4075-a6f5-84fc6b79a087): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:49.059109 kubelet[2689]: E1002 19:09:49.058179 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-865b75d78d-np9wn" podUID=5ffcebc4-e54f-4075-a6f5-84fc6b79a087 Oct 2 19:09:49.631009 systemd[1]: run-containerd-runc-k8s.io-6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d-runc.ZkfJS1.mount: Deactivated successfully. Oct 2 19:09:49.678377 systemd[1]: run-containerd-runc-k8s.io-6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d-runc.mEW8i5.mount: Deactivated successfully. Oct 2 19:09:49.812184 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:09:49.812539 kernel: audit: type=1130 audit(1696273789.804:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.162:22-139.178.89.65:47750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:49.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.162:22-139.178.89.65:47750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:49.805362 systemd[1]: Started sshd@13-172.31.27.162:22-139.178.89.65:47750.service. Oct 2 19:09:49.995000 audit[5585]: USER_ACCT pid=5585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:50.004513 kernel: audit: type=1101 audit(1696273789.995:1466): pid=5585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:50.004646 sshd[5585]: Accepted publickey for core from 139.178.89.65 port 47750 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:50.003000 audit[5585]: CRED_ACQ pid=5585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:50.007814 sshd[5585]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:50.025672 kernel: audit: type=1103 audit(1696273790.003:1467): pid=5585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:50.025806 kernel: audit: type=1006 audit(1696273790.004:1468): pid=5585 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Oct 2 19:09:50.025081 systemd[1]: Started session-14.scope. Oct 2 19:09:50.004000 audit[5585]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1c142a30 a2=3 a3=0 items=0 ppid=1 pid=5585 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:50.027924 systemd-logind[1543]: New session 14 of user core. Oct 2 19:09:50.033239 kernel: audit: type=1300 audit(1696273790.004:1468): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1c142a30 a2=3 a3=0 items=0 ppid=1 pid=5585 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:50.004000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:50.037404 kernel: audit: type=1327 audit(1696273790.004:1468): proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:50.038284 kernel: audit: type=1105 audit(1696273790.036:1469): pid=5585 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:50.036000 audit[5585]: USER_START pid=5585 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:50.039000 audit[5587]: CRED_ACQ pid=5587 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:50.052094 kernel: audit: type=1103 audit(1696273790.039:1470): pid=5587 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:50.280850 sshd[5585]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:50.281000 audit[5585]: USER_END pid=5585 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:50.296511 kernel: audit: type=1106 audit(1696273790.281:1471): pid=5585 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:50.296658 kernel: audit: type=1104 audit(1696273790.283:1472): pid=5585 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:50.283000 audit[5585]: CRED_DISP pid=5585 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:50.299262 systemd[1]: sshd@13-172.31.27.162:22-139.178.89.65:47750.service: Deactivated successfully. Oct 2 19:09:50.300369 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 19:09:50.303766 systemd-logind[1543]: Session 14 logged out. Waiting for processes to exit. Oct 2 19:09:50.306721 systemd-logind[1543]: Removed session 14. Oct 2 19:09:50.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.162:22-139.178.89.65:47750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:52.870926 kubelet[2689]: E1002 19:09:52.870902 2689 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nnw9l" podUID=e4104074-c237-4645-96b6-bc09192177f7 Oct 2 19:09:55.942776 systemd[1]: run-containerd-runc-k8s.io-b37ee9cbe9157565090298c0dfffece6df73d37fefa82e2d7979dc523454e319-runc.tIXpaK.mount: Deactivated successfully. Oct 2 19:09:58.617000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:58.620432 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:09:58.620597 kernel: audit: type=1400 audit(1696273798.617:1474): avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:58.617000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026d0900 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:09:58.640926 kernel: audit: type=1300 audit(1696273798.617:1474): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026d0900 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:09:58.641080 kernel: audit: type=1327 audit(1696273798.617:1474): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:58.617000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:58.618000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:58.665555 kernel: audit: type=1400 audit(1696273798.618:1475): avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:58.665704 kernel: audit: type=1300 audit(1696273798.618:1475): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001bbaab0 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:09:58.618000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001bbaab0 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:09:58.618000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:58.690363 kernel: audit: type=1327 audit(1696273798.618:1475): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:59.634632 systemd[1]: run-containerd-runc-k8s.io-6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d-runc.Q2cHSL.mount: Deactivated successfully. Oct 2 19:09:59.680592 systemd[1]: run-containerd-runc-k8s.io-6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d-runc.nuPCos.mount: Deactivated successfully. Oct 2 19:09:59.875142 kubelet[2689]: E1002 19:09:59.875108 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865b75d78d-np9wn" podUID=5ffcebc4-e54f-4075-a6f5-84fc6b79a087 Oct 2 19:09:59.875738 kubelet[2689]: E1002 19:09:59.875198 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865b75d78d-wxp7q" podUID=35566a51-2907-4613-92de-25cabd8c7231 Oct 2 19:10:00.313202 systemd[1]: Started sshd@14-172.31.27.162:22-139.178.89.65:42068.service. Oct 2 19:10:00.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.162:22-139.178.89.65:42068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:00.320271 kernel: audit: type=1130 audit(1696273800.312:1476): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.162:22-139.178.89.65:42068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:00.489000 audit[5673]: USER_ACCT pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:00.503720 sshd[5673]: Accepted publickey for core from 139.178.89.65 port 42068 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:10:00.502000 audit[5673]: CRED_ACQ pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:00.509606 kernel: audit: type=1101 audit(1696273800.489:1477): pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:00.510443 kernel: audit: type=1103 audit(1696273800.502:1478): pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:00.510564 kernel: audit: type=1006 audit(1696273800.502:1479): pid=5673 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 2 19:10:00.510727 sshd[5673]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:10:00.502000 audit[5673]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe34d05000 a2=3 a3=0 items=0 ppid=1 pid=5673 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:00.502000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:00.518779 systemd-logind[1543]: New session 15 of user core. Oct 2 19:10:00.520243 systemd[1]: Started session-15.scope. Oct 2 19:10:00.537000 audit[5673]: USER_START pid=5673 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:00.543000 audit[5675]: CRED_ACQ pid=5675 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:00.801839 sshd[5673]: pam_unix(sshd:session): session closed for user core Oct 2 19:10:00.803000 audit[5673]: USER_END pid=5673 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:00.803000 audit[5673]: CRED_DISP pid=5673 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:00.806973 systemd[1]: sshd@14-172.31.27.162:22-139.178.89.65:42068.service: Deactivated successfully. Oct 2 19:10:00.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.162:22-139.178.89.65:42068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:00.808117 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 19:10:00.809099 systemd-logind[1543]: Session 15 logged out. Waiting for processes to exit. Oct 2 19:10:00.811499 systemd-logind[1543]: Removed session 15. Oct 2 19:10:01.450000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:01.450000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521251 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:01.450000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00b1f0fc0 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:10:01.450000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:01.450000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:01.450000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00b1f0ff0 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:10:01.450000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:01.450000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c002547d20 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:10:01.450000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:01.516000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521257 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:01.516000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00ba69cb0 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:10:01.516000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:01.532000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:01.532000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c002547d60 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:10:01.532000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:01.532000 audit[2467]: AVC avc: denied { watch } for pid=2467 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:01.532000 audit[2467]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00b1f1260 a2=fc6 a3=0 items=0 ppid=2317 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c299,c455 key=(null) Oct 2 19:10:01.532000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313632002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:03.871427 kubelet[2689]: E1002 19:10:03.871394 2689 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nnw9l" podUID=e4104074-c237-4645-96b6-bc09192177f7 Oct 2 19:10:05.913473 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 19:10:05.913720 kernel: audit: type=1400 audit(1696273805.906:1491): avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:05.906000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:05.907000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:05.929513 kernel: audit: type=1400 audit(1696273805.907:1492): avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:05.907000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0026d1c00 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:10:05.957278 kernel: audit: type=1300 audit(1696273805.907:1492): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0026d1c00 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:10:05.907000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:05.969248 kernel: audit: type=1327 audit(1696273805.907:1492): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:05.969465 kernel: audit: type=1300 audit(1696273805.906:1491): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00285dc40 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:10:05.906000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00285dc40 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:10:05.906000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:05.988846 kernel: audit: type=1327 audit(1696273805.906:1491): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:05.989082 kernel: audit: type=1400 audit(1696273805.924:1493): avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:05.924000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:05.924000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026d1d20 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:10:06.018303 kernel: audit: type=1300 audit(1696273805.924:1493): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026d1d20 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:10:05.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:05.924000 audit[2438]: AVC avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:06.037334 kernel: audit: type=1327 audit(1696273805.924:1493): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:06.037486 kernel: audit: type=1400 audit(1696273805.924:1494): avc: denied { watch } for pid=2438 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:05.924000 audit[2438]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00285dc60 a2=fc6 a3=0 items=0 ppid=2314 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c319,c412 key=(null) Oct 2 19:10:05.924000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:09.625856 systemd[1]: run-containerd-runc-k8s.io-6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d-runc.d8P5pU.mount: Deactivated successfully. Oct 2 19:10:09.676301 systemd[1]: run-containerd-runc-k8s.io-6029c7f3d66b6d0540974a202c87dabe1a184ffe9986c01bb3fd66d7b3d53a7d-runc.02zqJN.mount: Deactivated successfully. Oct 2 19:10:10.834752 systemd[1]: Started sshd@15-172.31.27.162:22-139.178.89.65:56152.service. Oct 2 19:10:10.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.162:22-139.178.89.65:56152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:10.870249 kubelet[2689]: E1002 19:10:10.870204 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865b75d78d-np9wn" podUID=5ffcebc4-e54f-4075-a6f5-84fc6b79a087 Oct 2 19:10:11.004614 kernel: kauditd_printk_skb: 3 callbacks suppressed Oct 2 19:10:11.004837 kernel: audit: type=1101 audit(1696273810.997:1496): pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:10.997000 audit[5752]: USER_ACCT pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:11.005022 sshd[5752]: Accepted publickey for core from 139.178.89.65 port 56152 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:10:11.007000 audit[5752]: CRED_ACQ pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:11.009498 sshd[5752]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:10:11.027931 kernel: audit: type=1103 audit(1696273811.007:1497): pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:11.028084 kernel: audit: type=1006 audit(1696273811.007:1498): pid=5752 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Oct 2 19:10:11.032268 kernel: audit: type=1300 audit(1696273811.007:1498): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec000c1b0 a2=3 a3=0 items=0 ppid=1 pid=5752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:11.007000 audit[5752]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec000c1b0 a2=3 a3=0 items=0 ppid=1 pid=5752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:11.030625 systemd[1]: Started session-16.scope. Oct 2 19:10:11.034356 systemd-logind[1543]: New session 16 of user core. Oct 2 19:10:11.007000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:11.044465 kernel: audit: type=1327 audit(1696273811.007:1498): proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:11.048081 kernel: audit: type=1105 audit(1696273811.045:1499): pid=5752 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:11.045000 audit[5752]: USER_START pid=5752 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:11.045000 audit[5754]: CRED_ACQ pid=5754 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:11.060352 kernel: audit: type=1103 audit(1696273811.045:1500): pid=5754 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:11.271710 sshd[5752]: pam_unix(sshd:session): session closed for user core Oct 2 19:10:11.272000 audit[5752]: USER_END pid=5752 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:11.277445 systemd-logind[1543]: Session 16 logged out. Waiting for processes to exit. Oct 2 19:10:11.279517 systemd[1]: sshd@15-172.31.27.162:22-139.178.89.65:56152.service: Deactivated successfully. Oct 2 19:10:11.280645 systemd[1]: session-16.scope: Deactivated successfully. Oct 2 19:10:11.272000 audit[5752]: CRED_DISP pid=5752 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:11.282989 systemd-logind[1543]: Removed session 16. Oct 2 19:10:11.287523 kernel: audit: type=1106 audit(1696273811.272:1501): pid=5752 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:11.287613 kernel: audit: type=1104 audit(1696273811.272:1502): pid=5752 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:11.287667 kernel: audit: type=1131 audit(1696273811.278:1503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.162:22-139.178.89.65:56152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:11.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.162:22-139.178.89.65:56152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:14.869788 kubelet[2689]: E1002 19:10:14.869763 2689 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-865b75d78d-wxp7q" podUID=35566a51-2907-4613-92de-25cabd8c7231 Oct 2 19:10:14.871407 kubelet[2689]: E1002 19:10:14.871344 2689 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-nnw9l" podUID=e4104074-c237-4645-96b6-bc09192177f7 Oct 2 19:10:21.301608 systemd[1]: Started sshd@16-172.31.27.162:22-139.178.89.65:57784.service. Oct 2 19:10:21.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.27.162:22-139.178.89.65:57784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:21.312246 kernel: audit: type=1130 audit(1696273821.300:1504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.27.162:22-139.178.89.65:57784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:21.473000 audit[5843]: USER_ACCT pid=5843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:21.481732 sshd[5843]: Accepted publickey for core from 139.178.89.65 port 57784 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:10:21.482280 kernel: audit: type=1101 audit(1696273821.473:1505): pid=5843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:21.482318 sshd[5843]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:10:21.480000 audit[5843]: CRED_ACQ pid=5843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:21.490278 kernel: audit: type=1103 audit(1696273821.480:1506): pid=5843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:21.505535 systemd[1]: Started session-17.scope. Oct 2 19:10:21.508325 systemd-logind[1543]: New session 17 of user core. Oct 2 19:10:21.521570 kernel: audit: type=1006 audit(1696273821.480:1507): pid=5843 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Oct 2 19:10:21.526437 kernel: audit: type=1300 audit(1696273821.480:1507): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee53c71f0 a2=3 a3=0 items=0 ppid=1 pid=5843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:21.526533 kernel: audit: type=1327 audit(1696273821.480:1507): proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:21.480000 audit[5843]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee53c71f0 a2=3 a3=0 items=0 ppid=1 pid=5843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:21.480000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:21.520000 audit[5843]: USER_START pid=5843 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:21.528000 audit[5845]: CRED_ACQ pid=5845 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:21.535458 kernel: audit: type=1105 audit(1696273821.520:1508): pid=5843 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:21.535513 kernel: audit: type=1103 audit(1696273821.528:1509): pid=5845 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:21.725695 sshd[5843]: pam_unix(sshd:session): session closed for user core Oct 2 19:10:21.728000 audit[5843]: USER_END pid=5843 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:21.732112 systemd[1]: sshd@16-172.31.27.162:22-139.178.89.65:57784.service: Deactivated successfully. Oct 2 19:10:21.733310 systemd[1]: session-17.scope: Deactivated successfully. Oct 2 19:10:21.735496 systemd-logind[1543]: Session 17 logged out. Waiting for processes to exit. Oct 2 19:10:21.737268 kernel: audit: type=1106 audit(1696273821.728:1510): pid=5843 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:21.736834 systemd-logind[1543]: Removed session 17. Oct 2 19:10:21.728000 audit[5843]: CRED_DISP pid=5843 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:21.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.27.162:22-139.178.89.65:57784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:21.745519 kernel: audit: type=1104 audit(1696273821.728:1511): pid=5843 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'