Oct 2 19:16:04.154312 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:16:04.154347 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:16:04.154363 kernel: BIOS-provided physical RAM map: Oct 2 19:16:04.154378 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 2 19:16:04.154389 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 2 19:16:04.154400 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 2 19:16:04.154416 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Oct 2 19:16:04.154428 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Oct 2 19:16:04.154439 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Oct 2 19:16:04.154451 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 2 19:16:04.154462 kernel: NX (Execute Disable) protection: active Oct 2 19:16:04.154474 kernel: SMBIOS 2.7 present. Oct 2 19:16:04.154485 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Oct 2 19:16:04.154496 kernel: Hypervisor detected: KVM Oct 2 19:16:04.154513 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:16:04.154525 kernel: kvm-clock: cpu 0, msr 71f8a001, primary cpu clock Oct 2 19:16:04.154538 kernel: kvm-clock: using sched offset of 6856458420 cycles Oct 2 19:16:04.154551 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:16:04.154564 kernel: tsc: Detected 2499.998 MHz processor Oct 2 19:16:04.154577 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:16:04.154594 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:16:04.154607 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Oct 2 19:16:04.154620 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:16:04.154634 kernel: Using GB pages for direct mapping Oct 2 19:16:04.154647 kernel: ACPI: Early table checksum verification disabled Oct 2 19:16:04.154660 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Oct 2 19:16:04.154673 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Oct 2 19:16:04.154686 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Oct 2 19:16:04.154700 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Oct 2 19:16:04.154716 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Oct 2 19:16:04.154729 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:16:04.154742 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Oct 2 19:16:04.154755 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Oct 2 19:16:04.154768 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Oct 2 19:16:04.154780 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Oct 2 19:16:04.154793 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Oct 2 19:16:04.154806 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:16:04.154822 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Oct 2 19:16:04.154834 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Oct 2 19:16:04.154848 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Oct 2 19:16:04.154866 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Oct 2 19:16:04.154880 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Oct 2 19:16:04.154894 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Oct 2 19:16:04.154908 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Oct 2 19:16:04.154924 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Oct 2 19:16:04.154938 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Oct 2 19:16:04.154953 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Oct 2 19:16:04.154967 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:16:04.154996 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:16:04.155008 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Oct 2 19:16:04.155020 kernel: NUMA: Initialized distance table, cnt=1 Oct 2 19:16:04.155030 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Oct 2 19:16:04.155045 kernel: Zone ranges: Oct 2 19:16:04.155058 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:16:04.155071 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Oct 2 19:16:04.155084 kernel: Normal empty Oct 2 19:16:04.155097 kernel: Movable zone start for each node Oct 2 19:16:04.155110 kernel: Early memory node ranges Oct 2 19:16:04.155124 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 2 19:16:04.155137 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Oct 2 19:16:04.155150 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Oct 2 19:16:04.155166 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:16:04.155180 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 2 19:16:04.155194 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Oct 2 19:16:04.155207 kernel: ACPI: PM-Timer IO Port: 0xb008 Oct 2 19:16:04.155221 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:16:04.155234 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Oct 2 19:16:04.155248 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:16:04.155262 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:16:04.155276 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:16:04.155292 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:16:04.155303 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:16:04.155317 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 2 19:16:04.155330 kernel: TSC deadline timer available Oct 2 19:16:04.155343 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:16:04.155357 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Oct 2 19:16:04.155371 kernel: Booting paravirtualized kernel on KVM Oct 2 19:16:04.155385 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:16:04.155399 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:16:04.155416 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:16:04.155429 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:16:04.155442 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:16:04.155456 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Oct 2 19:16:04.155469 kernel: kvm-guest: PV spinlocks enabled Oct 2 19:16:04.155483 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:16:04.155497 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Oct 2 19:16:04.155511 kernel: Policy zone: DMA32 Oct 2 19:16:04.155527 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:16:04.155544 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:16:04.155558 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:16:04.155572 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:16:04.155585 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:16:04.155600 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 121024K reserved, 0K cma-reserved) Oct 2 19:16:04.155614 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:16:04.155628 kernel: Kernel/User page tables isolation: enabled Oct 2 19:16:04.155641 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:16:04.155659 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:16:04.155671 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:16:04.155687 kernel: rcu: RCU event tracing is enabled. Oct 2 19:16:04.155701 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:16:04.155716 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:16:04.155730 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:16:04.155744 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:16:04.155758 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:16:04.155772 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Oct 2 19:16:04.155789 kernel: random: crng init done Oct 2 19:16:04.155802 kernel: Console: colour VGA+ 80x25 Oct 2 19:16:04.155816 kernel: printk: console [ttyS0] enabled Oct 2 19:16:04.155830 kernel: ACPI: Core revision 20210730 Oct 2 19:16:04.155844 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Oct 2 19:16:04.155857 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:16:04.155871 kernel: x2apic enabled Oct 2 19:16:04.155885 kernel: Switched APIC routing to physical x2apic. Oct 2 19:16:04.155899 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Oct 2 19:16:04.155915 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Oct 2 19:16:04.155929 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:16:04.155943 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:16:04.155957 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:16:04.156004 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:16:04.156022 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:16:04.156569 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:16:04.156589 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Oct 2 19:16:04.156604 kernel: RETBleed: Vulnerable Oct 2 19:16:04.156618 kernel: Speculative Store Bypass: Vulnerable Oct 2 19:16:04.156633 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:16:04.156647 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:16:04.156661 kernel: GDS: Unknown: Dependent on hypervisor status Oct 2 19:16:04.156676 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:16:04.156695 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:16:04.156710 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:16:04.156724 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Oct 2 19:16:04.156739 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Oct 2 19:16:04.156753 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Oct 2 19:16:04.156770 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Oct 2 19:16:04.156784 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Oct 2 19:16:04.156798 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Oct 2 19:16:04.156813 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:16:04.156827 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Oct 2 19:16:04.156842 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Oct 2 19:16:04.156856 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Oct 2 19:16:04.156870 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Oct 2 19:16:04.156884 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Oct 2 19:16:04.156896 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Oct 2 19:16:04.156910 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Oct 2 19:16:04.156924 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:16:04.156941 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:16:04.156956 kernel: LSM: Security Framework initializing Oct 2 19:16:04.157028 kernel: SELinux: Initializing. Oct 2 19:16:04.157040 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:16:04.157052 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:16:04.157064 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Oct 2 19:16:04.157075 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Oct 2 19:16:04.157086 kernel: signal: max sigframe size: 3632 Oct 2 19:16:04.157099 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:16:04.157112 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:16:04.157129 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:16:04.157143 kernel: x86: Booting SMP configuration: Oct 2 19:16:04.157155 kernel: .... node #0, CPUs: #1 Oct 2 19:16:04.157167 kernel: kvm-clock: cpu 1, msr 71f8a041, secondary cpu clock Oct 2 19:16:04.157179 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Oct 2 19:16:04.157192 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Oct 2 19:16:04.157205 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:16:04.157217 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:16:04.157230 kernel: smpboot: Max logical packages: 1 Oct 2 19:16:04.157245 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Oct 2 19:16:04.157259 kernel: devtmpfs: initialized Oct 2 19:16:04.157273 kernel: x86/mm: Memory block size: 128MB Oct 2 19:16:04.157287 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:16:04.157301 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:16:04.157315 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:16:04.157329 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:16:04.157342 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:16:04.157409 kernel: audit: type=2000 audit(1696274163.361:1): state=initialized audit_enabled=0 res=1 Oct 2 19:16:04.157616 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:16:04.157634 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:16:04.157675 kernel: cpuidle: using governor menu Oct 2 19:16:04.157693 kernel: ACPI: bus type PCI registered Oct 2 19:16:04.157707 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:16:04.157721 kernel: dca service started, version 1.12.1 Oct 2 19:16:04.157734 kernel: PCI: Using configuration type 1 for base access Oct 2 19:16:04.157748 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:16:04.157760 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:16:04.157778 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:16:04.157791 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:16:04.157805 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:16:04.157818 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:16:04.157833 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:16:04.157848 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:16:04.157862 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:16:04.157875 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:16:04.157889 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Oct 2 19:16:04.157907 kernel: ACPI: Interpreter enabled Oct 2 19:16:04.157921 kernel: ACPI: PM: (supports S0 S5) Oct 2 19:16:04.157935 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:16:04.157949 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:16:04.157962 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Oct 2 19:16:04.157974 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:16:04.158188 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:16:04.158313 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Oct 2 19:16:04.158335 kernel: acpiphp: Slot [3] registered Oct 2 19:16:04.158350 kernel: acpiphp: Slot [4] registered Oct 2 19:16:04.158366 kernel: acpiphp: Slot [5] registered Oct 2 19:16:04.158380 kernel: acpiphp: Slot [6] registered Oct 2 19:16:04.158394 kernel: acpiphp: Slot [7] registered Oct 2 19:16:04.158406 kernel: acpiphp: Slot [8] registered Oct 2 19:16:04.158419 kernel: acpiphp: Slot [9] registered Oct 2 19:16:04.158431 kernel: acpiphp: Slot [10] registered Oct 2 19:16:04.158445 kernel: acpiphp: Slot [11] registered Oct 2 19:16:04.158461 kernel: acpiphp: Slot [12] registered Oct 2 19:16:04.158474 kernel: acpiphp: Slot [13] registered Oct 2 19:16:04.158487 kernel: acpiphp: Slot [14] registered Oct 2 19:16:04.158502 kernel: acpiphp: Slot [15] registered Oct 2 19:16:04.158517 kernel: acpiphp: Slot [16] registered Oct 2 19:16:04.158532 kernel: acpiphp: Slot [17] registered Oct 2 19:16:04.158546 kernel: acpiphp: Slot [18] registered Oct 2 19:16:04.158561 kernel: acpiphp: Slot [19] registered Oct 2 19:16:04.158576 kernel: acpiphp: Slot [20] registered Oct 2 19:16:04.158595 kernel: acpiphp: Slot [21] registered Oct 2 19:16:04.158609 kernel: acpiphp: Slot [22] registered Oct 2 19:16:04.158623 kernel: acpiphp: Slot [23] registered Oct 2 19:16:04.158638 kernel: acpiphp: Slot [24] registered Oct 2 19:16:04.158653 kernel: acpiphp: Slot [25] registered Oct 2 19:16:04.158667 kernel: acpiphp: Slot [26] registered Oct 2 19:16:04.158682 kernel: acpiphp: Slot [27] registered Oct 2 19:16:04.158697 kernel: acpiphp: Slot [28] registered Oct 2 19:16:04.158712 kernel: acpiphp: Slot [29] registered Oct 2 19:16:04.158727 kernel: acpiphp: Slot [30] registered Oct 2 19:16:04.158744 kernel: acpiphp: Slot [31] registered Oct 2 19:16:04.158760 kernel: PCI host bridge to bus 0000:00 Oct 2 19:16:04.158889 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:16:04.159029 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:16:04.159137 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:16:04.159239 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Oct 2 19:16:04.159349 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:16:04.159666 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:16:04.159806 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Oct 2 19:16:04.160048 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Oct 2 19:16:04.160186 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Oct 2 19:16:04.160315 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Oct 2 19:16:04.160622 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Oct 2 19:16:04.160764 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Oct 2 19:16:04.160970 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Oct 2 19:16:04.161128 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Oct 2 19:16:04.161248 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Oct 2 19:16:04.161369 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Oct 2 19:16:04.161490 kernel: pci 0000:00:01.3: quirk_piix4_acpi+0x0/0x170 took 11718 usecs Oct 2 19:16:04.161615 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Oct 2 19:16:04.161734 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Oct 2 19:16:04.161856 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Oct 2 19:16:04.162151 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:16:04.162280 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Oct 2 19:16:04.162395 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Oct 2 19:16:04.162515 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Oct 2 19:16:04.162631 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Oct 2 19:16:04.162651 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:16:04.162665 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:16:04.162679 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:16:04.162693 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:16:04.162706 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:16:04.162719 kernel: iommu: Default domain type: Translated Oct 2 19:16:04.162733 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:16:04.162847 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Oct 2 19:16:04.163949 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:16:04.164524 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Oct 2 19:16:04.164553 kernel: vgaarb: loaded Oct 2 19:16:04.164569 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:16:04.164585 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:16:04.164600 kernel: PTP clock support registered Oct 2 19:16:04.164615 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:16:04.164629 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:16:04.164645 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 2 19:16:04.164663 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Oct 2 19:16:04.164678 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Oct 2 19:16:04.164693 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Oct 2 19:16:04.164707 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:16:04.164721 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:16:04.164736 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:16:04.164751 kernel: pnp: PnP ACPI init Oct 2 19:16:04.164766 kernel: pnp: PnP ACPI: found 5 devices Oct 2 19:16:04.164780 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:16:04.164798 kernel: NET: Registered PF_INET protocol family Oct 2 19:16:04.164813 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:16:04.164828 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 2 19:16:04.164842 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:16:04.164858 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:16:04.164873 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 19:16:04.164887 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 2 19:16:04.164902 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:16:04.164917 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:16:04.164934 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:16:04.164949 kernel: NET: Registered PF_XDP protocol family Oct 2 19:16:04.165156 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:16:04.165273 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:16:04.165386 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:16:04.165497 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Oct 2 19:16:04.165630 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:16:04.165759 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Oct 2 19:16:04.165782 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:16:04.165798 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:16:04.165814 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Oct 2 19:16:04.165829 kernel: clocksource: Switched to clocksource tsc Oct 2 19:16:04.165844 kernel: Initialise system trusted keyrings Oct 2 19:16:04.165859 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 2 19:16:04.165874 kernel: Key type asymmetric registered Oct 2 19:16:04.165888 kernel: Asymmetric key parser 'x509' registered Oct 2 19:16:04.165903 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:16:04.165918 kernel: io scheduler mq-deadline registered Oct 2 19:16:04.165932 kernel: io scheduler kyber registered Oct 2 19:16:04.165948 kernel: io scheduler bfq registered Oct 2 19:16:04.165964 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:16:04.165991 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:16:04.166007 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:16:04.166023 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:16:04.166037 kernel: i8042: Warning: Keylock active Oct 2 19:16:04.166056 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:16:04.166069 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:16:04.166204 kernel: rtc_cmos 00:00: RTC can wake from S4 Oct 2 19:16:04.166400 kernel: rtc_cmos 00:00: registered as rtc0 Oct 2 19:16:04.166522 kernel: rtc_cmos 00:00: setting system clock to 2023-10-02T19:16:03 UTC (1696274163) Oct 2 19:16:04.166714 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Oct 2 19:16:04.166734 kernel: intel_pstate: CPU model not supported Oct 2 19:16:04.166750 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:16:04.166769 kernel: Segment Routing with IPv6 Oct 2 19:16:04.166783 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:16:04.166798 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:16:04.166814 kernel: Key type dns_resolver registered Oct 2 19:16:04.166828 kernel: IPI shorthand broadcast: enabled Oct 2 19:16:04.166845 kernel: sched_clock: Marking stable (603447876, 388707119)->(1186414458, -194259463) Oct 2 19:16:04.166860 kernel: registered taskstats version 1 Oct 2 19:16:04.166875 kernel: Loading compiled-in X.509 certificates Oct 2 19:16:04.166891 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:16:04.166908 kernel: Key type .fscrypt registered Oct 2 19:16:04.166924 kernel: Key type fscrypt-provisioning registered Oct 2 19:16:04.166939 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:16:04.166954 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:16:04.166969 kernel: ima: No architecture policies found Oct 2 19:16:04.167053 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:16:04.167070 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:16:04.167086 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:16:04.167140 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:16:04.167160 kernel: Run /init as init process Oct 2 19:16:04.167176 kernel: with arguments: Oct 2 19:16:04.167230 kernel: /init Oct 2 19:16:04.167246 kernel: with environment: Oct 2 19:16:04.167261 kernel: HOME=/ Oct 2 19:16:04.167311 kernel: TERM=linux Oct 2 19:16:04.167329 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:16:04.167349 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:16:04.167410 systemd[1]: Detected virtualization amazon. Oct 2 19:16:04.167511 systemd[1]: Detected architecture x86-64. Oct 2 19:16:04.167528 systemd[1]: Running in initrd. Oct 2 19:16:04.167582 systemd[1]: No hostname configured, using default hostname. Oct 2 19:16:04.167616 systemd[1]: Hostname set to . Oct 2 19:16:04.167751 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:16:04.167770 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:16:04.167788 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:16:04.167803 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:16:04.167822 systemd[1]: Reached target cryptsetup.target. Oct 2 19:16:04.167839 systemd[1]: Reached target paths.target. Oct 2 19:16:04.167855 systemd[1]: Reached target slices.target. Oct 2 19:16:04.167871 systemd[1]: Reached target swap.target. Oct 2 19:16:04.167887 systemd[1]: Reached target timers.target. Oct 2 19:16:04.167942 systemd[1]: Listening on iscsid.socket. Oct 2 19:16:04.167959 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:16:04.167974 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:16:04.167999 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:16:04.168011 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:16:04.168024 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:16:04.168044 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:16:04.168060 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:16:04.168074 systemd[1]: Reached target sockets.target. Oct 2 19:16:04.168088 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:16:04.168102 systemd[1]: Finished network-cleanup.service. Oct 2 19:16:04.168115 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:16:04.168130 systemd[1]: Starting systemd-journald.service... Oct 2 19:16:04.168146 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:16:04.168162 systemd[1]: Starting systemd-resolved.service... Oct 2 19:16:04.168178 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:16:04.168204 systemd-journald[185]: Journal started Oct 2 19:16:04.168285 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2f94f76fac29a7898cc4d6d0f2e97b) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:16:04.204067 systemd[1]: Started systemd-journald.service. Oct 2 19:16:04.177055 systemd-modules-load[186]: Inserted module 'overlay' Oct 2 19:16:04.380804 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:16:04.380843 kernel: Bridge firewalling registered Oct 2 19:16:04.380863 kernel: SCSI subsystem initialized Oct 2 19:16:04.380883 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:16:04.380905 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:16:04.380924 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:16:04.380940 kernel: audit: type=1130 audit(1696274164.373:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.222805 systemd-modules-load[186]: Inserted module 'br_netfilter' Oct 2 19:16:04.264961 systemd-resolved[187]: Positive Trust Anchors: Oct 2 19:16:04.264976 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:16:04.391694 kernel: audit: type=1130 audit(1696274164.383:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.265040 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:16:04.275563 systemd-resolved[187]: Defaulting to hostname 'linux'. Oct 2 19:16:04.406434 kernel: audit: type=1130 audit(1696274164.399:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.278290 systemd-modules-load[186]: Inserted module 'dm_multipath' Oct 2 19:16:04.414666 kernel: audit: type=1130 audit(1696274164.407:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.374219 systemd[1]: Started systemd-resolved.service. Oct 2 19:16:04.391868 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:16:04.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.401265 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:16:04.437415 kernel: audit: type=1130 audit(1696274164.414:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.437461 kernel: audit: type=1130 audit(1696274164.417:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.407736 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:16:04.415063 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:16:04.417859 systemd[1]: Reached target nss-lookup.target. Oct 2 19:16:04.443781 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:16:04.447251 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:16:04.449855 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:16:04.467285 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:16:04.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.475916 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:16:04.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.487061 kernel: audit: type=1130 audit(1696274164.466:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.487092 kernel: audit: type=1130 audit(1696274164.481:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.490956 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:16:04.493458 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:16:04.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.501044 kernel: audit: type=1130 audit(1696274164.492:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.524204 dracut-cmdline[205]: dracut-dracut-053 Oct 2 19:16:04.527747 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:16:04.655010 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:16:04.671018 kernel: iscsi: registered transport (tcp) Oct 2 19:16:04.696472 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:16:04.696540 kernel: QLogic iSCSI HBA Driver Oct 2 19:16:04.741878 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:16:04.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:04.744239 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:16:04.815029 kernel: raid6: avx512x4 gen() 15760 MB/s Oct 2 19:16:04.831033 kernel: raid6: avx512x4 xor() 7534 MB/s Oct 2 19:16:04.849039 kernel: raid6: avx512x2 gen() 14567 MB/s Oct 2 19:16:04.866040 kernel: raid6: avx512x2 xor() 16173 MB/s Oct 2 19:16:04.884023 kernel: raid6: avx512x1 gen() 12511 MB/s Oct 2 19:16:04.903042 kernel: raid6: avx512x1 xor() 14145 MB/s Oct 2 19:16:04.922048 kernel: raid6: avx2x4 gen() 9820 MB/s Oct 2 19:16:04.940091 kernel: raid6: avx2x4 xor() 4787 MB/s Oct 2 19:16:04.958040 kernel: raid6: avx2x2 gen() 11791 MB/s Oct 2 19:16:04.976040 kernel: raid6: avx2x2 xor() 14367 MB/s Oct 2 19:16:04.994034 kernel: raid6: avx2x1 gen() 10812 MB/s Oct 2 19:16:05.012042 kernel: raid6: avx2x1 xor() 13932 MB/s Oct 2 19:16:05.029040 kernel: raid6: sse2x4 gen() 8063 MB/s Oct 2 19:16:05.050325 kernel: raid6: sse2x4 xor() 3320 MB/s Oct 2 19:16:05.069036 kernel: raid6: sse2x2 gen() 2649 MB/s Oct 2 19:16:05.087030 kernel: raid6: sse2x2 xor() 2697 MB/s Oct 2 19:16:05.105145 kernel: raid6: sse2x1 gen() 6161 MB/s Oct 2 19:16:05.125989 kernel: raid6: sse2x1 xor() 3504 MB/s Oct 2 19:16:05.126052 kernel: raid6: using algorithm avx512x4 gen() 15760 MB/s Oct 2 19:16:05.126074 kernel: raid6: .... xor() 7534 MB/s, rmw enabled Oct 2 19:16:05.129236 kernel: raid6: using avx512x2 recovery algorithm Oct 2 19:16:05.157183 kernel: xor: automatically using best checksumming function avx Oct 2 19:16:05.295187 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:16:05.306301 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:16:05.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:05.309000 audit: BPF prog-id=7 op=LOAD Oct 2 19:16:05.309000 audit: BPF prog-id=8 op=LOAD Oct 2 19:16:05.310298 systemd[1]: Starting systemd-udevd.service... Oct 2 19:16:05.328255 systemd-udevd[383]: Using default interface naming scheme 'v252'. Oct 2 19:16:05.336894 systemd[1]: Started systemd-udevd.service. Oct 2 19:16:05.339216 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:16:05.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:05.363828 dracut-pre-trigger[385]: rd.md=0: removing MD RAID activation Oct 2 19:16:05.403048 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:16:05.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:05.406261 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:16:05.469565 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:16:05.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:05.539098 kernel: ena 0000:00:05.0: ENA device version: 0.10 Oct 2 19:16:05.539348 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Oct 2 19:16:05.550002 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:16:05.554107 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Oct 2 19:16:05.571505 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:16:05.571574 kernel: AES CTR mode by8 optimization enabled Oct 2 19:16:05.571595 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:b1:1e:3b:72:d9 Oct 2 19:16:05.577443 (udev-worker)[435]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:16:05.780831 kernel: nvme nvme0: pci function 0000:00:04.0 Oct 2 19:16:05.781082 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Oct 2 19:16:05.781101 kernel: nvme nvme0: 2/0/0 default/read/poll queues Oct 2 19:16:05.781242 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:16:05.781260 kernel: GPT:9289727 != 16777215 Oct 2 19:16:05.781277 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:16:05.781293 kernel: GPT:9289727 != 16777215 Oct 2 19:16:05.781313 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:16:05.781330 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:16:05.781346 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (433) Oct 2 19:16:05.719554 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:16:05.835184 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:16:05.865203 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:16:05.872911 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:16:05.875608 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:16:05.880408 systemd[1]: Starting disk-uuid.service... Oct 2 19:16:05.888858 disk-uuid[584]: Primary Header is updated. Oct 2 19:16:05.888858 disk-uuid[584]: Secondary Entries is updated. Oct 2 19:16:05.888858 disk-uuid[584]: Secondary Header is updated. Oct 2 19:16:05.895821 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:16:05.902045 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:16:05.908088 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:16:06.907295 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:16:06.907366 disk-uuid[585]: The operation has completed successfully. Oct 2 19:16:07.093481 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:16:07.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:07.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:07.093603 systemd[1]: Finished disk-uuid.service. Oct 2 19:16:07.102315 systemd[1]: Starting verity-setup.service... Oct 2 19:16:07.150274 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:16:07.278726 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:16:07.280785 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:16:07.282367 systemd[1]: Finished verity-setup.service. Oct 2 19:16:07.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:07.424445 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:16:07.424941 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:16:07.431581 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:16:07.432588 systemd[1]: Starting ignition-setup.service... Oct 2 19:16:07.438576 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:16:07.456009 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:16:07.456091 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:16:07.456111 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:16:07.482051 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:16:07.495927 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:16:07.523998 systemd[1]: Finished ignition-setup.service. Oct 2 19:16:07.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:07.526819 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:16:07.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:07.529000 audit: BPF prog-id=9 op=LOAD Oct 2 19:16:07.528149 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:16:07.531767 systemd[1]: Starting systemd-networkd.service... Oct 2 19:16:07.577703 systemd-networkd[1097]: lo: Link UP Oct 2 19:16:07.577853 systemd-networkd[1097]: lo: Gained carrier Oct 2 19:16:07.583438 systemd-networkd[1097]: Enumeration completed Oct 2 19:16:07.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:07.583604 systemd[1]: Started systemd-networkd.service. Oct 2 19:16:07.586829 systemd[1]: Reached target network.target. Oct 2 19:16:07.593850 systemd-networkd[1097]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:16:07.600525 systemd[1]: Starting iscsiuio.service... Oct 2 19:16:07.608134 systemd-networkd[1097]: eth0: Link UP Oct 2 19:16:07.608143 systemd-networkd[1097]: eth0: Gained carrier Oct 2 19:16:07.609525 systemd[1]: Started iscsiuio.service. Oct 2 19:16:07.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:07.618216 systemd[1]: Starting iscsid.service... Oct 2 19:16:07.623867 iscsid[1102]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:16:07.623867 iscsid[1102]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:16:07.623867 iscsid[1102]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:16:07.623867 iscsid[1102]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:16:07.623867 iscsid[1102]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:16:07.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:07.642131 iscsid[1102]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:16:07.626237 systemd[1]: Started iscsid.service. Oct 2 19:16:07.636770 systemd-networkd[1097]: eth0: DHCPv4 address 172.31.27.212/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:16:07.641824 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:16:07.672087 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:16:07.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:07.674589 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:16:07.676550 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:16:07.678724 systemd[1]: Reached target remote-fs.target. Oct 2 19:16:07.681676 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:16:07.694203 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:16:07.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:08.266547 ignition[1096]: Ignition 2.14.0 Oct 2 19:16:08.266560 ignition[1096]: Stage: fetch-offline Oct 2 19:16:08.266666 ignition[1096]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:16:08.266695 ignition[1096]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:16:08.300840 ignition[1096]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:16:08.309966 ignition[1096]: Ignition finished successfully Oct 2 19:16:08.314899 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:16:08.332832 kernel: kauditd_printk_skb: 18 callbacks suppressed Oct 2 19:16:08.332907 kernel: audit: type=1130 audit(1696274168.316:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:08.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:08.317872 systemd[1]: Starting ignition-fetch.service... Oct 2 19:16:08.347449 ignition[1121]: Ignition 2.14.0 Oct 2 19:16:08.347747 ignition[1121]: Stage: fetch Oct 2 19:16:08.347936 ignition[1121]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:16:08.347962 ignition[1121]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:16:08.358244 ignition[1121]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:16:08.359836 ignition[1121]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:16:08.373118 ignition[1121]: INFO : PUT result: OK Oct 2 19:16:08.375804 ignition[1121]: DEBUG : parsed url from cmdline: "" Oct 2 19:16:08.375804 ignition[1121]: INFO : no config URL provided Oct 2 19:16:08.378592 ignition[1121]: INFO : reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:16:08.378592 ignition[1121]: INFO : no config at "/usr/lib/ignition/user.ign" Oct 2 19:16:08.378592 ignition[1121]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:16:08.383129 ignition[1121]: INFO : PUT result: OK Oct 2 19:16:08.383129 ignition[1121]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Oct 2 19:16:08.387075 ignition[1121]: INFO : GET result: OK Oct 2 19:16:08.388267 ignition[1121]: DEBUG : parsing config with SHA512: e2f23d6cde6fee1ddef440824c752b72349eb85521f9531056ab2982190e7368d4b5eac523a5fc3a02145594ee5872f56f5052944a93b32d8cd691007ecd9118 Oct 2 19:16:08.418446 unknown[1121]: fetched base config from "system" Oct 2 19:16:08.418661 unknown[1121]: fetched base config from "system" Oct 2 19:16:08.418674 unknown[1121]: fetched user config from "aws" Oct 2 19:16:08.420299 ignition[1121]: fetch: fetch complete Oct 2 19:16:08.420307 ignition[1121]: fetch: fetch passed Oct 2 19:16:08.420366 ignition[1121]: Ignition finished successfully Oct 2 19:16:08.428406 systemd[1]: Finished ignition-fetch.service. Oct 2 19:16:08.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:08.433311 systemd[1]: Starting ignition-kargs.service... Oct 2 19:16:08.447929 kernel: audit: type=1130 audit(1696274168.428:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:08.464575 ignition[1127]: Ignition 2.14.0 Oct 2 19:16:08.464587 ignition[1127]: Stage: kargs Oct 2 19:16:08.464795 ignition[1127]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:16:08.464943 ignition[1127]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:16:08.477754 ignition[1127]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:16:08.480203 ignition[1127]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:16:08.484193 ignition[1127]: INFO : PUT result: OK Oct 2 19:16:08.489682 ignition[1127]: kargs: kargs passed Oct 2 19:16:08.489791 ignition[1127]: Ignition finished successfully Oct 2 19:16:08.493177 systemd[1]: Finished ignition-kargs.service. Oct 2 19:16:08.494452 systemd[1]: Starting ignition-disks.service... Oct 2 19:16:08.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:08.506503 kernel: audit: type=1130 audit(1696274168.492:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:08.511458 ignition[1133]: Ignition 2.14.0 Oct 2 19:16:08.511472 ignition[1133]: Stage: disks Oct 2 19:16:08.511688 ignition[1133]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:16:08.511718 ignition[1133]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:16:08.525020 ignition[1133]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:16:08.526907 ignition[1133]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:16:08.529086 ignition[1133]: INFO : PUT result: OK Oct 2 19:16:08.532262 ignition[1133]: disks: disks passed Oct 2 19:16:08.532317 ignition[1133]: Ignition finished successfully Oct 2 19:16:08.534088 systemd[1]: Finished ignition-disks.service. Oct 2 19:16:08.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:08.536630 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:16:08.542899 kernel: audit: type=1130 audit(1696274168.536:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:08.540805 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:16:08.543949 systemd[1]: Reached target local-fs.target. Oct 2 19:16:08.546097 systemd[1]: Reached target sysinit.target. Oct 2 19:16:08.547175 systemd[1]: Reached target basic.target. Oct 2 19:16:08.550665 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:16:08.582257 systemd-fsck[1141]: ROOT: clean, 603/553520 files, 56012/553472 blocks Oct 2 19:16:08.593245 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:16:08.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:08.598796 systemd[1]: Mounting sysroot.mount... Oct 2 19:16:08.607703 kernel: audit: type=1130 audit(1696274168.597:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:08.621048 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:16:08.622443 systemd[1]: Mounted sysroot.mount. Oct 2 19:16:08.622637 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:16:08.631272 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:16:08.632157 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:16:08.632204 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:16:08.632229 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:16:08.648253 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:16:08.662250 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:16:08.666953 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:16:08.682009 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1158) Oct 2 19:16:08.687276 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:16:08.687348 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:16:08.687367 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:16:08.687565 initrd-setup-root[1163]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:16:08.695351 initrd-setup-root[1187]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:16:08.704274 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:16:08.709041 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:16:08.718495 initrd-setup-root[1197]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:16:08.726649 initrd-setup-root[1205]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:16:08.750113 systemd-networkd[1097]: eth0: Gained IPv6LL Oct 2 19:16:08.895936 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:16:08.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:08.897798 systemd[1]: Starting ignition-mount.service... Oct 2 19:16:08.907209 kernel: audit: type=1130 audit(1696274168.896:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:08.910671 systemd[1]: Starting sysroot-boot.service... Oct 2 19:16:08.915085 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:16:08.917021 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:16:08.950021 ignition[1223]: INFO : Ignition 2.14.0 Oct 2 19:16:08.954346 ignition[1223]: INFO : Stage: mount Oct 2 19:16:08.957162 ignition[1223]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:16:08.959460 ignition[1223]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:16:08.986079 ignition[1223]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:16:08.986079 ignition[1223]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:16:08.988046 systemd[1]: Finished sysroot-boot.service. Oct 2 19:16:08.992635 ignition[1223]: INFO : PUT result: OK Oct 2 19:16:08.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:09.000260 kernel: audit: type=1130 audit(1696274168.993:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:09.001975 ignition[1223]: INFO : mount: mount passed Oct 2 19:16:09.003638 ignition[1223]: INFO : Ignition finished successfully Oct 2 19:16:09.003168 systemd[1]: Finished ignition-mount.service. Oct 2 19:16:09.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:09.009091 systemd[1]: Starting ignition-files.service... Oct 2 19:16:09.015553 kernel: audit: type=1130 audit(1696274169.006:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:09.020569 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:16:09.036018 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1233) Oct 2 19:16:09.039593 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:16:09.039694 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:16:09.039716 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:16:09.056128 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:16:09.072849 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:16:09.090168 ignition[1252]: INFO : Ignition 2.14.0 Oct 2 19:16:09.090168 ignition[1252]: INFO : Stage: files Oct 2 19:16:09.093006 ignition[1252]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:16:09.093006 ignition[1252]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:16:09.105425 ignition[1252]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:16:09.108379 ignition[1252]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:16:09.115950 ignition[1252]: INFO : PUT result: OK Oct 2 19:16:09.124631 ignition[1252]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:16:09.133426 ignition[1252]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:16:09.133426 ignition[1252]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:16:09.150260 ignition[1252]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:16:09.152137 ignition[1252]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:16:09.153968 unknown[1252]: wrote ssh authorized keys file for user: core Oct 2 19:16:09.155418 ignition[1252]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:16:09.158314 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:16:09.161371 ignition[1252]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:16:09.321365 ignition[1252]: INFO : GET result: OK Oct 2 19:16:09.623271 ignition[1252]: DEBUG : file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:16:09.627390 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:16:09.627390 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:16:09.627390 ignition[1252]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:16:09.880749 ignition[1252]: INFO : GET result: OK Oct 2 19:16:10.027970 ignition[1252]: DEBUG : file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:16:10.031079 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:16:10.031079 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:16:10.031079 ignition[1252]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:16:10.044322 ignition[1252]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1929926801" Oct 2 19:16:10.048699 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1254) Oct 2 19:16:10.048747 ignition[1252]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1929926801": device or resource busy Oct 2 19:16:10.048747 ignition[1252]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1929926801", trying btrfs: device or resource busy Oct 2 19:16:10.048747 ignition[1252]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1929926801" Oct 2 19:16:10.063443 ignition[1252]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1929926801" Oct 2 19:16:10.066445 ignition[1252]: INFO : op(3): [started] unmounting "/mnt/oem1929926801" Oct 2 19:16:10.069472 ignition[1252]: INFO : op(3): [finished] unmounting "/mnt/oem1929926801" Oct 2 19:16:10.069472 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:16:10.069472 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:16:10.069472 ignition[1252]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:16:10.085808 systemd[1]: mnt-oem1929926801.mount: Deactivated successfully. Oct 2 19:16:10.198678 ignition[1252]: INFO : GET result: OK Oct 2 19:16:11.141065 ignition[1252]: DEBUG : file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Oct 2 19:16:11.145089 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:16:11.145089 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:16:11.145089 ignition[1252]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:16:11.228293 ignition[1252]: INFO : GET result: OK Oct 2 19:16:13.502883 ignition[1252]: DEBUG : file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Oct 2 19:16:13.508110 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:16:13.508110 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:16:13.508110 ignition[1252]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:16:13.607635 ignition[1252]: INFO : GET result: OK Oct 2 19:16:15.121936 ignition[1252]: DEBUG : file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Oct 2 19:16:15.126454 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:16:15.126454 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:16:15.126454 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:16:15.126454 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:16:15.126454 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:16:15.126454 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:16:15.126454 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:16:15.126454 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:16:15.126454 ignition[1252]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:16:15.165079 ignition[1252]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3065022640" Oct 2 19:16:15.166847 ignition[1252]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3065022640": device or resource busy Oct 2 19:16:15.166847 ignition[1252]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3065022640", trying btrfs: device or resource busy Oct 2 19:16:15.166847 ignition[1252]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3065022640" Oct 2 19:16:15.173678 ignition[1252]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3065022640" Oct 2 19:16:15.173678 ignition[1252]: INFO : op(6): [started] unmounting "/mnt/oem3065022640" Oct 2 19:16:15.173678 ignition[1252]: INFO : op(6): [finished] unmounting "/mnt/oem3065022640" Oct 2 19:16:15.173678 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:16:15.173678 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:16:15.173678 ignition[1252]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:16:15.192660 ignition[1252]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem262265021" Oct 2 19:16:15.194668 ignition[1252]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem262265021": device or resource busy Oct 2 19:16:15.194668 ignition[1252]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem262265021", trying btrfs: device or resource busy Oct 2 19:16:15.194668 ignition[1252]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem262265021" Oct 2 19:16:15.203864 ignition[1252]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem262265021" Oct 2 19:16:15.203864 ignition[1252]: INFO : op(9): [started] unmounting "/mnt/oem262265021" Oct 2 19:16:15.203864 ignition[1252]: INFO : op(9): [finished] unmounting "/mnt/oem262265021" Oct 2 19:16:15.203864 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:16:15.203864 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:16:15.203864 ignition[1252]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:16:15.226996 ignition[1252]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2306288166" Oct 2 19:16:15.229325 ignition[1252]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2306288166": device or resource busy Oct 2 19:16:15.231568 ignition[1252]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2306288166", trying btrfs: device or resource busy Oct 2 19:16:15.231568 ignition[1252]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2306288166" Oct 2 19:16:15.243050 ignition[1252]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2306288166" Oct 2 19:16:15.245082 ignition[1252]: INFO : op(c): [started] unmounting "/mnt/oem2306288166" Oct 2 19:16:15.248553 systemd[1]: mnt-oem2306288166.mount: Deactivated successfully. Oct 2 19:16:15.251483 ignition[1252]: INFO : op(c): [finished] unmounting "/mnt/oem2306288166" Oct 2 19:16:15.253854 ignition[1252]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:16:15.253854 ignition[1252]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:16:15.253854 ignition[1252]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:16:15.253854 ignition[1252]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(12): [started] processing unit "nvidia.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(12): [finished] processing unit "nvidia.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(13): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(13): op(14): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(13): op(14): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(13): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(15): [started] processing unit "prepare-critools.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(15): op(16): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(15): op(16): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(15): [finished] processing unit "prepare-critools.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(17): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(17): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(18): [started] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(18): [finished] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Oct 2 19:16:15.263813 ignition[1252]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Oct 2 19:16:15.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.321053 ignition[1252]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:16:15.321053 ignition[1252]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:16:15.321053 ignition[1252]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:16:15.321053 ignition[1252]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:16:15.321053 ignition[1252]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:16:15.321053 ignition[1252]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:16:15.321053 ignition[1252]: INFO : files: files passed Oct 2 19:16:15.321053 ignition[1252]: INFO : Ignition finished successfully Oct 2 19:16:15.347105 kernel: audit: type=1130 audit(1696274175.320:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.301612 systemd[1]: Finished ignition-files.service. Oct 2 19:16:15.356496 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:16:15.372620 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:16:15.374504 systemd[1]: Starting ignition-quench.service... Oct 2 19:16:15.398041 kernel: audit: type=1130 audit(1696274175.388:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.398069 kernel: audit: type=1131 audit(1696274175.388:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.398241 initrd-setup-root-after-ignition[1277]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:16:15.384713 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:16:15.384862 systemd[1]: Finished ignition-quench.service. Oct 2 19:16:15.405167 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:16:15.407790 systemd[1]: Reached target ignition-complete.target. Oct 2 19:16:15.415641 kernel: audit: type=1130 audit(1696274175.406:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.416543 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:16:15.438821 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:16:15.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.439017 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:16:15.455969 kernel: audit: type=1130 audit(1696274175.440:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.456040 kernel: audit: type=1131 audit(1696274175.440:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.440708 systemd[1]: Reached target initrd-fs.target. Oct 2 19:16:15.453509 systemd[1]: Reached target initrd.target. Oct 2 19:16:15.456107 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:16:15.457272 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:16:15.475254 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:16:15.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.478632 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:16:15.497937 kernel: audit: type=1130 audit(1696274175.477:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.504316 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:16:15.506895 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:16:15.509070 systemd[1]: Stopped target timers.target. Oct 2 19:16:15.510181 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:16:15.510302 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:16:15.523204 kernel: audit: type=1131 audit(1696274175.514:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.514867 systemd[1]: Stopped target initrd.target. Oct 2 19:16:15.523525 systemd[1]: Stopped target basic.target. Oct 2 19:16:15.526320 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:16:15.530471 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:16:15.533689 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:16:15.537430 systemd[1]: Stopped target remote-fs.target. Oct 2 19:16:15.539298 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:16:15.541437 systemd[1]: Stopped target sysinit.target. Oct 2 19:16:15.543624 systemd[1]: Stopped target local-fs.target. Oct 2 19:16:15.546212 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:16:15.548494 systemd[1]: Stopped target swap.target. Oct 2 19:16:15.550567 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:16:15.550693 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:16:15.562102 kernel: audit: type=1131 audit(1696274175.556:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.562147 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:16:15.563400 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:16:15.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.563529 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:16:15.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.564845 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:16:15.575896 kernel: audit: type=1131 audit(1696274175.564:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.564951 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:16:15.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.567229 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:16:15.567325 systemd[1]: Stopped ignition-files.service. Oct 2 19:16:15.580280 systemd[1]: Stopping ignition-mount.service... Oct 2 19:16:15.581230 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:16:15.581352 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:16:15.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.583393 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:16:15.584684 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:16:15.584818 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:16:15.586348 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:16:15.586441 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:16:15.589706 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:16:15.589793 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:16:15.612181 ignition[1290]: INFO : Ignition 2.14.0 Oct 2 19:16:15.612181 ignition[1290]: INFO : Stage: umount Oct 2 19:16:15.614591 ignition[1290]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:16:15.614591 ignition[1290]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:16:15.627289 ignition[1290]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:16:15.629604 ignition[1290]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:16:15.630543 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:16:15.630652 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:16:15.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.634716 ignition[1290]: INFO : PUT result: OK Oct 2 19:16:15.638000 ignition[1290]: INFO : umount: umount passed Oct 2 19:16:15.639209 ignition[1290]: INFO : Ignition finished successfully Oct 2 19:16:15.641106 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:16:15.641230 systemd[1]: Stopped ignition-mount.service. Oct 2 19:16:15.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.644591 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:16:15.644666 systemd[1]: Stopped ignition-disks.service. Oct 2 19:16:15.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.647778 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:16:15.647956 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:16:15.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.653522 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:16:15.653656 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:16:15.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.656351 systemd[1]: Stopped target network.target. Oct 2 19:16:15.657314 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:16:15.658146 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:16:15.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.662752 systemd[1]: Stopped target paths.target. Oct 2 19:16:15.665042 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:16:15.668129 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:16:15.670882 systemd[1]: Stopped target slices.target. Oct 2 19:16:15.673500 systemd[1]: Stopped target sockets.target. Oct 2 19:16:15.676031 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:16:15.676076 systemd[1]: Closed iscsid.socket. Oct 2 19:16:15.680925 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:16:15.680963 systemd[1]: Closed iscsiuio.socket. Oct 2 19:16:15.684287 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:16:15.684352 systemd[1]: Stopped ignition-setup.service. Oct 2 19:16:15.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.687637 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:16:15.687698 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:16:15.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.694335 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:16:15.695758 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:16:15.700698 systemd-networkd[1097]: eth0: DHCPv6 lease lost Oct 2 19:16:15.708112 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:16:15.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.708263 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:16:15.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.713000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:16:15.713000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:16:15.710027 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:16:15.710175 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:16:15.712696 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:16:15.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.712814 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:16:15.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.715615 systemd[1]: Stopping network-cleanup.service... Oct 2 19:16:15.718093 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:16:15.718187 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:16:15.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.721421 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:16:15.721515 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:16:15.723921 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:16:15.723966 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:16:15.725468 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:16:15.733063 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:16:15.733323 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:16:15.736116 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:16:15.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.736220 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:16:15.742124 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:16:15.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.742192 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:16:15.746885 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:16:15.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.747714 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:16:15.754626 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:16:15.754703 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:16:15.769961 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:16:15.770129 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:16:15.793495 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:16:15.811210 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:16:15.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.811308 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:16:15.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.820060 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:16:15.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:15.820304 systemd[1]: Stopped network-cleanup.service. Oct 2 19:16:15.829964 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:16:15.830094 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:16:15.848359 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:16:15.855442 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:16:15.882752 systemd[1]: Switching root. Oct 2 19:16:15.909452 systemd-journald[185]: Journal stopped Oct 2 19:16:21.625172 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Oct 2 19:16:21.625254 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:16:21.625270 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:16:21.632375 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:16:21.632405 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:16:21.632424 kernel: SELinux: policy capability open_perms=1 Oct 2 19:16:21.632444 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:16:21.632498 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:16:21.632518 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:16:21.632538 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:16:21.632566 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:16:21.632592 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:16:21.632614 systemd[1]: Successfully loaded SELinux policy in 97.787ms. Oct 2 19:16:21.632639 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 19.859ms. Oct 2 19:16:21.632664 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:16:21.632689 systemd[1]: Detected virtualization amazon. Oct 2 19:16:21.632709 systemd[1]: Detected architecture x86-64. Oct 2 19:16:21.632729 systemd[1]: Detected first boot. Oct 2 19:16:21.632748 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:16:21.632765 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:16:21.632789 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:16:21.632816 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:16:21.632841 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:16:21.633130 kernel: kauditd_printk_skb: 37 callbacks suppressed Oct 2 19:16:21.633154 kernel: audit: type=1334 audit(1696274181.267:84): prog-id=12 op=LOAD Oct 2 19:16:21.633172 kernel: audit: type=1334 audit(1696274181.267:85): prog-id=3 op=UNLOAD Oct 2 19:16:21.633193 kernel: audit: type=1334 audit(1696274181.268:86): prog-id=13 op=LOAD Oct 2 19:16:21.633211 kernel: audit: type=1334 audit(1696274181.269:87): prog-id=14 op=LOAD Oct 2 19:16:21.633230 kernel: audit: type=1334 audit(1696274181.270:88): prog-id=4 op=UNLOAD Oct 2 19:16:21.633248 kernel: audit: type=1334 audit(1696274181.270:89): prog-id=5 op=UNLOAD Oct 2 19:16:21.633269 kernel: audit: type=1131 audit(1696274181.274:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.633292 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:16:21.633314 systemd[1]: Stopped iscsiuio.service. Oct 2 19:16:21.633336 kernel: audit: type=1334 audit(1696274181.288:91): prog-id=12 op=UNLOAD Oct 2 19:16:21.633355 kernel: audit: type=1131 audit(1696274181.292:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.633376 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:16:21.633395 systemd[1]: Stopped iscsid.service. Oct 2 19:16:21.633416 kernel: audit: type=1131 audit(1696274181.304:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.633436 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:16:21.633458 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:16:21.633479 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:16:21.633500 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:16:21.633528 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:16:21.633549 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:16:21.633570 systemd[1]: Created slice system-getty.slice. Oct 2 19:16:21.633591 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:16:21.633611 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:16:21.633632 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:16:21.633653 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:16:21.633671 systemd[1]: Created slice user.slice. Oct 2 19:16:21.633689 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:16:21.635446 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:16:21.635477 systemd[1]: Set up automount boot.automount. Oct 2 19:16:21.635498 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:16:21.635517 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:16:21.635536 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:16:21.635557 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:16:21.635576 systemd[1]: Reached target integritysetup.target. Oct 2 19:16:21.635596 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:16:21.635622 systemd[1]: Reached target remote-fs.target. Oct 2 19:16:21.635647 systemd[1]: Reached target slices.target. Oct 2 19:16:21.635666 systemd[1]: Reached target swap.target. Oct 2 19:16:21.635686 systemd[1]: Reached target torcx.target. Oct 2 19:16:21.635706 systemd[1]: Reached target veritysetup.target. Oct 2 19:16:21.635726 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:16:21.635745 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:16:21.635766 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:16:21.635785 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:16:21.635803 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:16:21.635829 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:16:21.635852 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:16:21.635873 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:16:21.635902 systemd[1]: Mounting media.mount... Oct 2 19:16:21.635924 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:16:21.635947 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:16:21.635968 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:16:21.636061 systemd[1]: Mounting tmp.mount... Oct 2 19:16:21.636082 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:16:21.636103 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:16:21.636122 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:16:21.636142 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:16:21.636160 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:16:21.636179 systemd[1]: Starting modprobe@drm.service... Oct 2 19:16:21.636202 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:16:21.636221 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:16:21.636239 systemd[1]: Starting modprobe@loop.service... Oct 2 19:16:21.636260 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:16:21.636286 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:16:21.636306 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:16:21.636325 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:16:21.636344 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:16:21.640837 systemd[1]: Stopped systemd-journald.service. Oct 2 19:16:21.640875 systemd[1]: Starting systemd-journald.service... Oct 2 19:16:21.640896 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:16:21.640915 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:16:21.640934 kernel: loop: module loaded Oct 2 19:16:21.640953 kernel: fuse: init (API version 7.34) Oct 2 19:16:21.640971 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:16:21.641251 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:16:21.641271 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:16:21.641291 systemd[1]: Stopped verity-setup.service. Oct 2 19:16:21.641315 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:16:21.641334 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:16:21.641353 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:16:21.641370 systemd[1]: Mounted media.mount. Oct 2 19:16:21.641393 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:16:21.641412 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:16:21.641430 systemd[1]: Mounted tmp.mount. Oct 2 19:16:21.641448 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:16:21.641473 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:16:21.641501 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:16:21.641521 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:16:21.641542 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:16:21.641560 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:16:21.641579 systemd[1]: Finished modprobe@drm.service. Oct 2 19:16:21.641607 systemd-journald[1398]: Journal started Oct 2 19:16:21.641687 systemd-journald[1398]: Runtime Journal (/run/log/journal/ec2f94f76fac29a7898cc4d6d0f2e97b) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:16:21.647131 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:16:21.647216 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:16:16.545000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:16:16.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:16:16.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:16:16.767000 audit: BPF prog-id=10 op=LOAD Oct 2 19:16:16.767000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:16:16.767000 audit: BPF prog-id=11 op=LOAD Oct 2 19:16:16.767000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:16:21.267000 audit: BPF prog-id=12 op=LOAD Oct 2 19:16:21.267000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:16:21.268000 audit: BPF prog-id=13 op=LOAD Oct 2 19:16:21.269000 audit: BPF prog-id=14 op=LOAD Oct 2 19:16:21.270000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:16:21.270000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:16:21.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.288000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:16:21.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.555000 audit: BPF prog-id=15 op=LOAD Oct 2 19:16:21.555000 audit: BPF prog-id=16 op=LOAD Oct 2 19:16:21.555000 audit: BPF prog-id=17 op=LOAD Oct 2 19:16:21.555000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:16:21.555000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:16:21.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.618000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:16:21.618000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffcd1b56b60 a2=4000 a3=7ffcd1b56bfc items=0 ppid=1 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:21.618000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:16:21.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.651031 systemd[1]: Started systemd-journald.service. Oct 2 19:16:21.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:17.018187 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:16:21.265093 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:16:17.018813 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:16:21.273623 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:16:17.018833 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:16:21.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:17.018865 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:16:21.652558 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:16:17.018875 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:16:21.652810 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:16:17.018908 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:16:17.018922 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:16:17.019136 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:16:21.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:17.019177 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:16:21.654542 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:16:17.019190 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:16:21.654764 systemd[1]: Finished modprobe@loop.service. Oct 2 19:16:17.019868 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:16:21.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:17.019904 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:16:21.656464 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:16:17.019922 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:16:17.019937 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:16:21.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:17.019954 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:16:21.658182 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:16:17.019968 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:17Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:16:21.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.660171 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:16:20.673148 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:20Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:16:20.673423 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:20Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:16:20.673570 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:20Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:16:21.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:20.673805 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:20Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:16:21.662210 systemd[1]: Reached target network-pre.target. Oct 2 19:16:20.673855 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:20Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:16:20.673920 /usr/lib/systemd/system-generators/torcx-generator[1323]: time="2023-10-02T19:16:20Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:16:21.665354 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:16:21.668217 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:16:21.672200 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:16:21.674588 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:16:21.677710 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:16:21.679039 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:16:21.680566 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:16:21.681748 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:16:21.683302 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:16:21.686574 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:16:21.688271 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:16:21.706364 systemd-journald[1398]: Time spent on flushing to /var/log/journal/ec2f94f76fac29a7898cc4d6d0f2e97b is 94.319ms for 1194 entries. Oct 2 19:16:21.706364 systemd-journald[1398]: System Journal (/var/log/journal/ec2f94f76fac29a7898cc4d6d0f2e97b) is 8.0M, max 195.6M, 187.6M free. Oct 2 19:16:21.824998 systemd-journald[1398]: Received client request to flush runtime journal. Oct 2 19:16:21.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.718280 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:16:21.720269 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:16:21.723895 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:16:21.825798 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:16:21.827951 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:16:21.831966 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:16:21.834515 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:16:21.838716 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:16:21.856105 udevadm[1437]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 19:16:21.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:21.951573 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:16:22.518041 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:16:22.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:22.519000 audit: BPF prog-id=18 op=LOAD Oct 2 19:16:22.519000 audit: BPF prog-id=19 op=LOAD Oct 2 19:16:22.519000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:16:22.519000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:16:22.520967 systemd[1]: Starting systemd-udevd.service... Oct 2 19:16:22.545140 systemd-udevd[1440]: Using default interface naming scheme 'v252'. Oct 2 19:16:22.616706 systemd[1]: Started systemd-udevd.service. Oct 2 19:16:22.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:22.619000 audit: BPF prog-id=20 op=LOAD Oct 2 19:16:22.621350 systemd[1]: Starting systemd-networkd.service... Oct 2 19:16:22.640000 audit: BPF prog-id=21 op=LOAD Oct 2 19:16:22.640000 audit: BPF prog-id=22 op=LOAD Oct 2 19:16:22.640000 audit: BPF prog-id=23 op=LOAD Oct 2 19:16:22.642596 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:16:22.689150 systemd[1]: Started systemd-userdbd.service. Oct 2 19:16:22.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:22.697947 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:16:22.717685 (udev-worker)[1448]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:16:22.799003 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Oct 2 19:16:22.816000 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:16:22.828036 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Oct 2 19:16:22.845562 kernel: ACPI: button: Sleep Button [SLPF] Oct 2 19:16:22.856811 systemd-networkd[1446]: lo: Link UP Oct 2 19:16:22.856821 systemd-networkd[1446]: lo: Gained carrier Oct 2 19:16:22.857680 systemd-networkd[1446]: Enumeration completed Oct 2 19:16:22.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:22.857809 systemd[1]: Started systemd-networkd.service. Oct 2 19:16:22.857825 systemd-networkd[1446]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:16:22.861496 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:16:22.864034 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:16:22.864245 systemd-networkd[1446]: eth0: Link UP Oct 2 19:16:22.864515 systemd-networkd[1446]: eth0: Gained carrier Oct 2 19:16:22.877151 systemd-networkd[1446]: eth0: DHCPv4 address 172.31.27.212/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:16:22.828000 audit[1443]: AVC avc: denied { confidentiality } for pid=1443 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:16:22.828000 audit[1443]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a833a662a0 a1=32194 a2=7f33cb578bc5 a3=5 items=106 ppid=1440 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:22.828000 audit: CWD cwd="/" Oct 2 19:16:22.828000 audit: PATH item=0 name=(null) inode=14974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=1 name=(null) inode=14975 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=2 name=(null) inode=14974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=3 name=(null) inode=14976 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=4 name=(null) inode=14974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=5 name=(null) inode=14977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=6 name=(null) inode=14977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=7 name=(null) inode=14978 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=8 name=(null) inode=14977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=9 name=(null) inode=14979 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=10 name=(null) inode=14977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=11 name=(null) inode=14980 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=12 name=(null) inode=14977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=13 name=(null) inode=14981 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=14 name=(null) inode=14977 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=15 name=(null) inode=14982 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=16 name=(null) inode=14974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=17 name=(null) inode=14983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=18 name=(null) inode=14983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=19 name=(null) inode=14984 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=20 name=(null) inode=14983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=21 name=(null) inode=14985 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=22 name=(null) inode=14983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=23 name=(null) inode=14986 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=24 name=(null) inode=14983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=25 name=(null) inode=14987 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=26 name=(null) inode=14983 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=27 name=(null) inode=14988 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=28 name=(null) inode=14974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=29 name=(null) inode=14989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=30 name=(null) inode=14989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=31 name=(null) inode=14990 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=32 name=(null) inode=14989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=33 name=(null) inode=14991 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=34 name=(null) inode=14989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=35 name=(null) inode=14992 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=36 name=(null) inode=14989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=37 name=(null) inode=14993 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=38 name=(null) inode=14989 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=39 name=(null) inode=14994 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=40 name=(null) inode=14974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=41 name=(null) inode=14995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=42 name=(null) inode=14995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=43 name=(null) inode=14996 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=44 name=(null) inode=14995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=45 name=(null) inode=14997 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=46 name=(null) inode=14995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=47 name=(null) inode=14998 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=48 name=(null) inode=14995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=49 name=(null) inode=14999 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=50 name=(null) inode=14995 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=51 name=(null) inode=15000 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=52 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=53 name=(null) inode=15001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=54 name=(null) inode=15001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=55 name=(null) inode=15002 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=56 name=(null) inode=15001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=57 name=(null) inode=15003 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=58 name=(null) inode=15001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=59 name=(null) inode=15004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=60 name=(null) inode=15004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=61 name=(null) inode=15005 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=62 name=(null) inode=15004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=63 name=(null) inode=15006 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=64 name=(null) inode=15004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=65 name=(null) inode=15007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=66 name=(null) inode=15004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=67 name=(null) inode=15008 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=68 name=(null) inode=15004 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=69 name=(null) inode=15009 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=70 name=(null) inode=15001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=71 name=(null) inode=15010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=72 name=(null) inode=15010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=73 name=(null) inode=15011 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=74 name=(null) inode=15010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=75 name=(null) inode=15012 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=76 name=(null) inode=15010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=77 name=(null) inode=15013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=78 name=(null) inode=15010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=79 name=(null) inode=15014 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=80 name=(null) inode=15010 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=81 name=(null) inode=15015 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=82 name=(null) inode=15001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=83 name=(null) inode=15016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=84 name=(null) inode=15016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=85 name=(null) inode=15017 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=86 name=(null) inode=15016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=87 name=(null) inode=15018 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=88 name=(null) inode=15016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=89 name=(null) inode=15019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=90 name=(null) inode=15016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=91 name=(null) inode=15020 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=92 name=(null) inode=15016 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=93 name=(null) inode=15021 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=94 name=(null) inode=15001 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=95 name=(null) inode=15022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=96 name=(null) inode=15022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=97 name=(null) inode=15023 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=98 name=(null) inode=15022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=99 name=(null) inode=15024 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=100 name=(null) inode=15022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=101 name=(null) inode=15025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=102 name=(null) inode=15022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=103 name=(null) inode=15026 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=104 name=(null) inode=15022 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PATH item=105 name=(null) inode=15027 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:22.828000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:16:22.930017 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Oct 2 19:16:22.951013 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5 Oct 2 19:16:22.977007 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1450) Oct 2 19:16:22.999008 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:16:23.135068 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:16:23.245286 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:16:23.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:23.248784 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:16:23.341736 lvm[1554]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:16:23.376373 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:16:23.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:23.377950 systemd[1]: Reached target cryptsetup.target. Oct 2 19:16:23.380394 systemd[1]: Starting lvm2-activation.service... Oct 2 19:16:23.393236 lvm[1555]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:16:23.440443 systemd[1]: Finished lvm2-activation.service. Oct 2 19:16:23.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:23.441721 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:16:23.443053 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:16:23.443096 systemd[1]: Reached target local-fs.target. Oct 2 19:16:23.444175 systemd[1]: Reached target machines.target. Oct 2 19:16:23.446858 systemd[1]: Starting ldconfig.service... Oct 2 19:16:23.448380 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:16:23.448462 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:16:23.449968 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:16:23.456259 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:16:23.459873 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:16:23.461284 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:16:23.461388 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:16:23.463539 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:16:23.489479 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1557 (bootctl) Oct 2 19:16:23.491240 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:16:23.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:23.526748 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:16:23.541026 systemd-tmpfiles[1560]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:16:23.590647 systemd-tmpfiles[1560]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:16:23.620647 systemd-tmpfiles[1560]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:16:23.635608 systemd-fsck[1565]: fsck.fat 4.2 (2021-01-31) Oct 2 19:16:23.635608 systemd-fsck[1565]: /dev/nvme0n1p1: 789 files, 115069/258078 clusters Oct 2 19:16:23.639241 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:16:23.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:23.651286 systemd[1]: Mounting boot.mount... Oct 2 19:16:23.690417 systemd[1]: Mounted boot.mount. Oct 2 19:16:23.731811 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:16:23.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:23.925953 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:16:23.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:23.937598 systemd[1]: Starting audit-rules.service... Oct 2 19:16:23.952000 audit: BPF prog-id=24 op=LOAD Oct 2 19:16:23.958000 audit: BPF prog-id=25 op=LOAD Oct 2 19:16:23.946071 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:16:23.949293 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:16:23.954947 systemd[1]: Starting systemd-resolved.service... Oct 2 19:16:23.961476 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:16:23.965839 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:16:23.972000 audit[1585]: SYSTEM_BOOT pid=1585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:16:23.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:23.979459 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:16:24.009154 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:16:24.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:24.010596 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:16:24.089446 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:16:24.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:24.144000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:16:24.144000 audit[1599]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdaa3b1ca0 a2=420 a3=0 items=0 ppid=1579 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:24.144000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:16:24.145809 systemd[1]: Finished audit-rules.service. Oct 2 19:16:24.148917 augenrules[1599]: No rules Oct 2 19:16:24.146079 systemd-resolved[1582]: Positive Trust Anchors: Oct 2 19:16:24.146090 systemd-resolved[1582]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:16:24.146183 systemd-resolved[1582]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:16:24.185363 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:16:24.189158 systemd[1]: Reached target time-set.target. Oct 2 19:16:25.319971 systemd-timesyncd[1584]: Contacted time server 23.157.160.168:123 (0.flatcar.pool.ntp.org). Oct 2 19:16:25.320440 systemd-timesyncd[1584]: Initial clock synchronization to Mon 2023-10-02 19:16:25.319806 UTC. Oct 2 19:16:25.337041 systemd-resolved[1582]: Defaulting to hostname 'linux'. Oct 2 19:16:25.344507 systemd[1]: Started systemd-resolved.service. Oct 2 19:16:25.345890 systemd[1]: Reached target network.target. Oct 2 19:16:25.348539 systemd[1]: Reached target nss-lookup.target. Oct 2 19:16:25.393609 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:16:25.394437 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:16:25.641032 systemd-networkd[1446]: eth0: Gained IPv6LL Oct 2 19:16:25.643449 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:16:25.645049 systemd[1]: Reached target network-online.target. Oct 2 19:16:25.765048 ldconfig[1556]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:16:25.774031 systemd[1]: Finished ldconfig.service. Oct 2 19:16:25.776787 systemd[1]: Starting systemd-update-done.service... Oct 2 19:16:25.785366 systemd[1]: Finished systemd-update-done.service. Oct 2 19:16:25.787269 systemd[1]: Reached target sysinit.target. Oct 2 19:16:25.788877 systemd[1]: Started motdgen.path. Oct 2 19:16:25.795663 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:16:25.800837 systemd[1]: Started logrotate.timer. Oct 2 19:16:25.803488 systemd[1]: Started mdadm.timer. Oct 2 19:16:25.805209 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:16:25.808026 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:16:25.808071 systemd[1]: Reached target paths.target. Oct 2 19:16:25.809505 systemd[1]: Reached target timers.target. Oct 2 19:16:25.813424 systemd[1]: Listening on dbus.socket. Oct 2 19:16:25.820528 systemd[1]: Starting docker.socket... Oct 2 19:16:25.825205 systemd[1]: Listening on sshd.socket. Oct 2 19:16:25.826406 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:16:25.827202 systemd[1]: Listening on docker.socket. Oct 2 19:16:25.831494 systemd[1]: Reached target sockets.target. Oct 2 19:16:25.835151 systemd[1]: Reached target basic.target. Oct 2 19:16:25.837564 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:16:25.837588 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:16:25.841103 systemd[1]: Started amazon-ssm-agent.service. Oct 2 19:16:25.848898 systemd[1]: Starting containerd.service... Oct 2 19:16:25.854452 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:16:25.864137 systemd[1]: Starting dbus.service... Oct 2 19:16:25.878380 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:16:25.908937 systemd[1]: Starting extend-filesystems.service... Oct 2 19:16:25.912833 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:16:25.916788 systemd[1]: Starting motdgen.service... Oct 2 19:16:25.924420 systemd[1]: Started nvidia.service. Oct 2 19:16:25.929780 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:16:25.938395 systemd[1]: Starting prepare-critools.service... Oct 2 19:16:25.941931 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:16:25.944784 systemd[1]: Starting sshd-keygen.service... Oct 2 19:16:25.949233 systemd[1]: Starting systemd-logind.service... Oct 2 19:16:25.951995 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:16:25.952086 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:16:25.952953 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:16:25.954020 systemd[1]: Starting update-engine.service... Oct 2 19:16:25.956692 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:16:25.984431 jq[1628]: true Oct 2 19:16:26.027224 jq[1618]: false Oct 2 19:16:26.027594 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:16:26.027824 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:16:26.055280 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:16:26.062129 tar[1631]: crictl Oct 2 19:16:26.055488 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:16:26.073329 jq[1638]: true Oct 2 19:16:26.082277 tar[1630]: ./ Oct 2 19:16:26.092957 tar[1630]: ./loopback Oct 2 19:16:26.120972 extend-filesystems[1619]: Found nvme0n1 Oct 2 19:16:26.122650 extend-filesystems[1619]: Found nvme0n1p1 Oct 2 19:16:26.123752 extend-filesystems[1619]: Found nvme0n1p2 Oct 2 19:16:26.127576 extend-filesystems[1619]: Found nvme0n1p3 Oct 2 19:16:26.131140 extend-filesystems[1619]: Found usr Oct 2 19:16:26.132252 extend-filesystems[1619]: Found nvme0n1p4 Oct 2 19:16:26.136448 dbus-daemon[1617]: [system] SELinux support is enabled Oct 2 19:16:26.136651 systemd[1]: Started dbus.service. Oct 2 19:16:26.137843 extend-filesystems[1619]: Found nvme0n1p6 Oct 2 19:16:26.139977 extend-filesystems[1619]: Found nvme0n1p7 Oct 2 19:16:26.140548 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:16:26.140580 systemd[1]: Reached target system-config.target. Oct 2 19:16:26.142168 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:16:26.142194 systemd[1]: Reached target user-config.target. Oct 2 19:16:26.143775 extend-filesystems[1619]: Found nvme0n1p9 Oct 2 19:16:26.145216 extend-filesystems[1619]: Checking size of /dev/nvme0n1p9 Oct 2 19:16:26.218694 dbus-daemon[1617]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.3' (uid=244 pid=1446 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 19:16:26.219309 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:16:26.219564 systemd[1]: Finished motdgen.service. Oct 2 19:16:26.225704 systemd[1]: Starting systemd-hostnamed.service... Oct 2 19:16:26.264037 extend-filesystems[1619]: Resized partition /dev/nvme0n1p9 Oct 2 19:16:26.274287 extend-filesystems[1679]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:16:26.278885 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Oct 2 19:16:26.358885 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Oct 2 19:16:26.383947 update_engine[1627]: I1002 19:16:26.373234 1627 main.cc:92] Flatcar Update Engine starting Oct 2 19:16:26.385721 env[1632]: time="2023-10-02T19:16:26.385664164Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:16:26.390578 extend-filesystems[1679]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Oct 2 19:16:26.390578 extend-filesystems[1679]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 2 19:16:26.390578 extend-filesystems[1679]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Oct 2 19:16:26.388013 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:16:26.398979 bash[1678]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:16:26.399113 extend-filesystems[1619]: Resized filesystem in /dev/nvme0n1p9 Oct 2 19:16:26.401247 update_engine[1627]: I1002 19:16:26.395022 1627 update_check_scheduler.cc:74] Next update check in 8m1s Oct 2 19:16:26.388413 systemd[1]: Finished extend-filesystems.service. Oct 2 19:16:26.394830 systemd[1]: Started update-engine.service. Oct 2 19:16:26.399778 systemd[1]: Started locksmithd.service. Oct 2 19:16:26.401821 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:16:26.408431 amazon-ssm-agent[1614]: 2023/10/02 19:16:26 Failed to load instance info from vault. RegistrationKey does not exist. Oct 2 19:16:26.410429 amazon-ssm-agent[1614]: Initializing new seelog logger Oct 2 19:16:26.410760 amazon-ssm-agent[1614]: New Seelog Logger Creation Complete Oct 2 19:16:26.410951 amazon-ssm-agent[1614]: 2023/10/02 19:16:26 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:16:26.411026 amazon-ssm-agent[1614]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:16:26.411354 amazon-ssm-agent[1614]: 2023/10/02 19:16:26 processing appconfig overrides Oct 2 19:16:26.435763 systemd-logind[1626]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:16:26.435798 systemd-logind[1626]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 19:16:26.435824 systemd-logind[1626]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:16:26.444118 systemd-logind[1626]: New seat seat0. Oct 2 19:16:26.454114 systemd[1]: Started systemd-logind.service. Oct 2 19:16:26.476943 tar[1630]: ./bandwidth Oct 2 19:16:26.546178 env[1632]: time="2023-10-02T19:16:26.546117161Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:16:26.546348 env[1632]: time="2023-10-02T19:16:26.546325094Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:16:26.551486 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 19:16:26.557425 env[1632]: time="2023-10-02T19:16:26.557379516Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:16:26.561003 env[1632]: time="2023-10-02T19:16:26.560961735Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:16:26.561480 env[1632]: time="2023-10-02T19:16:26.561448321Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:16:26.561607 env[1632]: time="2023-10-02T19:16:26.561591030Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:16:26.561688 env[1632]: time="2023-10-02T19:16:26.561670751Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:16:26.561756 env[1632]: time="2023-10-02T19:16:26.561740830Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:16:26.561949 env[1632]: time="2023-10-02T19:16:26.561930640Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:16:26.562318 env[1632]: time="2023-10-02T19:16:26.562293949Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:16:26.562602 env[1632]: time="2023-10-02T19:16:26.562574661Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:16:26.562699 env[1632]: time="2023-10-02T19:16:26.562683442Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:16:26.562829 env[1632]: time="2023-10-02T19:16:26.562809687Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:16:26.562945 env[1632]: time="2023-10-02T19:16:26.562928912Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:16:26.571043 env[1632]: time="2023-10-02T19:16:26.570993618Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:16:26.571251 env[1632]: time="2023-10-02T19:16:26.571231602Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:16:26.571361 env[1632]: time="2023-10-02T19:16:26.571347662Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:16:26.571496 env[1632]: time="2023-10-02T19:16:26.571473161Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:16:26.571630 env[1632]: time="2023-10-02T19:16:26.571615894Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:16:26.571721 env[1632]: time="2023-10-02T19:16:26.571707013Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:16:26.571810 env[1632]: time="2023-10-02T19:16:26.571795145Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:16:26.571919 env[1632]: time="2023-10-02T19:16:26.571904587Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:16:26.572009 env[1632]: time="2023-10-02T19:16:26.571994299Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:16:26.572106 env[1632]: time="2023-10-02T19:16:26.572090730Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:16:26.572205 env[1632]: time="2023-10-02T19:16:26.572189391Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:16:26.572300 env[1632]: time="2023-10-02T19:16:26.572285774Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:16:26.572797 env[1632]: time="2023-10-02T19:16:26.572773802Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:16:26.573046 env[1632]: time="2023-10-02T19:16:26.573029113Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:16:26.573594 env[1632]: time="2023-10-02T19:16:26.573574113Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:16:26.573715 env[1632]: time="2023-10-02T19:16:26.573698865Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:16:26.573805 env[1632]: time="2023-10-02T19:16:26.573791734Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:16:26.574117 env[1632]: time="2023-10-02T19:16:26.574085998Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:16:26.574223 env[1632]: time="2023-10-02T19:16:26.574208734Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:16:26.574309 env[1632]: time="2023-10-02T19:16:26.574295164Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:16:26.574400 env[1632]: time="2023-10-02T19:16:26.574387152Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:16:26.574499 env[1632]: time="2023-10-02T19:16:26.574485054Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:16:26.574586 env[1632]: time="2023-10-02T19:16:26.574572805Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:16:26.574658 env[1632]: time="2023-10-02T19:16:26.574644445Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:16:26.574823 env[1632]: time="2023-10-02T19:16:26.574732233Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:16:26.574962 env[1632]: time="2023-10-02T19:16:26.574947692Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:16:26.575166 env[1632]: time="2023-10-02T19:16:26.575150307Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:16:26.575250 env[1632]: time="2023-10-02T19:16:26.575236103Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:16:26.575350 env[1632]: time="2023-10-02T19:16:26.575327481Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:16:26.575427 env[1632]: time="2023-10-02T19:16:26.575412720Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:16:26.575529 env[1632]: time="2023-10-02T19:16:26.575510805Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:16:26.575595 env[1632]: time="2023-10-02T19:16:26.575582116Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:16:26.575674 env[1632]: time="2023-10-02T19:16:26.575659197Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:16:26.575772 env[1632]: time="2023-10-02T19:16:26.575758051Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:16:26.606987 env[1632]: time="2023-10-02T19:16:26.606869528Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:16:26.610975 env[1632]: time="2023-10-02T19:16:26.607967852Z" level=info msg="Connect containerd service" Oct 2 19:16:26.610975 env[1632]: time="2023-10-02T19:16:26.608055048Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:16:26.614282 env[1632]: time="2023-10-02T19:16:26.614243315Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:16:26.614662 dbus-daemon[1617]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 19:16:26.614923 systemd[1]: Started systemd-hostnamed.service. Oct 2 19:16:26.618022 env[1632]: time="2023-10-02T19:16:26.615173163Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:16:26.618022 env[1632]: time="2023-10-02T19:16:26.615235678Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:16:26.618022 env[1632]: time="2023-10-02T19:16:26.615289554Z" level=info msg="containerd successfully booted in 0.244584s" Oct 2 19:16:26.618022 env[1632]: time="2023-10-02T19:16:26.616576277Z" level=info msg="Start subscribing containerd event" Oct 2 19:16:26.618022 env[1632]: time="2023-10-02T19:16:26.616640774Z" level=info msg="Start recovering state" Oct 2 19:16:26.618022 env[1632]: time="2023-10-02T19:16:26.616730340Z" level=info msg="Start event monitor" Oct 2 19:16:26.618022 env[1632]: time="2023-10-02T19:16:26.616754478Z" level=info msg="Start snapshots syncer" Oct 2 19:16:26.618022 env[1632]: time="2023-10-02T19:16:26.616772711Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:16:26.618022 env[1632]: time="2023-10-02T19:16:26.616784306Z" level=info msg="Start streaming server" Oct 2 19:16:26.616567 systemd[1]: Started containerd.service. Oct 2 19:16:26.621153 dbus-daemon[1617]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1677 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 19:16:26.625329 systemd[1]: Starting polkit.service... Oct 2 19:16:26.655002 polkitd[1716]: Started polkitd version 121 Oct 2 19:16:26.697423 polkitd[1716]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 19:16:26.701391 polkitd[1716]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 19:16:26.705391 polkitd[1716]: Finished loading, compiling and executing 2 rules Oct 2 19:16:26.708080 dbus-daemon[1617]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 19:16:26.708261 systemd[1]: Started polkit.service. Oct 2 19:16:26.709089 polkitd[1716]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 19:16:26.720806 tar[1630]: ./ptp Oct 2 19:16:26.729217 systemd-hostnamed[1677]: Hostname set to (transient) Oct 2 19:16:26.729339 systemd-resolved[1582]: System hostname changed to 'ip-172-31-27-212'. Oct 2 19:16:26.863082 coreos-metadata[1616]: Oct 02 19:16:26.860 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Oct 2 19:16:26.866054 coreos-metadata[1616]: Oct 02 19:16:26.865 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Oct 2 19:16:26.869007 coreos-metadata[1616]: Oct 02 19:16:26.868 INFO Fetch successful Oct 2 19:16:26.869183 coreos-metadata[1616]: Oct 02 19:16:26.869 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 2 19:16:26.870146 coreos-metadata[1616]: Oct 02 19:16:26.870 INFO Fetch successful Oct 2 19:16:26.872209 unknown[1616]: wrote ssh authorized keys file for user: core Oct 2 19:16:26.909338 update-ssh-keys[1776]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:16:26.909954 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:16:26.918196 tar[1630]: ./vlan Oct 2 19:16:27.034371 amazon-ssm-agent[1614]: 2023-10-02 19:16:27 INFO Entering SSM Agent hibernate - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-089e1035abf6f0800 is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-089e1035abf6f0800 because no identity-based policy allows the ssm:UpdateInstanceInformation action Oct 2 19:16:27.034371 amazon-ssm-agent[1614]: status code: 400, request id: fdd73342-366e-4cc0-b572-32bb12f1fbf0 Oct 2 19:16:27.034371 amazon-ssm-agent[1614]: 2023-10-02 19:16:27 INFO Agent is in hibernate mode. Reducing logging. Logging will be reduced to one log per backoff period Oct 2 19:16:27.080500 tar[1630]: ./host-device Oct 2 19:16:27.173111 tar[1630]: ./tuning Oct 2 19:16:27.261478 tar[1630]: ./vrf Oct 2 19:16:27.360237 tar[1630]: ./sbr Oct 2 19:16:27.449845 tar[1630]: ./tap Oct 2 19:16:27.549217 tar[1630]: ./dhcp Oct 2 19:16:27.707062 systemd[1]: Finished prepare-critools.service. Oct 2 19:16:27.777743 tar[1630]: ./static Oct 2 19:16:27.821706 tar[1630]: ./firewall Oct 2 19:16:27.883945 tar[1630]: ./macvlan Oct 2 19:16:27.955328 tar[1630]: ./dummy Oct 2 19:16:28.014066 tar[1630]: ./bridge Oct 2 19:16:28.082110 tar[1630]: ./ipvlan Oct 2 19:16:28.132406 tar[1630]: ./portmap Oct 2 19:16:28.176959 tar[1630]: ./host-local Oct 2 19:16:28.232313 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:16:28.311841 locksmithd[1693]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:16:28.529088 sshd_keygen[1662]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:16:28.552243 systemd[1]: Finished sshd-keygen.service. Oct 2 19:16:28.554988 systemd[1]: Starting issuegen.service... Oct 2 19:16:28.560935 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:16:28.561138 systemd[1]: Finished issuegen.service. Oct 2 19:16:28.563781 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:16:28.578732 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:16:28.584395 systemd[1]: Started getty@tty1.service. Oct 2 19:16:28.595660 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:16:28.609116 systemd[1]: Reached target getty.target. Oct 2 19:16:28.611601 systemd[1]: Reached target multi-user.target. Oct 2 19:16:28.619173 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:16:28.632509 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:16:28.633097 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:16:28.634820 systemd[1]: Startup finished in 945ms (kernel) + 12.582s (initrd) + 11.241s (userspace) = 24.768s. Oct 2 19:16:34.614923 systemd[1]: Created slice system-sshd.slice. Oct 2 19:16:34.616457 systemd[1]: Started sshd@0-172.31.27.212:22-139.178.89.65:43860.service. Oct 2 19:16:34.803756 sshd[1824]: Accepted publickey for core from 139.178.89.65 port 43860 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:16:34.806108 sshd[1824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:34.824488 systemd[1]: Created slice user-500.slice. Oct 2 19:16:34.831314 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:16:34.839214 systemd-logind[1626]: New session 1 of user core. Oct 2 19:16:34.858831 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:16:34.861568 systemd[1]: Starting user@500.service... Oct 2 19:16:34.865374 (systemd)[1827]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:34.981899 systemd[1827]: Queued start job for default target default.target. Oct 2 19:16:34.982632 systemd[1827]: Reached target paths.target. Oct 2 19:16:34.982666 systemd[1827]: Reached target sockets.target. Oct 2 19:16:34.982684 systemd[1827]: Reached target timers.target. Oct 2 19:16:34.982701 systemd[1827]: Reached target basic.target. Oct 2 19:16:34.982827 systemd[1]: Started user@500.service. Oct 2 19:16:34.984144 systemd[1]: Started session-1.scope. Oct 2 19:16:34.985275 systemd[1827]: Reached target default.target. Oct 2 19:16:34.985595 systemd[1827]: Startup finished in 112ms. Oct 2 19:16:35.145820 systemd[1]: Started sshd@1-172.31.27.212:22-139.178.89.65:43862.service. Oct 2 19:16:35.325960 sshd[1836]: Accepted publickey for core from 139.178.89.65 port 43862 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:16:35.327417 sshd[1836]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:35.334514 systemd[1]: Started session-2.scope. Oct 2 19:16:35.335458 systemd-logind[1626]: New session 2 of user core. Oct 2 19:16:35.466267 sshd[1836]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:35.469545 systemd[1]: sshd@1-172.31.27.212:22-139.178.89.65:43862.service: Deactivated successfully. Oct 2 19:16:35.470457 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:16:35.471403 systemd-logind[1626]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:16:35.472386 systemd-logind[1626]: Removed session 2. Oct 2 19:16:35.492284 systemd[1]: Started sshd@2-172.31.27.212:22-139.178.89.65:43864.service. Oct 2 19:16:35.656192 sshd[1843]: Accepted publickey for core from 139.178.89.65 port 43864 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:16:35.657809 sshd[1843]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:35.662550 systemd-logind[1626]: New session 3 of user core. Oct 2 19:16:35.663290 systemd[1]: Started session-3.scope. Oct 2 19:16:35.785113 sshd[1843]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:35.791446 systemd[1]: sshd@2-172.31.27.212:22-139.178.89.65:43864.service: Deactivated successfully. Oct 2 19:16:35.792582 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:16:35.793349 systemd-logind[1626]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:16:35.794284 systemd-logind[1626]: Removed session 3. Oct 2 19:16:35.814322 systemd[1]: Started sshd@3-172.31.27.212:22-139.178.89.65:48306.service. Oct 2 19:16:35.995548 sshd[1849]: Accepted publickey for core from 139.178.89.65 port 48306 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:16:36.000241 sshd[1849]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:36.005876 systemd[1]: Started session-4.scope. Oct 2 19:16:36.006503 systemd-logind[1626]: New session 4 of user core. Oct 2 19:16:36.162537 sshd[1849]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:36.167136 systemd[1]: sshd@3-172.31.27.212:22-139.178.89.65:48306.service: Deactivated successfully. Oct 2 19:16:36.168049 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:16:36.168821 systemd-logind[1626]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:16:36.170345 systemd-logind[1626]: Removed session 4. Oct 2 19:16:36.191162 systemd[1]: Started sshd@4-172.31.27.212:22-139.178.89.65:48310.service. Oct 2 19:16:36.374665 sshd[1855]: Accepted publickey for core from 139.178.89.65 port 48310 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:16:36.376255 sshd[1855]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:36.387605 systemd[1]: Started session-5.scope. Oct 2 19:16:36.389558 systemd-logind[1626]: New session 5 of user core. Oct 2 19:16:36.524912 sudo[1858]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:16:36.525624 sudo[1858]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:16:36.534109 dbus-daemon[1617]: \xd0\xcdr\u001b\xb8U: received setenforce notice (enforcing=543953008) Oct 2 19:16:36.535971 sudo[1858]: pam_unix(sudo:session): session closed for user root Oct 2 19:16:36.559833 sshd[1855]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:36.563348 systemd[1]: sshd@4-172.31.27.212:22-139.178.89.65:48310.service: Deactivated successfully. Oct 2 19:16:36.564336 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:16:36.565028 systemd-logind[1626]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:16:36.566046 systemd-logind[1626]: Removed session 5. Oct 2 19:16:36.586140 systemd[1]: Started sshd@5-172.31.27.212:22-139.178.89.65:48322.service. Oct 2 19:16:36.749806 sshd[1862]: Accepted publickey for core from 139.178.89.65 port 48322 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:16:36.751648 sshd[1862]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:36.756770 systemd-logind[1626]: New session 6 of user core. Oct 2 19:16:36.757272 systemd[1]: Started session-6.scope. Oct 2 19:16:36.862675 sudo[1866]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:16:36.863489 sudo[1866]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:16:36.866965 sudo[1866]: pam_unix(sudo:session): session closed for user root Oct 2 19:16:36.872062 sudo[1865]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:16:36.872348 sudo[1865]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:16:36.885362 systemd[1]: Stopping audit-rules.service... Oct 2 19:16:36.886000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:16:36.888224 auditctl[1869]: No rules Oct 2 19:16:36.888766 kernel: kauditd_printk_skb: 176 callbacks suppressed Oct 2 19:16:36.888826 kernel: audit: type=1305 audit(1696274196.886:157): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:16:36.892200 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:16:36.901584 kernel: audit: type=1300 audit(1696274196.886:157): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff41ca8ce0 a2=420 a3=0 items=0 ppid=1 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:36.886000 audit[1869]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff41ca8ce0 a2=420 a3=0 items=0 ppid=1 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:36.892414 systemd[1]: Stopped audit-rules.service. Oct 2 19:16:36.899783 systemd[1]: Starting audit-rules.service... Oct 2 19:16:36.886000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:16:36.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:36.910518 kernel: audit: type=1327 audit(1696274196.886:157): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:16:36.910579 kernel: audit: type=1131 audit(1696274196.891:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:36.923615 augenrules[1886]: No rules Oct 2 19:16:36.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:36.925566 sudo[1865]: pam_unix(sudo:session): session closed for user root Oct 2 19:16:36.924245 systemd[1]: Finished audit-rules.service. Oct 2 19:16:36.924000 audit[1865]: USER_END pid=1865 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:36.936005 kernel: audit: type=1130 audit(1696274196.923:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:36.936119 kernel: audit: type=1106 audit(1696274196.924:160): pid=1865 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:36.936163 kernel: audit: type=1104 audit(1696274196.924:161): pid=1865 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:36.924000 audit[1865]: CRED_DISP pid=1865 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:36.948687 sshd[1862]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:36.949000 audit[1862]: USER_END pid=1862 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:16:36.953203 systemd[1]: sshd@5-172.31.27.212:22-139.178.89.65:48322.service: Deactivated successfully. Oct 2 19:16:36.954115 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:16:36.958887 kernel: audit: type=1106 audit(1696274196.949:162): pid=1862 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:16:36.949000 audit[1862]: CRED_DISP pid=1862 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:16:36.960063 systemd-logind[1626]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:16:36.961402 systemd-logind[1626]: Removed session 6. Oct 2 19:16:36.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.212:22-139.178.89.65:48322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:36.970444 kernel: audit: type=1104 audit(1696274196.949:163): pid=1862 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:16:36.970531 kernel: audit: type=1131 audit(1696274196.952:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.212:22-139.178.89.65:48322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:36.974947 systemd[1]: Started sshd@6-172.31.27.212:22-139.178.89.65:48338.service. Oct 2 19:16:36.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.212:22-139.178.89.65:48338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:37.142000 audit[1892]: USER_ACCT pid=1892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:16:37.144663 sshd[1892]: Accepted publickey for core from 139.178.89.65 port 48338 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:16:37.144000 audit[1892]: CRED_ACQ pid=1892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:16:37.145000 audit[1892]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb36b97c0 a2=3 a3=0 items=0 ppid=1 pid=1892 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:37.145000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:16:37.146940 sshd[1892]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:16:37.154775 systemd[1]: Started session-7.scope. Oct 2 19:16:37.155463 systemd-logind[1626]: New session 7 of user core. Oct 2 19:16:37.168000 audit[1892]: USER_START pid=1892 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:16:37.172000 audit[1894]: CRED_ACQ pid=1894 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:16:37.265000 audit[1895]: USER_ACCT pid=1895 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:37.266760 sudo[1895]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:16:37.266000 audit[1895]: CRED_REFR pid=1895 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:37.267090 sudo[1895]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:16:37.268000 audit[1895]: USER_START pid=1895 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:37.894062 systemd[1]: Starting docker.service... Oct 2 19:16:37.956467 env[1910]: time="2023-10-02T19:16:37.956207479Z" level=info msg="Starting up" Oct 2 19:16:37.975142 env[1910]: time="2023-10-02T19:16:37.975101019Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:16:37.976086 env[1910]: time="2023-10-02T19:16:37.975941618Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:16:37.977206 env[1910]: time="2023-10-02T19:16:37.977171119Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:16:37.977537 env[1910]: time="2023-10-02T19:16:37.977425800Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:16:37.992154 env[1910]: time="2023-10-02T19:16:37.992116622Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:16:37.992991 env[1910]: time="2023-10-02T19:16:37.992953822Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:16:37.993281 env[1910]: time="2023-10-02T19:16:37.993251576Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:16:37.993396 env[1910]: time="2023-10-02T19:16:37.993383370Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:16:38.048850 env[1910]: time="2023-10-02T19:16:38.048804688Z" level=info msg="Loading containers: start." Oct 2 19:16:38.116000 audit[1941]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.116000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdd58bcb80 a2=0 a3=7ffdd58bcb6c items=0 ppid=1910 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.116000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:16:38.119000 audit[1943]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1943 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.119000 audit[1943]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd11d703f0 a2=0 a3=7ffd11d703dc items=0 ppid=1910 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.119000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:16:38.122000 audit[1945]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1945 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.122000 audit[1945]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff371098d0 a2=0 a3=7fff371098bc items=0 ppid=1910 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.122000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:16:38.125000 audit[1947]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.125000 audit[1947]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc8697b5f0 a2=0 a3=7ffc8697b5dc items=0 ppid=1910 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.125000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:16:38.128000 audit[1949]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1949 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.128000 audit[1949]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcf4c92120 a2=0 a3=7ffcf4c9210c items=0 ppid=1910 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.128000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:16:38.148000 audit[1954]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1954 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.148000 audit[1954]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe8181d3b0 a2=0 a3=7ffe8181d39c items=0 ppid=1910 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.148000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:16:38.158000 audit[1956]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1956 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.158000 audit[1956]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffce6c43b30 a2=0 a3=7ffce6c43b1c items=0 ppid=1910 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.158000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:16:38.161000 audit[1958]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.161000 audit[1958]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd6519afa0 a2=0 a3=7ffd6519af8c items=0 ppid=1910 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.161000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:16:38.164000 audit[1960]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1960 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.164000 audit[1960]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe9e9e4700 a2=0 a3=7ffe9e9e46ec items=0 ppid=1910 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.164000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:16:38.175000 audit[1964]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1964 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.175000 audit[1964]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe55bfec10 a2=0 a3=7ffe55bfebfc items=0 ppid=1910 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.175000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:16:38.177000 audit[1965]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.177000 audit[1965]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcb67ea1b0 a2=0 a3=7ffcb67ea19c items=0 ppid=1910 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.177000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:16:38.187889 kernel: Initializing XFRM netlink socket Oct 2 19:16:38.234583 env[1910]: time="2023-10-02T19:16:38.234540134Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:16:38.235592 (udev-worker)[1921]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:16:38.311000 audit[1973]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.311000 audit[1973]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffeb573d7b0 a2=0 a3=7ffeb573d79c items=0 ppid=1910 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.311000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:16:38.379000 audit[1976]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.379000 audit[1976]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc16e5a210 a2=0 a3=7ffc16e5a1fc items=0 ppid=1910 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.379000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:16:38.383000 audit[1979]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.383000 audit[1979]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdedc3d950 a2=0 a3=7ffdedc3d93c items=0 ppid=1910 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.383000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:16:38.386000 audit[1981]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.386000 audit[1981]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc6ca80060 a2=0 a3=7ffc6ca8004c items=0 ppid=1910 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.386000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:16:38.388000 audit[1983]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1983 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.388000 audit[1983]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffe9d219e0 a2=0 a3=7fffe9d219cc items=0 ppid=1910 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.388000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:16:38.400000 audit[1985]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.400000 audit[1985]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc214f3d60 a2=0 a3=7ffc214f3d4c items=0 ppid=1910 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.400000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:16:38.406000 audit[1987]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1987 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.406000 audit[1987]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff656a79d0 a2=0 a3=7fff656a79bc items=0 ppid=1910 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.406000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:16:38.420000 audit[1990]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.420000 audit[1990]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff51adc290 a2=0 a3=7fff51adc27c items=0 ppid=1910 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.420000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:16:38.426000 audit[1992]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.426000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff8f8a98e0 a2=0 a3=7fff8f8a98cc items=0 ppid=1910 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.426000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:16:38.429000 audit[1994]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.429000 audit[1994]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fffdaf44860 a2=0 a3=7fffdaf4484c items=0 ppid=1910 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.429000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:16:38.431000 audit[1996]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1996 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.431000 audit[1996]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd6394f140 a2=0 a3=7ffd6394f12c items=0 ppid=1910 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.431000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:16:38.433439 systemd-networkd[1446]: docker0: Link UP Oct 2 19:16:38.444000 audit[2000]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2000 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.444000 audit[2000]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffb0659b10 a2=0 a3=7fffb0659afc items=0 ppid=1910 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.444000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:16:38.445000 audit[2001]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:38.445000 audit[2001]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffde4032ca0 a2=0 a3=7ffde4032c8c items=0 ppid=1910 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:38.445000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:16:38.447337 env[1910]: time="2023-10-02T19:16:38.447304687Z" level=info msg="Loading containers: done." Oct 2 19:16:38.481664 env[1910]: time="2023-10-02T19:16:38.481520998Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:16:38.482164 env[1910]: time="2023-10-02T19:16:38.482069240Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:16:38.482358 env[1910]: time="2023-10-02T19:16:38.482333403Z" level=info msg="Daemon has completed initialization" Oct 2 19:16:38.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:38.503334 systemd[1]: Started docker.service. Oct 2 19:16:38.517789 env[1910]: time="2023-10-02T19:16:38.517717767Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:16:38.544200 systemd[1]: Reloading. Oct 2 19:16:38.641620 /usr/lib/systemd/system-generators/torcx-generator[2047]: time="2023-10-02T19:16:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:16:38.644998 /usr/lib/systemd/system-generators/torcx-generator[2047]: time="2023-10-02T19:16:38Z" level=info msg="torcx already run" Oct 2 19:16:38.793457 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:16:38.793480 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:16:38.824887 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:16:38.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.940000 audit: BPF prog-id=34 op=LOAD Oct 2 19:16:38.940000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:16:38.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.942000 audit: BPF prog-id=35 op=LOAD Oct 2 19:16:38.942000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:16:38.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.943000 audit: BPF prog-id=36 op=LOAD Oct 2 19:16:38.943000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:16:38.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.961000 audit: BPF prog-id=37 op=LOAD Oct 2 19:16:38.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.961000 audit: BPF prog-id=38 op=LOAD Oct 2 19:16:38.961000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:16:38.961000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:16:38.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.962000 audit: BPF prog-id=39 op=LOAD Oct 2 19:16:38.962000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:16:38.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.964000 audit: BPF prog-id=40 op=LOAD Oct 2 19:16:38.964000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit: BPF prog-id=41 op=LOAD Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.965000 audit: BPF prog-id=42 op=LOAD Oct 2 19:16:38.965000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:16:38.965000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:16:38.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit: BPF prog-id=43 op=LOAD Oct 2 19:16:38.967000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit: BPF prog-id=44 op=LOAD Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.968000 audit: BPF prog-id=45 op=LOAD Oct 2 19:16:38.968000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:16:38.968000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:16:38.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit: BPF prog-id=46 op=LOAD Oct 2 19:16:38.969000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit: BPF prog-id=47 op=LOAD Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.969000 audit: BPF prog-id=48 op=LOAD Oct 2 19:16:38.969000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:16:38.969000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit: BPF prog-id=49 op=LOAD Oct 2 19:16:38.972000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit: BPF prog-id=50 op=LOAD Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:38.972000 audit: BPF prog-id=51 op=LOAD Oct 2 19:16:38.973000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:16:38.973000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:16:38.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:38.993757 systemd[1]: Started kubelet.service. Oct 2 19:16:39.124201 kubelet[2099]: E1002 19:16:39.124067 2099 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:16:39.134547 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:16:39.134720 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:16:39.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:16:39.640618 env[1632]: time="2023-10-02T19:16:39.640569499Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\"" Oct 2 19:16:40.331251 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount26842636.mount: Deactivated successfully. Oct 2 19:16:43.385979 env[1632]: time="2023-10-02T19:16:43.385930717Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:43.388975 env[1632]: time="2023-10-02T19:16:43.388918474Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:19b9246d37c8b8c754a8af86facf1975604cfc709fc0ff736531917402189d9c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:43.391697 env[1632]: time="2023-10-02T19:16:43.391641331Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:43.393761 env[1632]: time="2023-10-02T19:16:43.393721062Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5e7a0196a7908cb49bcbf751d2546a008c329ff1e70c26c1cd542e0ada4b623c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:43.394697 env[1632]: time="2023-10-02T19:16:43.394660125Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\" returns image reference \"sha256:19b9246d37c8b8c754a8af86facf1975604cfc709fc0ff736531917402189d9c\"" Oct 2 19:16:43.408572 env[1632]: time="2023-10-02T19:16:43.408525365Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\"" Oct 2 19:16:46.732773 env[1632]: time="2023-10-02T19:16:46.732715444Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:46.735272 env[1632]: time="2023-10-02T19:16:46.735226051Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7810e6aed9778a5f84fc93f48b0c52edfc55333d7b8de7c71972df8c5b925988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:46.737506 env[1632]: time="2023-10-02T19:16:46.737460929Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:46.739697 env[1632]: time="2023-10-02T19:16:46.739653154Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:c76ca5b0cf607f82c54d51c3c6766da30c9a9f684065e1cac761ea9b07b74e97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:46.740436 env[1632]: time="2023-10-02T19:16:46.740397491Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\" returns image reference \"sha256:7810e6aed9778a5f84fc93f48b0c52edfc55333d7b8de7c71972df8c5b925988\"" Oct 2 19:16:46.752605 env[1632]: time="2023-10-02T19:16:46.752566666Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\"" Oct 2 19:16:48.607628 env[1632]: time="2023-10-02T19:16:48.607571763Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:48.610158 env[1632]: time="2023-10-02T19:16:48.610113266Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:993d768b9b96e874c4a171298200661de0d28e52f4d8764e6b2ed1c42470851d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:48.612589 env[1632]: time="2023-10-02T19:16:48.612547105Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:48.615064 env[1632]: time="2023-10-02T19:16:48.615021244Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:bb227512d96e93dd3fe356cef552cc3f78905f36330b762adde23c3f0943d57b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:48.615806 env[1632]: time="2023-10-02T19:16:48.615769621Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\" returns image reference \"sha256:993d768b9b96e874c4a171298200661de0d28e52f4d8764e6b2ed1c42470851d\"" Oct 2 19:16:48.627075 env[1632]: time="2023-10-02T19:16:48.627037085Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\"" Oct 2 19:16:49.151540 kernel: kauditd_printk_skb: 292 callbacks suppressed Oct 2 19:16:49.153959 kernel: audit: type=1130 audit(1696274209.139:407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:49.154087 kernel: audit: type=1131 audit(1696274209.139:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:49.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:49.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:49.140148 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:16:49.140468 systemd[1]: Stopped kubelet.service. Oct 2 19:16:49.145568 systemd[1]: Started kubelet.service. Oct 2 19:16:49.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:49.164944 kernel: audit: type=1130 audit(1696274209.144:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:49.303650 kubelet[2136]: E1002 19:16:49.303546 2136 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:16:49.316892 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:16:49.317069 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:16:49.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:16:49.323044 kernel: audit: type=1131 audit(1696274209.316:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:16:49.919234 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount748380823.mount: Deactivated successfully. Oct 2 19:16:50.584368 env[1632]: time="2023-10-02T19:16:50.584243952Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:50.589502 env[1632]: time="2023-10-02T19:16:50.589451006Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:50.600768 env[1632]: time="2023-10-02T19:16:50.600494435Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:50.601734 env[1632]: time="2023-10-02T19:16:50.601696269Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8e9eff2f6d0b398f9ac5f5a15c1cb7d5f468f28d64a78d593d57f72a969a54ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:50.602330 env[1632]: time="2023-10-02T19:16:50.602294018Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\" returns image reference \"sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985\"" Oct 2 19:16:50.624376 env[1632]: time="2023-10-02T19:16:50.624306215Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:16:51.125209 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2692804877.mount: Deactivated successfully. Oct 2 19:16:51.134768 env[1632]: time="2023-10-02T19:16:51.134712801Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:51.142934 env[1632]: time="2023-10-02T19:16:51.142887525Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:51.150026 env[1632]: time="2023-10-02T19:16:51.149978054Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:51.152844 env[1632]: time="2023-10-02T19:16:51.152793920Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:51.153530 env[1632]: time="2023-10-02T19:16:51.153490738Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 19:16:51.167396 env[1632]: time="2023-10-02T19:16:51.167339882Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Oct 2 19:16:51.962388 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2300285688.mount: Deactivated successfully. Oct 2 19:16:56.740416 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 19:16:56.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:56.749127 kernel: audit: type=1131 audit(1696274216.740:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:56.768402 kernel: audit: type=1334 audit(1696274216.763:412): prog-id=48 op=UNLOAD Oct 2 19:16:56.768592 kernel: audit: type=1334 audit(1696274216.763:413): prog-id=47 op=UNLOAD Oct 2 19:16:56.763000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:16:56.763000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:16:56.770524 kernel: audit: type=1334 audit(1696274216.763:414): prog-id=46 op=UNLOAD Oct 2 19:16:56.763000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:16:59.391153 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 19:16:59.410064 kernel: audit: type=1130 audit(1696274219.390:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:59.410168 kernel: audit: type=1131 audit(1696274219.390:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:59.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:59.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:59.391458 systemd[1]: Stopped kubelet.service. Oct 2 19:16:59.396637 systemd[1]: Started kubelet.service. Oct 2 19:16:59.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:59.418992 kernel: audit: type=1130 audit(1696274219.396:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:59.545243 kubelet[2155]: E1002 19:16:59.544519 2155 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:16:59.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:16:59.546825 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:16:59.547001 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:16:59.553901 kernel: audit: type=1131 audit(1696274219.546:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:16:59.925273 env[1632]: time="2023-10-02T19:16:59.925215764Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:59.937605 env[1632]: time="2023-10-02T19:16:59.937552840Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:59.943213 env[1632]: time="2023-10-02T19:16:59.943167395Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:59.950559 env[1632]: time="2023-10-02T19:16:59.950510737Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:59.951514 env[1632]: time="2023-10-02T19:16:59.951469963Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Oct 2 19:16:59.966029 env[1632]: time="2023-10-02T19:16:59.965981990Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:17:00.585005 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2531271005.mount: Deactivated successfully. Oct 2 19:17:01.458013 env[1632]: time="2023-10-02T19:17:01.457962695Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:01.461688 env[1632]: time="2023-10-02T19:17:01.461642861Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:01.466411 env[1632]: time="2023-10-02T19:17:01.466364413Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:01.471676 env[1632]: time="2023-10-02T19:17:01.471628288Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:01.472562 env[1632]: time="2023-10-02T19:17:01.472416678Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Oct 2 19:17:05.680852 systemd[1]: Stopped kubelet.service. Oct 2 19:17:05.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:05.694579 kernel: audit: type=1130 audit(1696274225.680:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:05.694804 kernel: audit: type=1131 audit(1696274225.680:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:05.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:05.706802 systemd[1]: Reloading. Oct 2 19:17:05.795571 /usr/lib/systemd/system-generators/torcx-generator[2249]: time="2023-10-02T19:17:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:17:05.811985 /usr/lib/systemd/system-generators/torcx-generator[2249]: time="2023-10-02T19:17:05Z" level=info msg="torcx already run" Oct 2 19:17:05.917558 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:17:05.917585 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:17:05.938560 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:17:06.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.033794 kernel: audit: type=1400 audit(1696274226.023:421): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.033981 kernel: audit: type=1400 audit(1696274226.023:422): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.044455 kernel: audit: type=1400 audit(1696274226.023:423): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.044595 kernel: audit: type=1400 audit(1696274226.023:424): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.049516 kernel: audit: type=1400 audit(1696274226.023:425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.054571 kernel: audit: type=1400 audit(1696274226.023:426): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.059881 kernel: audit: type=1400 audit(1696274226.023:427): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.059927 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:17:06.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.028000 audit: BPF prog-id=52 op=LOAD Oct 2 19:17:06.028000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:17:06.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.033000 audit: BPF prog-id=53 op=LOAD Oct 2 19:17:06.033000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:17:06.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.038000 audit: BPF prog-id=54 op=LOAD Oct 2 19:17:06.038000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:17:06.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.043000 audit: BPF prog-id=55 op=LOAD Oct 2 19:17:06.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.043000 audit: BPF prog-id=56 op=LOAD Oct 2 19:17:06.043000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:17:06.043000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:17:06.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.053000 audit: BPF prog-id=57 op=LOAD Oct 2 19:17:06.053000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:17:06.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit: BPF prog-id=58 op=LOAD Oct 2 19:17:06.060000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit: BPF prog-id=59 op=LOAD Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.060000 audit: BPF prog-id=60 op=LOAD Oct 2 19:17:06.060000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:17:06.060000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:17:06.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit: BPF prog-id=61 op=LOAD Oct 2 19:17:06.063000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit: BPF prog-id=62 op=LOAD Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.063000 audit: BPF prog-id=63 op=LOAD Oct 2 19:17:06.063000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:17:06.063000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit: BPF prog-id=64 op=LOAD Oct 2 19:17:06.065000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.066000 audit: BPF prog-id=65 op=LOAD Oct 2 19:17:06.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:06.066000 audit: BPF prog-id=66 op=LOAD Oct 2 19:17:06.066000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:17:06.066000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:17:06.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:06.086159 systemd[1]: Started kubelet.service. Oct 2 19:17:06.150777 kubelet[2302]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:17:06.150777 kubelet[2302]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:17:06.150777 kubelet[2302]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:17:06.151651 kubelet[2302]: I1002 19:17:06.150850 2302 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:17:07.028619 kubelet[2302]: I1002 19:17:07.028591 2302 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 19:17:07.028831 kubelet[2302]: I1002 19:17:07.028820 2302 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:17:07.029273 kubelet[2302]: I1002 19:17:07.029169 2302 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 19:17:07.034407 kubelet[2302]: E1002 19:17:07.034375 2302 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.27.212:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:07.034754 kubelet[2302]: I1002 19:17:07.034731 2302 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:17:07.036595 kubelet[2302]: I1002 19:17:07.036565 2302 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:17:07.036826 kubelet[2302]: I1002 19:17:07.036799 2302 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:17:07.036935 kubelet[2302]: I1002 19:17:07.036917 2302 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:17:07.037228 kubelet[2302]: I1002 19:17:07.037096 2302 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:17:07.037228 kubelet[2302]: I1002 19:17:07.037120 2302 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 19:17:07.037434 kubelet[2302]: I1002 19:17:07.037242 2302 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:17:07.040526 kubelet[2302]: I1002 19:17:07.040504 2302 kubelet.go:405] "Attempting to sync node with API server" Oct 2 19:17:07.040526 kubelet[2302]: I1002 19:17:07.040528 2302 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:17:07.040700 kubelet[2302]: I1002 19:17:07.040550 2302 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:17:07.040700 kubelet[2302]: I1002 19:17:07.040567 2302 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:17:07.041990 kubelet[2302]: I1002 19:17:07.041970 2302 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:17:07.042297 kubelet[2302]: W1002 19:17:07.042280 2302 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:17:07.042897 kubelet[2302]: I1002 19:17:07.042878 2302 server.go:1168] "Started kubelet" Oct 2 19:17:07.043189 kubelet[2302]: W1002 19:17:07.043141 2302 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.27.212:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:07.043263 kubelet[2302]: E1002 19:17:07.043219 2302 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.27.212:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:07.043339 kubelet[2302]: W1002 19:17:07.043305 2302 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.27.212:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-212&limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:07.043395 kubelet[2302]: E1002 19:17:07.043352 2302 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.27.212:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-212&limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:07.044294 kubelet[2302]: I1002 19:17:07.044271 2302 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:17:07.045158 kubelet[2302]: I1002 19:17:07.045138 2302 server.go:461] "Adding debug handlers to kubelet server" Oct 2 19:17:07.047013 kubelet[2302]: I1002 19:17:07.046962 2302 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:17:07.047000 audit[2302]: AVC avc: denied { mac_admin } for pid=2302 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:07.047000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:17:07.047000 audit[2302]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d7e930 a1=c00081bdb8 a2=c000d7e900 a3=25 items=0 ppid=1 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:07.047000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:17:07.047000 audit[2302]: AVC avc: denied { mac_admin } for pid=2302 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:07.047000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:17:07.047000 audit[2302]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d605a0 a1=c00081bdd0 a2=c000d7e9c0 a3=25 items=0 ppid=1 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:07.047000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:17:07.049135 kubelet[2302]: I1002 19:17:07.048552 2302 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:17:07.049135 kubelet[2302]: I1002 19:17:07.048612 2302 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:17:07.049135 kubelet[2302]: I1002 19:17:07.048689 2302 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:17:07.049269 kubelet[2302]: E1002 19:17:07.049102 2302 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-212.178a606c1889e7bc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-212", UID:"ip-172-31-27-212", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-212"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 17, 7, 42838460, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 17, 7, 42838460, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.27.212:6443/api/v1/namespaces/default/events": dial tcp 172.31.27.212:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:17:07.056958 kubelet[2302]: E1002 19:17:07.056928 2302 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:17:07.057167 kubelet[2302]: E1002 19:17:07.057156 2302 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:17:07.060564 kubelet[2302]: I1002 19:17:07.060525 2302 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 19:17:07.061033 kubelet[2302]: I1002 19:17:07.061010 2302 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 19:17:07.062566 kubelet[2302]: E1002 19:17:07.062248 2302 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.212:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-212?timeout=10s\": dial tcp 172.31.27.212:6443: connect: connection refused" interval="200ms" Oct 2 19:17:07.063623 kubelet[2302]: W1002 19:17:07.063563 2302 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.27.212:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:07.063723 kubelet[2302]: E1002 19:17:07.063628 2302 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.27.212:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:07.065000 audit[2312]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:07.065000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeddaf8830 a2=0 a3=7ffeddaf881c items=0 ppid=2302 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:07.065000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:17:07.067000 audit[2314]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:07.067000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff353f7880 a2=0 a3=7fff353f786c items=0 ppid=2302 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:07.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:17:07.070000 audit[2316]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:07.070000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd2b7c5870 a2=0 a3=7ffd2b7c585c items=0 ppid=2302 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:07.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:17:07.073000 audit[2318]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:07.073000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcff8f4220 a2=0 a3=7ffcff8f420c items=0 ppid=2302 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:07.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:17:07.085000 audit[2321]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:07.085000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdc0108150 a2=0 a3=7ffdc010813c items=0 ppid=2302 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:07.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:17:07.092582 kubelet[2302]: I1002 19:17:07.092509 2302 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:17:07.093000 audit[2323]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:07.093000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffff9207380 a2=0 a3=7ffff920736c items=0 ppid=2302 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:07.093000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:17:07.095124 kubelet[2302]: I1002 19:17:07.095101 2302 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:17:07.095269 kubelet[2302]: I1002 19:17:07.095258 2302 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 19:17:07.095653 kubelet[2302]: I1002 19:17:07.095637 2302 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 19:17:07.095804 kubelet[2302]: E1002 19:17:07.095793 2302 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:17:07.096000 audit[2324]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:07.096000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd483f69f0 a2=0 a3=7ffd483f69dc items=0 ppid=2302 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:07.096000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:17:07.098000 audit[2325]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:07.098000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5b34c7d0 a2=0 a3=7ffd5b34c7bc items=0 ppid=2302 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:07.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:17:07.103000 audit[2326]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:07.103000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5960faf0 a2=0 a3=7ffe5960fadc items=0 ppid=2302 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:07.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:17:07.109476 kubelet[2302]: W1002 19:17:07.109427 2302 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.27.212:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:07.109476 kubelet[2302]: E1002 19:17:07.109483 2302 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.27.212:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:07.110119 kubelet[2302]: I1002 19:17:07.110087 2302 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:17:07.110119 kubelet[2302]: I1002 19:17:07.110106 2302 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:17:07.110119 kubelet[2302]: I1002 19:17:07.110124 2302 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:17:07.110000 audit[2329]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:07.110000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa38b9be0 a2=0 a3=7fffa38b9bcc items=0 ppid=2302 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:07.110000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:17:07.112000 audit[2330]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:07.112000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc94962940 a2=0 a3=7ffc9496292c items=0 ppid=2302 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:07.112000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:17:07.113000 audit[2331]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:07.113000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd6262bcb0 a2=0 a3=7ffd6262bc9c items=0 ppid=2302 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:07.113000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:17:07.118226 kubelet[2302]: I1002 19:17:07.118192 2302 policy_none.go:49] "None policy: Start" Oct 2 19:17:07.119450 kubelet[2302]: I1002 19:17:07.119427 2302 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:17:07.119547 kubelet[2302]: I1002 19:17:07.119458 2302 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:17:07.134665 systemd[1]: Created slice kubepods.slice. Oct 2 19:17:07.141481 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:17:07.157157 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:17:07.164294 kubelet[2302]: I1002 19:17:07.164269 2302 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-212" Oct 2 19:17:07.166169 kubelet[2302]: E1002 19:17:07.166125 2302 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.212:6443/api/v1/nodes\": dial tcp 172.31.27.212:6443: connect: connection refused" node="ip-172-31-27-212" Oct 2 19:17:07.166511 kubelet[2302]: I1002 19:17:07.166493 2302 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:17:07.165000 audit[2302]: AVC avc: denied { mac_admin } for pid=2302 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:07.165000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:17:07.165000 audit[2302]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b80ed0 a1=c00083b938 a2=c000b80ea0 a3=25 items=0 ppid=1 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:07.165000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:17:07.167264 kubelet[2302]: I1002 19:17:07.166566 2302 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:17:07.167264 kubelet[2302]: I1002 19:17:07.166783 2302 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:17:07.168772 kubelet[2302]: E1002 19:17:07.168741 2302 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-27-212\" not found" Oct 2 19:17:07.196966 kubelet[2302]: I1002 19:17:07.196821 2302 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:17:07.198526 kubelet[2302]: I1002 19:17:07.198486 2302 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:17:07.200527 kubelet[2302]: I1002 19:17:07.200509 2302 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:17:07.208818 systemd[1]: Created slice kubepods-burstable-poddfbeadb1242d8c138b9e0fa9a8ff1da8.slice. Oct 2 19:17:07.226687 systemd[1]: Created slice kubepods-burstable-poda732ce6d1880a21aa4aaaf20ae359942.slice. Oct 2 19:17:07.236478 systemd[1]: Created slice kubepods-burstable-pod27a6abb3e92e357fd1eeb6433c4e403c.slice. Oct 2 19:17:07.263139 kubelet[2302]: E1002 19:17:07.263096 2302 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.212:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-212?timeout=10s\": dial tcp 172.31.27.212:6443: connect: connection refused" interval="400ms" Oct 2 19:17:07.361973 kubelet[2302]: I1002 19:17:07.361471 2302 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/dfbeadb1242d8c138b9e0fa9a8ff1da8-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-27-212\" (UID: \"dfbeadb1242d8c138b9e0fa9a8ff1da8\") " pod="kube-system/kube-controller-manager-ip-172-31-27-212" Oct 2 19:17:07.361973 kubelet[2302]: I1002 19:17:07.361526 2302 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dfbeadb1242d8c138b9e0fa9a8ff1da8-k8s-certs\") pod \"kube-controller-manager-ip-172-31-27-212\" (UID: \"dfbeadb1242d8c138b9e0fa9a8ff1da8\") " pod="kube-system/kube-controller-manager-ip-172-31-27-212" Oct 2 19:17:07.361973 kubelet[2302]: I1002 19:17:07.361557 2302 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/dfbeadb1242d8c138b9e0fa9a8ff1da8-kubeconfig\") pod \"kube-controller-manager-ip-172-31-27-212\" (UID: \"dfbeadb1242d8c138b9e0fa9a8ff1da8\") " pod="kube-system/kube-controller-manager-ip-172-31-27-212" Oct 2 19:17:07.361973 kubelet[2302]: I1002 19:17:07.361586 2302 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dfbeadb1242d8c138b9e0fa9a8ff1da8-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-27-212\" (UID: \"dfbeadb1242d8c138b9e0fa9a8ff1da8\") " pod="kube-system/kube-controller-manager-ip-172-31-27-212" Oct 2 19:17:07.361973 kubelet[2302]: I1002 19:17:07.361614 2302 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a732ce6d1880a21aa4aaaf20ae359942-kubeconfig\") pod \"kube-scheduler-ip-172-31-27-212\" (UID: \"a732ce6d1880a21aa4aaaf20ae359942\") " pod="kube-system/kube-scheduler-ip-172-31-27-212" Oct 2 19:17:07.362596 kubelet[2302]: I1002 19:17:07.361639 2302 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/27a6abb3e92e357fd1eeb6433c4e403c-ca-certs\") pod \"kube-apiserver-ip-172-31-27-212\" (UID: \"27a6abb3e92e357fd1eeb6433c4e403c\") " pod="kube-system/kube-apiserver-ip-172-31-27-212" Oct 2 19:17:07.362596 kubelet[2302]: I1002 19:17:07.361682 2302 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/27a6abb3e92e357fd1eeb6433c4e403c-k8s-certs\") pod \"kube-apiserver-ip-172-31-27-212\" (UID: \"27a6abb3e92e357fd1eeb6433c4e403c\") " pod="kube-system/kube-apiserver-ip-172-31-27-212" Oct 2 19:17:07.362596 kubelet[2302]: I1002 19:17:07.361711 2302 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dfbeadb1242d8c138b9e0fa9a8ff1da8-ca-certs\") pod \"kube-controller-manager-ip-172-31-27-212\" (UID: \"dfbeadb1242d8c138b9e0fa9a8ff1da8\") " pod="kube-system/kube-controller-manager-ip-172-31-27-212" Oct 2 19:17:07.362596 kubelet[2302]: I1002 19:17:07.361742 2302 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/27a6abb3e92e357fd1eeb6433c4e403c-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-27-212\" (UID: \"27a6abb3e92e357fd1eeb6433c4e403c\") " pod="kube-system/kube-apiserver-ip-172-31-27-212" Oct 2 19:17:07.374835 kubelet[2302]: I1002 19:17:07.372939 2302 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-212" Oct 2 19:17:07.374835 kubelet[2302]: E1002 19:17:07.374787 2302 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.212:6443/api/v1/nodes\": dial tcp 172.31.27.212:6443: connect: connection refused" node="ip-172-31-27-212" Oct 2 19:17:07.523956 env[1632]: time="2023-10-02T19:17:07.523903195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-27-212,Uid:dfbeadb1242d8c138b9e0fa9a8ff1da8,Namespace:kube-system,Attempt:0,}" Oct 2 19:17:07.530599 env[1632]: time="2023-10-02T19:17:07.530551126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-27-212,Uid:a732ce6d1880a21aa4aaaf20ae359942,Namespace:kube-system,Attempt:0,}" Oct 2 19:17:07.551613 env[1632]: time="2023-10-02T19:17:07.551571226Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-27-212,Uid:27a6abb3e92e357fd1eeb6433c4e403c,Namespace:kube-system,Attempt:0,}" Oct 2 19:17:07.663591 kubelet[2302]: E1002 19:17:07.663485 2302 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.212:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-212?timeout=10s\": dial tcp 172.31.27.212:6443: connect: connection refused" interval="800ms" Oct 2 19:17:07.776925 kubelet[2302]: I1002 19:17:07.776694 2302 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-212" Oct 2 19:17:07.777387 kubelet[2302]: E1002 19:17:07.777363 2302 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.212:6443/api/v1/nodes\": dial tcp 172.31.27.212:6443: connect: connection refused" node="ip-172-31-27-212" Oct 2 19:17:08.029153 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1687604771.mount: Deactivated successfully. Oct 2 19:17:08.040528 env[1632]: time="2023-10-02T19:17:08.040473370Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:08.041845 env[1632]: time="2023-10-02T19:17:08.041802158Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:08.047371 env[1632]: time="2023-10-02T19:17:08.047320611Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:08.048429 env[1632]: time="2023-10-02T19:17:08.048384497Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:08.051066 env[1632]: time="2023-10-02T19:17:08.051024771Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:08.053368 env[1632]: time="2023-10-02T19:17:08.053332136Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:08.054352 env[1632]: time="2023-10-02T19:17:08.054314260Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:08.055283 env[1632]: time="2023-10-02T19:17:08.055251932Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:08.058433 env[1632]: time="2023-10-02T19:17:08.058382299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:08.062428 env[1632]: time="2023-10-02T19:17:08.062386886Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:08.066095 env[1632]: time="2023-10-02T19:17:08.066040321Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:08.078540 env[1632]: time="2023-10-02T19:17:08.078469903Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:08.092178 kubelet[2302]: W1002 19:17:08.091738 2302 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.27.212:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:08.095324 kubelet[2302]: E1002 19:17:08.092197 2302 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.27.212:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:08.116760 env[1632]: time="2023-10-02T19:17:08.116670908Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:17:08.117196 env[1632]: time="2023-10-02T19:17:08.116714366Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:17:08.117196 env[1632]: time="2023-10-02T19:17:08.116731177Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:17:08.117196 env[1632]: time="2023-10-02T19:17:08.116901603Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0398132b01c2d23b86a144491b710f0e9777c08474b470f7ea52ae0f03844cf1 pid=2341 runtime=io.containerd.runc.v2 Oct 2 19:17:08.156875 systemd[1]: Started cri-containerd-0398132b01c2d23b86a144491b710f0e9777c08474b470f7ea52ae0f03844cf1.scope. Oct 2 19:17:08.202290 env[1632]: time="2023-10-02T19:17:08.191921420Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:17:08.202290 env[1632]: time="2023-10-02T19:17:08.191982851Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:17:08.202290 env[1632]: time="2023-10-02T19:17:08.191999186Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:17:08.202290 env[1632]: time="2023-10-02T19:17:08.192191905Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c8df99d5b43663ce7f925030efaee9d0242a2a07b9cb01d1332679a91331355c pid=2371 runtime=io.containerd.runc.v2 Oct 2 19:17:08.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.203000 audit: BPF prog-id=67 op=LOAD Oct 2 19:17:08.204000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.204000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2341 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033393831333262303163326432336238366131343434393162373130 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2341 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033393831333262303163326432336238366131343434393162373130 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit: BPF prog-id=68 op=LOAD Oct 2 19:17:08.205000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003596e0 items=0 ppid=2341 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033393831333262303163326432336238366131343434393162373130 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit: BPF prog-id=69 op=LOAD Oct 2 19:17:08.205000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000359728 items=0 ppid=2341 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033393831333262303163326432336238366131343434393162373130 Oct 2 19:17:08.205000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:17:08.205000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.205000 audit: BPF prog-id=70 op=LOAD Oct 2 19:17:08.205000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000359b38 items=0 ppid=2341 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033393831333262303163326432336238366131343434393162373130 Oct 2 19:17:08.229626 systemd[1]: Started cri-containerd-c8df99d5b43663ce7f925030efaee9d0242a2a07b9cb01d1332679a91331355c.scope. Oct 2 19:17:08.233305 env[1632]: time="2023-10-02T19:17:08.229927809Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:17:08.233305 env[1632]: time="2023-10-02T19:17:08.230044319Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:17:08.233305 env[1632]: time="2023-10-02T19:17:08.230076674Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:17:08.233305 env[1632]: time="2023-10-02T19:17:08.230349590Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bcb57faacf484a25747099cdc0a89efc6435e9eb98119b4a1e665b8c0a78b84f pid=2397 runtime=io.containerd.runc.v2 Oct 2 19:17:08.259214 systemd[1]: Started cri-containerd-bcb57faacf484a25747099cdc0a89efc6435e9eb98119b4a1e665b8c0a78b84f.scope. Oct 2 19:17:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.297000 audit: BPF prog-id=71 op=LOAD Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2371 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338646639396435623433363633636537663932353033306566616565 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2371 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338646639396435623433363633636537663932353033306566616565 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit: BPF prog-id=72 op=LOAD Oct 2 19:17:08.303000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000203fc0 items=0 ppid=2371 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338646639396435623433363633636537663932353033306566616565 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit: BPF prog-id=73 op=LOAD Oct 2 19:17:08.303000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023e008 items=0 ppid=2371 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338646639396435623433363633636537663932353033306566616565 Oct 2 19:17:08.303000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:17:08.303000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.303000 audit: BPF prog-id=74 op=LOAD Oct 2 19:17:08.303000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023e418 items=0 ppid=2371 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338646639396435623433363633636537663932353033306566616565 Oct 2 19:17:08.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.314000 audit: BPF prog-id=75 op=LOAD Oct 2 19:17:08.315000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.315000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2397 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263623537666161636634383461323537343730393963646330613839 Oct 2 19:17:08.317000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.317000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2397 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263623537666161636634383461323537343730393963646330613839 Oct 2 19:17:08.317000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.317000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.317000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.317000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.317000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.317000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.317000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.317000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.317000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.317000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.317000 audit: BPF prog-id=76 op=LOAD Oct 2 19:17:08.317000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00032e720 items=0 ppid=2397 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263623537666161636634383461323537343730393963646330613839 Oct 2 19:17:08.318000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.318000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.318000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.318000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.318000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.318000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.318000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.318000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.318000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.318000 audit: BPF prog-id=77 op=LOAD Oct 2 19:17:08.318000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00032e768 items=0 ppid=2397 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263623537666161636634383461323537343730393963646330613839 Oct 2 19:17:08.319000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:17:08.319000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:17:08.319000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.319000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.319000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.319000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.319000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.319000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.319000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.319000 audit[2411]: AVC avc: denied { perfmon } for pid=2411 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.319000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.319000 audit[2411]: AVC avc: denied { bpf } for pid=2411 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.319000 audit: BPF prog-id=78 op=LOAD Oct 2 19:17:08.319000 audit[2411]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00032eb78 items=0 ppid=2397 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263623537666161636634383461323537343730393963646330613839 Oct 2 19:17:08.326089 env[1632]: time="2023-10-02T19:17:08.325453468Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-27-212,Uid:27a6abb3e92e357fd1eeb6433c4e403c,Namespace:kube-system,Attempt:0,} returns sandbox id \"0398132b01c2d23b86a144491b710f0e9777c08474b470f7ea52ae0f03844cf1\"" Oct 2 19:17:08.337607 env[1632]: time="2023-10-02T19:17:08.337547954Z" level=info msg="CreateContainer within sandbox \"0398132b01c2d23b86a144491b710f0e9777c08474b470f7ea52ae0f03844cf1\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:17:08.378417 env[1632]: time="2023-10-02T19:17:08.378357316Z" level=info msg="CreateContainer within sandbox \"0398132b01c2d23b86a144491b710f0e9777c08474b470f7ea52ae0f03844cf1\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"5605d9c84388d2d0a739ed2de8ecb9e238bebc52cdca9dea527964e8a1bc7de7\"" Oct 2 19:17:08.379370 env[1632]: time="2023-10-02T19:17:08.379326603Z" level=info msg="StartContainer for \"5605d9c84388d2d0a739ed2de8ecb9e238bebc52cdca9dea527964e8a1bc7de7\"" Oct 2 19:17:08.400017 env[1632]: time="2023-10-02T19:17:08.399966853Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-27-212,Uid:a732ce6d1880a21aa4aaaf20ae359942,Namespace:kube-system,Attempt:0,} returns sandbox id \"bcb57faacf484a25747099cdc0a89efc6435e9eb98119b4a1e665b8c0a78b84f\"" Oct 2 19:17:08.403014 env[1632]: time="2023-10-02T19:17:08.402970746Z" level=info msg="CreateContainer within sandbox \"bcb57faacf484a25747099cdc0a89efc6435e9eb98119b4a1e665b8c0a78b84f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:17:08.409653 env[1632]: time="2023-10-02T19:17:08.409608087Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-27-212,Uid:dfbeadb1242d8c138b9e0fa9a8ff1da8,Namespace:kube-system,Attempt:0,} returns sandbox id \"c8df99d5b43663ce7f925030efaee9d0242a2a07b9cb01d1332679a91331355c\"" Oct 2 19:17:08.420597 env[1632]: time="2023-10-02T19:17:08.420556566Z" level=info msg="CreateContainer within sandbox \"c8df99d5b43663ce7f925030efaee9d0242a2a07b9cb01d1332679a91331355c\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:17:08.443093 systemd[1]: Started cri-containerd-5605d9c84388d2d0a739ed2de8ecb9e238bebc52cdca9dea527964e8a1bc7de7.scope. Oct 2 19:17:08.452558 env[1632]: time="2023-10-02T19:17:08.451469502Z" level=info msg="CreateContainer within sandbox \"c8df99d5b43663ce7f925030efaee9d0242a2a07b9cb01d1332679a91331355c\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2e95edd57341057e94b0d019701c0910051322f0da05a2282ed038f9e05b0ed7\"" Oct 2 19:17:08.452558 env[1632]: time="2023-10-02T19:17:08.452252884Z" level=info msg="StartContainer for \"2e95edd57341057e94b0d019701c0910051322f0da05a2282ed038f9e05b0ed7\"" Oct 2 19:17:08.458100 env[1632]: time="2023-10-02T19:17:08.458053953Z" level=info msg="CreateContainer within sandbox \"bcb57faacf484a25747099cdc0a89efc6435e9eb98119b4a1e665b8c0a78b84f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"3386001bbff12df585f52967f38e72244863a083bf8b9d3d5e53a233ee2a09a6\"" Oct 2 19:17:08.461621 env[1632]: time="2023-10-02T19:17:08.461575944Z" level=info msg="StartContainer for \"3386001bbff12df585f52967f38e72244863a083bf8b9d3d5e53a233ee2a09a6\"" Oct 2 19:17:08.466749 kubelet[2302]: E1002 19:17:08.465645 2302 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.212:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-212?timeout=10s\": dial tcp 172.31.27.212:6443: connect: connection refused" interval="1.6s" Oct 2 19:17:08.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.469000 audit: BPF prog-id=79 op=LOAD Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2341 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536303564396338343338386432643061373339656432646538656362 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2341 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536303564396338343338386432643061373339656432646538656362 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit: BPF prog-id=80 op=LOAD Oct 2 19:17:08.470000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e70e0 items=0 ppid=2341 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536303564396338343338386432643061373339656432646538656362 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit: BPF prog-id=81 op=LOAD Oct 2 19:17:08.470000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e7128 items=0 ppid=2341 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536303564396338343338386432643061373339656432646538656362 Oct 2 19:17:08.470000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:17:08.470000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.470000 audit: BPF prog-id=82 op=LOAD Oct 2 19:17:08.470000 audit[2467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e7538 items=0 ppid=2341 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536303564396338343338386432643061373339656432646538656362 Oct 2 19:17:08.492670 kubelet[2302]: W1002 19:17:08.492583 2302 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.27.212:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-212&limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:08.492670 kubelet[2302]: E1002 19:17:08.492665 2302 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.27.212:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-212&limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:08.510421 systemd[1]: Started cri-containerd-3386001bbff12df585f52967f38e72244863a083bf8b9d3d5e53a233ee2a09a6.scope. Oct 2 19:17:08.522952 systemd[1]: Started cri-containerd-2e95edd57341057e94b0d019701c0910051322f0da05a2282ed038f9e05b0ed7.scope. Oct 2 19:17:08.554142 kubelet[2302]: W1002 19:17:08.552375 2302 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.27.212:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:08.554142 kubelet[2302]: E1002 19:17:08.552435 2302 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.27.212:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:08.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.561000 audit: BPF prog-id=83 op=LOAD Oct 2 19:17:08.561000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.561000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2397 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383630303162626666313264663538356635323936376633386537 Oct 2 19:17:08.561000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.561000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2397 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383630303162626666313264663538356635323936376633386537 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit: BPF prog-id=84 op=LOAD Oct 2 19:17:08.562000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000296360 items=0 ppid=2397 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383630303162626666313264663538356635323936376633386537 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit: BPF prog-id=85 op=LOAD Oct 2 19:17:08.562000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002963a8 items=0 ppid=2397 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383630303162626666313264663538356635323936376633386537 Oct 2 19:17:08.562000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:17:08.562000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { perfmon } for pid=2508 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit[2508]: AVC avc: denied { bpf } for pid=2508 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.562000 audit: BPF prog-id=86 op=LOAD Oct 2 19:17:08.562000 audit[2508]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002967b8 items=0 ppid=2397 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383630303162626666313264663538356635323936376633386537 Oct 2 19:17:08.574119 env[1632]: time="2023-10-02T19:17:08.574070044Z" level=info msg="StartContainer for \"5605d9c84388d2d0a739ed2de8ecb9e238bebc52cdca9dea527964e8a1bc7de7\" returns successfully" Oct 2 19:17:08.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.580000 audit: BPF prog-id=87 op=LOAD Oct 2 19:17:08.583077 kubelet[2302]: I1002 19:17:08.582595 2302 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-212" Oct 2 19:17:08.583077 kubelet[2302]: E1002 19:17:08.583057 2302 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.212:6443/api/v1/nodes\": dial tcp 172.31.27.212:6443: connect: connection refused" node="ip-172-31-27-212" Oct 2 19:17:08.582000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.582000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2371 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265393565646435373334313035376539346230643031393730316330 Oct 2 19:17:08.583000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.583000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2371 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265393565646435373334313035376539346230643031393730316330 Oct 2 19:17:08.583000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.583000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.583000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.583000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.583000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.583000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.583000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.583000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.583000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.583000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.583000 audit: BPF prog-id=88 op=LOAD Oct 2 19:17:08.583000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000192cf0 items=0 ppid=2371 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265393565646435373334313035376539346230643031393730316330 Oct 2 19:17:08.584000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.584000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.584000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.584000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.584000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.584000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.584000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.584000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.584000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.584000 audit: BPF prog-id=89 op=LOAD Oct 2 19:17:08.584000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000192d38 items=0 ppid=2371 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265393565646435373334313035376539346230643031393730316330 Oct 2 19:17:08.585000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:17:08.586000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:17:08.586000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.586000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.586000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.586000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.586000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.586000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.586000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.586000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.586000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.586000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:08.586000 audit: BPF prog-id=90 op=LOAD Oct 2 19:17:08.586000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000193148 items=0 ppid=2371 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:08.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265393565646435373334313035376539346230643031393730316330 Oct 2 19:17:08.593930 kubelet[2302]: W1002 19:17:08.593827 2302 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.27.212:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:08.593930 kubelet[2302]: E1002 19:17:08.593896 2302 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.27.212:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:08.623348 env[1632]: time="2023-10-02T19:17:08.623298460Z" level=info msg="StartContainer for \"3386001bbff12df585f52967f38e72244863a083bf8b9d3d5e53a233ee2a09a6\" returns successfully" Oct 2 19:17:08.648241 env[1632]: time="2023-10-02T19:17:08.648191383Z" level=info msg="StartContainer for \"2e95edd57341057e94b0d019701c0910051322f0da05a2282ed038f9e05b0ed7\" returns successfully" Oct 2 19:17:09.169133 kubelet[2302]: E1002 19:17:09.169091 2302 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.27.212:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.27.212:6443: connect: connection refused Oct 2 19:17:10.185305 kubelet[2302]: I1002 19:17:10.185274 2302 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-212" Oct 2 19:17:10.784983 kernel: kauditd_printk_skb: 557 callbacks suppressed Oct 2 19:17:10.785166 kernel: audit: type=1400 audit(1696274230.775:716): avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:10.775000 audit[2525]: AVC avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:10.775000 audit[2525]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001080000 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:17:10.798020 kernel: audit: type=1300 audit(1696274230.775:716): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001080000 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:17:10.812887 kernel: audit: type=1327 audit(1696274230.775:716): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:10.775000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:10.785000 audit[2525]: AVC avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:10.822052 kernel: audit: type=1400 audit(1696274230.785:717): avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:10.785000 audit[2525]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00106e040 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:17:10.837217 kernel: audit: type=1300 audit(1696274230.785:717): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00106e040 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:17:10.837356 kernel: audit: type=1327 audit(1696274230.785:717): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:10.785000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:11.869540 update_engine[1627]: I1002 19:17:11.868932 1627 update_attempter.cc:505] Updating boot flags... Oct 2 19:17:12.224890 kernel: audit: type=1400 audit(1696274232.204:718): avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:12.225041 kernel: audit: type=1300 audit(1696274232.204:718): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003c6e270 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:17:12.204000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:12.204000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003c6e270 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:17:12.204000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:17:12.241877 kernel: audit: type=1327 audit(1696274232.204:718): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:17:12.256934 kernel: audit: type=1400 audit(1696274232.212:719): avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:12.212000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:12.212000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c007a41460 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:17:12.212000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:17:12.212000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:12.212000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003c6e3c0 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:17:12.212000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:17:12.230000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:12.230000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c003ce3da0 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:17:12.230000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:17:12.263000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:12.263000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002bac7e0 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:17:12.263000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:17:12.263000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:12.263000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c003d3cab0 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:17:12.263000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:17:12.540726 kubelet[2302]: E1002 19:17:12.536090 2302 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-27-212\" not found" node="ip-172-31-27-212" Oct 2 19:17:12.577153 kubelet[2302]: I1002 19:17:12.577115 2302 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-27-212" Oct 2 19:17:13.059046 kubelet[2302]: I1002 19:17:13.059008 2302 apiserver.go:52] "Watching apiserver" Oct 2 19:17:13.061162 kubelet[2302]: I1002 19:17:13.061112 2302 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 19:17:13.122701 kubelet[2302]: I1002 19:17:13.122524 2302 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:17:15.306880 systemd[1]: Reloading. Oct 2 19:17:15.436177 /usr/lib/systemd/system-generators/torcx-generator[2778]: time="2023-10-02T19:17:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:17:15.436498 /usr/lib/systemd/system-generators/torcx-generator[2778]: time="2023-10-02T19:17:15Z" level=info msg="torcx already run" Oct 2 19:17:15.616919 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:17:15.616934 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:17:15.681696 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:17:15.837547 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 19:17:15.837701 kernel: audit: type=1400 audit(1696274235.830:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.844880 kernel: audit: type=1400 audit(1696274235.830:725): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.857883 kernel: audit: type=1400 audit(1696274235.830:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.872507 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:17:15.872795 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:17:15.872830 kernel: audit: type=1400 audit(1696274235.830:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.872940 kernel: audit: backlog limit exceeded Oct 2 19:17:15.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.880169 kernel: audit: type=1400 audit(1696274235.830:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.884723 kernel: audit: type=1400 audit(1696274235.830:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.890918 kernel: audit: type=1400 audit(1696274235.830:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.836000 audit: BPF prog-id=91 op=LOAD Oct 2 19:17:15.836000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:17:15.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.843000 audit: BPF prog-id=92 op=LOAD Oct 2 19:17:15.843000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:17:15.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.844000 audit: BPF prog-id=93 op=LOAD Oct 2 19:17:15.844000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:17:15.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.856000 audit: BPF prog-id=94 op=LOAD Oct 2 19:17:15.856000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:17:15.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.857000 audit: BPF prog-id=95 op=LOAD Oct 2 19:17:15.857000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:17:15.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.895000 audit: BPF prog-id=97 op=LOAD Oct 2 19:17:15.895000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:17:15.895000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:17:15.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.896000 audit: BPF prog-id=98 op=LOAD Oct 2 19:17:15.896000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:17:15.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.898000 audit: BPF prog-id=99 op=LOAD Oct 2 19:17:15.898000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit: BPF prog-id=100 op=LOAD Oct 2 19:17:15.899000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit: BPF prog-id=101 op=LOAD Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.899000 audit: BPF prog-id=102 op=LOAD Oct 2 19:17:15.899000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:17:15.899000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:17:15.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit: BPF prog-id=103 op=LOAD Oct 2 19:17:15.902000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit: BPF prog-id=104 op=LOAD Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.902000 audit: BPF prog-id=105 op=LOAD Oct 2 19:17:15.902000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:17:15.902000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:17:15.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.905000 audit: BPF prog-id=106 op=LOAD Oct 2 19:17:15.905000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit: BPF prog-id=107 op=LOAD Oct 2 19:17:15.907000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit: BPF prog-id=108 op=LOAD Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.907000 audit: BPF prog-id=109 op=LOAD Oct 2 19:17:15.907000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:17:15.907000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:17:15.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.908000 audit: BPF prog-id=110 op=LOAD Oct 2 19:17:15.908000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:17:15.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:15.909000 audit: BPF prog-id=111 op=LOAD Oct 2 19:17:15.909000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:17:15.933713 systemd[1]: Stopping kubelet.service... Oct 2 19:17:15.944638 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:17:15.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:15.944941 systemd[1]: Stopped kubelet.service. Oct 2 19:17:15.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:15.948160 systemd[1]: Started kubelet.service. Oct 2 19:17:16.082471 kubelet[2831]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:17:16.082471 kubelet[2831]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:17:16.082471 kubelet[2831]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:17:16.083775 kubelet[2831]: I1002 19:17:16.082537 2831 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:17:16.090372 kubelet[2831]: I1002 19:17:16.090334 2831 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 19:17:16.090372 kubelet[2831]: I1002 19:17:16.090367 2831 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:17:16.090890 kubelet[2831]: I1002 19:17:16.090668 2831 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 19:17:16.093375 kubelet[2831]: I1002 19:17:16.093343 2831 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:17:16.096391 kubelet[2831]: I1002 19:17:16.096335 2831 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:17:16.100076 kubelet[2831]: I1002 19:17:16.100050 2831 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:17:16.101151 kubelet[2831]: I1002 19:17:16.101130 2831 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:17:16.101292 kubelet[2831]: I1002 19:17:16.101274 2831 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:17:16.101413 kubelet[2831]: I1002 19:17:16.101306 2831 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:17:16.101413 kubelet[2831]: I1002 19:17:16.101337 2831 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 19:17:16.101413 kubelet[2831]: I1002 19:17:16.101374 2831 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:17:16.110117 kubelet[2831]: I1002 19:17:16.109710 2831 kubelet.go:405] "Attempting to sync node with API server" Oct 2 19:17:16.110117 kubelet[2831]: I1002 19:17:16.109741 2831 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:17:16.110117 kubelet[2831]: I1002 19:17:16.109765 2831 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:17:16.110117 kubelet[2831]: I1002 19:17:16.109814 2831 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:17:16.113119 kubelet[2831]: I1002 19:17:16.113098 2831 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:17:16.114206 kubelet[2831]: I1002 19:17:16.114187 2831 server.go:1168] "Started kubelet" Oct 2 19:17:16.116000 audit[2831]: AVC avc: denied { mac_admin } for pid=2831 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:16.116000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:17:16.116000 audit[2831]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cfa750 a1=c00076d6c8 a2=c000cfa720 a3=25 items=0 ppid=1 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:16.116000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:17:16.116000 audit[2831]: AVC avc: denied { mac_admin } for pid=2831 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:16.116000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:17:16.116000 audit[2831]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008db3a0 a1=c00076d6e0 a2=c000cfa7e0 a3=25 items=0 ppid=1 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:16.116000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:17:16.122344 kubelet[2831]: I1002 19:17:16.117520 2831 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:17:16.122344 kubelet[2831]: I1002 19:17:16.117569 2831 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:17:16.122344 kubelet[2831]: I1002 19:17:16.117600 2831 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:17:16.123381 kubelet[2831]: I1002 19:17:16.123299 2831 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:17:16.125631 kubelet[2831]: I1002 19:17:16.125565 2831 server.go:461] "Adding debug handlers to kubelet server" Oct 2 19:17:16.141967 kubelet[2831]: I1002 19:17:16.141935 2831 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:17:16.151420 kubelet[2831]: I1002 19:17:16.151383 2831 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 19:17:16.169039 kubelet[2831]: I1002 19:17:16.169007 2831 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 19:17:16.185154 kubelet[2831]: E1002 19:17:16.185124 2831 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:17:16.185154 kubelet[2831]: E1002 19:17:16.185160 2831 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:17:16.204161 kubelet[2831]: I1002 19:17:16.204132 2831 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:17:16.214932 kubelet[2831]: I1002 19:17:16.214903 2831 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:17:16.214932 kubelet[2831]: I1002 19:17:16.214938 2831 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 19:17:16.215190 kubelet[2831]: I1002 19:17:16.214960 2831 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 19:17:16.215190 kubelet[2831]: E1002 19:17:16.215016 2831 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:17:16.255211 kubelet[2831]: E1002 19:17:16.255187 2831 container_manager_linux.go:900] "Unable to get rootfs data from cAdvisor interface" err="unable to find data in memory cache" Oct 2 19:17:16.258886 kubelet[2831]: I1002 19:17:16.258850 2831 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-212" Oct 2 19:17:16.281711 kubelet[2831]: I1002 19:17:16.281685 2831 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-27-212" Oct 2 19:17:16.284183 kubelet[2831]: I1002 19:17:16.284161 2831 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-27-212" Oct 2 19:17:16.315245 kubelet[2831]: E1002 19:17:16.315216 2831 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 2 19:17:16.352769 kubelet[2831]: I1002 19:17:16.352738 2831 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:17:16.352973 kubelet[2831]: I1002 19:17:16.352782 2831 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:17:16.352973 kubelet[2831]: I1002 19:17:16.352802 2831 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:17:16.353438 kubelet[2831]: I1002 19:17:16.353352 2831 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:17:16.353438 kubelet[2831]: I1002 19:17:16.353377 2831 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 19:17:16.353438 kubelet[2831]: I1002 19:17:16.353385 2831 policy_none.go:49] "None policy: Start" Oct 2 19:17:16.354342 kubelet[2831]: I1002 19:17:16.354312 2831 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:17:16.354342 kubelet[2831]: I1002 19:17:16.354342 2831 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:17:16.354775 kubelet[2831]: I1002 19:17:16.354755 2831 state_mem.go:75] "Updated machine memory state" Oct 2 19:17:16.363958 kubelet[2831]: I1002 19:17:16.363934 2831 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:17:16.363000 audit[2831]: AVC avc: denied { mac_admin } for pid=2831 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:16.363000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:17:16.363000 audit[2831]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0013d2930 a1=c0013f5518 a2=c0013d28d0 a3=25 items=0 ppid=1 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:16.363000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:17:16.368563 kubelet[2831]: I1002 19:17:16.368546 2831 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:17:16.369312 kubelet[2831]: I1002 19:17:16.369293 2831 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:17:16.516439 kubelet[2831]: I1002 19:17:16.516399 2831 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:17:16.516732 kubelet[2831]: I1002 19:17:16.516718 2831 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:17:16.516849 kubelet[2831]: I1002 19:17:16.516840 2831 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:17:16.548028 kubelet[2831]: E1002 19:17:16.547992 2831 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-27-212\" already exists" pod="kube-system/kube-scheduler-ip-172-31-27-212" Oct 2 19:17:16.571963 kubelet[2831]: I1002 19:17:16.571927 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dfbeadb1242d8c138b9e0fa9a8ff1da8-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-27-212\" (UID: \"dfbeadb1242d8c138b9e0fa9a8ff1da8\") " pod="kube-system/kube-controller-manager-ip-172-31-27-212" Oct 2 19:17:16.572226 kubelet[2831]: I1002 19:17:16.572213 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a732ce6d1880a21aa4aaaf20ae359942-kubeconfig\") pod \"kube-scheduler-ip-172-31-27-212\" (UID: \"a732ce6d1880a21aa4aaaf20ae359942\") " pod="kube-system/kube-scheduler-ip-172-31-27-212" Oct 2 19:17:16.572434 kubelet[2831]: I1002 19:17:16.572423 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/27a6abb3e92e357fd1eeb6433c4e403c-ca-certs\") pod \"kube-apiserver-ip-172-31-27-212\" (UID: \"27a6abb3e92e357fd1eeb6433c4e403c\") " pod="kube-system/kube-apiserver-ip-172-31-27-212" Oct 2 19:17:16.572562 kubelet[2831]: I1002 19:17:16.572553 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/dfbeadb1242d8c138b9e0fa9a8ff1da8-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-27-212\" (UID: \"dfbeadb1242d8c138b9e0fa9a8ff1da8\") " pod="kube-system/kube-controller-manager-ip-172-31-27-212" Oct 2 19:17:16.572654 kubelet[2831]: I1002 19:17:16.572646 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dfbeadb1242d8c138b9e0fa9a8ff1da8-k8s-certs\") pod \"kube-controller-manager-ip-172-31-27-212\" (UID: \"dfbeadb1242d8c138b9e0fa9a8ff1da8\") " pod="kube-system/kube-controller-manager-ip-172-31-27-212" Oct 2 19:17:16.572737 kubelet[2831]: I1002 19:17:16.572730 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/dfbeadb1242d8c138b9e0fa9a8ff1da8-kubeconfig\") pod \"kube-controller-manager-ip-172-31-27-212\" (UID: \"dfbeadb1242d8c138b9e0fa9a8ff1da8\") " pod="kube-system/kube-controller-manager-ip-172-31-27-212" Oct 2 19:17:16.572825 kubelet[2831]: I1002 19:17:16.572818 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/27a6abb3e92e357fd1eeb6433c4e403c-k8s-certs\") pod \"kube-apiserver-ip-172-31-27-212\" (UID: \"27a6abb3e92e357fd1eeb6433c4e403c\") " pod="kube-system/kube-apiserver-ip-172-31-27-212" Oct 2 19:17:16.572933 kubelet[2831]: I1002 19:17:16.572923 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/27a6abb3e92e357fd1eeb6433c4e403c-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-27-212\" (UID: \"27a6abb3e92e357fd1eeb6433c4e403c\") " pod="kube-system/kube-apiserver-ip-172-31-27-212" Oct 2 19:17:16.573028 kubelet[2831]: I1002 19:17:16.573020 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dfbeadb1242d8c138b9e0fa9a8ff1da8-ca-certs\") pod \"kube-controller-manager-ip-172-31-27-212\" (UID: \"dfbeadb1242d8c138b9e0fa9a8ff1da8\") " pod="kube-system/kube-controller-manager-ip-172-31-27-212" Oct 2 19:17:17.112561 kubelet[2831]: I1002 19:17:17.112375 2831 apiserver.go:52] "Watching apiserver" Oct 2 19:17:17.154378 kubelet[2831]: I1002 19:17:17.154320 2831 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 19:17:17.177855 kubelet[2831]: I1002 19:17:17.177815 2831 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:17:17.295586 kubelet[2831]: E1002 19:17:17.295553 2831 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-27-212\" already exists" pod="kube-system/kube-apiserver-ip-172-31-27-212" Oct 2 19:17:17.330879 kubelet[2831]: I1002 19:17:17.330831 2831 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-27-212" podStartSLOduration=3.330349498 podCreationTimestamp="2023-10-02 19:17:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:17:17.318441127 +0000 UTC m=+1.356762514" watchObservedRunningTime="2023-10-02 19:17:17.330349498 +0000 UTC m=+1.368670881" Oct 2 19:17:17.350619 kubelet[2831]: I1002 19:17:17.350574 2831 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-27-212" podStartSLOduration=1.350391144 podCreationTimestamp="2023-10-02 19:17:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:17:17.330993843 +0000 UTC m=+1.369315208" watchObservedRunningTime="2023-10-02 19:17:17.350391144 +0000 UTC m=+1.388712532" Oct 2 19:17:17.352608 kubelet[2831]: I1002 19:17:17.352561 2831 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-27-212" podStartSLOduration=1.3525156090000001 podCreationTimestamp="2023-10-02 19:17:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:17:17.350809897 +0000 UTC m=+1.389131285" watchObservedRunningTime="2023-10-02 19:17:17.352515609 +0000 UTC m=+1.390836997" Oct 2 19:17:23.126021 sudo[1895]: pam_unix(sudo:session): session closed for user root Oct 2 19:17:23.125000 audit[1895]: USER_END pid=1895 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:17:23.132973 kernel: kauditd_printk_skb: 250 callbacks suppressed Oct 2 19:17:23.133167 kernel: audit: type=1106 audit(1696274243.125:972): pid=1895 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:17:23.132000 audit[1895]: CRED_DISP pid=1895 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:17:23.141215 kernel: audit: type=1104 audit(1696274243.132:973): pid=1895 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:17:23.170815 sshd[1892]: pam_unix(sshd:session): session closed for user core Oct 2 19:17:23.176000 audit[1892]: USER_END pid=1892 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:17:23.187886 kernel: audit: type=1106 audit(1696274243.176:974): pid=1892 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:17:23.176000 audit[1892]: CRED_DISP pid=1892 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:17:23.194830 systemd[1]: sshd@6-172.31.27.212:22-139.178.89.65:48338.service: Deactivated successfully. Oct 2 19:17:23.195399 kernel: audit: type=1104 audit(1696274243.176:975): pid=1892 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:17:23.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.212:22-139.178.89.65:48338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:23.196086 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:17:23.196290 systemd[1]: session-7.scope: Consumed 4.940s CPU time. Oct 2 19:17:23.197660 systemd-logind[1626]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:17:23.199277 systemd-logind[1626]: Removed session 7. Oct 2 19:17:23.201878 kernel: audit: type=1131 audit(1696274243.194:976): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.212:22-139.178.89.65:48338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:25.800000 audit[2525]: AVC avc: denied { watch } for pid=2525 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:17:25.800000 audit[2525]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000dc2400 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:17:25.815456 kernel: audit: type=1400 audit(1696274245.800:977): avc: denied { watch } for pid=2525 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:17:25.815597 kernel: audit: type=1300 audit(1696274245.800:977): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000dc2400 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:17:25.800000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:25.822428 kernel: audit: type=1327 audit(1696274245.800:977): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:25.863000 audit[2525]: AVC avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:25.873885 kernel: audit: type=1400 audit(1696274245.863:978): avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:25.863000 audit[2525]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ef8480 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:17:25.883027 kernel: audit: type=1300 audit(1696274245.863:978): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ef8480 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:17:25.863000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:25.867000 audit[2525]: AVC avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:25.867000 audit[2525]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ef85c0 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:17:25.867000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:25.874000 audit[2525]: AVC avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:25.874000 audit[2525]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ef8700 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:17:25.874000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:25.877000 audit[2525]: AVC avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:25.877000 audit[2525]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ef8840 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:17:25.877000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:28.938150 kubelet[2831]: I1002 19:17:28.938118 2831 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:17:28.938619 env[1632]: time="2023-10-02T19:17:28.938583178Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:17:28.938951 kubelet[2831]: I1002 19:17:28.938846 2831 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:17:29.731538 kubelet[2831]: I1002 19:17:29.731504 2831 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:17:29.739040 systemd[1]: Created slice kubepods-besteffort-poda7779b41_d2bd_4320_99a1_dc6eaf3a2782.slice. Oct 2 19:17:29.766885 kubelet[2831]: I1002 19:17:29.766837 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a7779b41-d2bd-4320-99a1-dc6eaf3a2782-kube-proxy\") pod \"kube-proxy-p5knh\" (UID: \"a7779b41-d2bd-4320-99a1-dc6eaf3a2782\") " pod="kube-system/kube-proxy-p5knh" Oct 2 19:17:29.766885 kubelet[2831]: I1002 19:17:29.766891 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a7779b41-d2bd-4320-99a1-dc6eaf3a2782-lib-modules\") pod \"kube-proxy-p5knh\" (UID: \"a7779b41-d2bd-4320-99a1-dc6eaf3a2782\") " pod="kube-system/kube-proxy-p5knh" Oct 2 19:17:29.767111 kubelet[2831]: I1002 19:17:29.766923 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x88wr\" (UniqueName: \"kubernetes.io/projected/a7779b41-d2bd-4320-99a1-dc6eaf3a2782-kube-api-access-x88wr\") pod \"kube-proxy-p5knh\" (UID: \"a7779b41-d2bd-4320-99a1-dc6eaf3a2782\") " pod="kube-system/kube-proxy-p5knh" Oct 2 19:17:29.767111 kubelet[2831]: I1002 19:17:29.766952 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a7779b41-d2bd-4320-99a1-dc6eaf3a2782-xtables-lock\") pod \"kube-proxy-p5knh\" (UID: \"a7779b41-d2bd-4320-99a1-dc6eaf3a2782\") " pod="kube-system/kube-proxy-p5knh" Oct 2 19:17:29.855285 kubelet[2831]: I1002 19:17:29.855236 2831 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:17:29.862065 systemd[1]: Created slice kubepods-besteffort-podec9f7bb9_2fa2_4cad_b039_fc07793b74bf.slice. Oct 2 19:17:29.967970 kubelet[2831]: I1002 19:17:29.967923 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mcgjw\" (UniqueName: \"kubernetes.io/projected/ec9f7bb9-2fa2-4cad-b039-fc07793b74bf-kube-api-access-mcgjw\") pod \"tigera-operator-59c686f986-z7xt9\" (UID: \"ec9f7bb9-2fa2-4cad-b039-fc07793b74bf\") " pod="tigera-operator/tigera-operator-59c686f986-z7xt9" Oct 2 19:17:29.968410 kubelet[2831]: I1002 19:17:29.967999 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ec9f7bb9-2fa2-4cad-b039-fc07793b74bf-var-lib-calico\") pod \"tigera-operator-59c686f986-z7xt9\" (UID: \"ec9f7bb9-2fa2-4cad-b039-fc07793b74bf\") " pod="tigera-operator/tigera-operator-59c686f986-z7xt9" Oct 2 19:17:30.052303 env[1632]: time="2023-10-02T19:17:30.051752232Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-p5knh,Uid:a7779b41-d2bd-4320-99a1-dc6eaf3a2782,Namespace:kube-system,Attempt:0,}" Oct 2 19:17:30.111104 env[1632]: time="2023-10-02T19:17:30.111003033Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:17:30.113554 env[1632]: time="2023-10-02T19:17:30.112114364Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:17:30.114308 env[1632]: time="2023-10-02T19:17:30.114265634Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:17:30.116228 env[1632]: time="2023-10-02T19:17:30.115595773Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ad1ea15a723638c6e9e7f07c962b26db8335d9dece4ca104847d8a8fd1cb8077 pid=2910 runtime=io.containerd.runc.v2 Oct 2 19:17:30.175871 env[1632]: time="2023-10-02T19:17:30.175280683Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-z7xt9,Uid:ec9f7bb9-2fa2-4cad-b039-fc07793b74bf,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:17:30.186160 systemd[1]: Started cri-containerd-ad1ea15a723638c6e9e7f07c962b26db8335d9dece4ca104847d8a8fd1cb8077.scope. Oct 2 19:17:30.253982 kernel: kauditd_printk_skb: 10 callbacks suppressed Oct 2 19:17:30.254194 kernel: audit: type=1400 audit(1696274250.237:982): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.254642 kernel: audit: type=1400 audit(1696274250.237:983): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.263993 kernel: audit: type=1400 audit(1696274250.237:984): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.277423 kernel: audit: type=1400 audit(1696274250.237:985): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.277614 kernel: audit: type=1400 audit(1696274250.237:986): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.278016 env[1632]: time="2023-10-02T19:17:30.273695742Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:17:30.278016 env[1632]: time="2023-10-02T19:17:30.274092326Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:17:30.278016 env[1632]: time="2023-10-02T19:17:30.274127757Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:17:30.278016 env[1632]: time="2023-10-02T19:17:30.274404738Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f80c6ef4108c81db99cae8b3c73a6629e22258cb487f2ab95f4adbcbd341d6e6 pid=2948 runtime=io.containerd.runc.v2 Oct 2 19:17:30.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.293275 kernel: audit: type=1400 audit(1696274250.237:987): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.293424 kernel: audit: type=1400 audit(1696274250.237:988): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.298193 kernel: audit: type=1400 audit(1696274250.237:989): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.306258 kernel: audit: type=1400 audit(1696274250.237:990): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.312434 kernel: audit: type=1400 audit(1696274250.237:991): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.311914 systemd[1]: Started cri-containerd-f80c6ef4108c81db99cae8b3c73a6629e22258cb487f2ab95f4adbcbd341d6e6.scope. Oct 2 19:17:30.237000 audit: BPF prog-id=112 op=LOAD Oct 2 19:17:30.237000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[2922]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2910 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164316561313561373233363338633665396537663037633936326232 Oct 2 19:17:30.237000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[2922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2910 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164316561313561373233363338633665396537663037633936326232 Oct 2 19:17:30.237000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.237000 audit: BPF prog-id=113 op=LOAD Oct 2 19:17:30.237000 audit[2922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003087e0 items=0 ppid=2910 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164316561313561373233363338633665396537663037633936326232 Oct 2 19:17:30.245000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.245000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.245000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.245000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.245000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.245000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.245000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.245000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.245000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.245000 audit: BPF prog-id=114 op=LOAD Oct 2 19:17:30.245000 audit[2922]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000308828 items=0 ppid=2910 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164316561313561373233363338633665396537663037633936326232 Oct 2 19:17:30.252000 audit: BPF prog-id=114 op=UNLOAD Oct 2 19:17:30.252000 audit: BPF prog-id=113 op=UNLOAD Oct 2 19:17:30.252000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.252000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.252000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.252000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.252000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.252000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.252000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.252000 audit[2922]: AVC avc: denied { perfmon } for pid=2922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.252000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.252000 audit[2922]: AVC avc: denied { bpf } for pid=2922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.252000 audit: BPF prog-id=115 op=LOAD Oct 2 19:17:30.252000 audit[2922]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000308c38 items=0 ppid=2910 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164316561313561373233363338633665396537663037633936326232 Oct 2 19:17:30.342174 env[1632]: time="2023-10-02T19:17:30.342123535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-p5knh,Uid:a7779b41-d2bd-4320-99a1-dc6eaf3a2782,Namespace:kube-system,Attempt:0,} returns sandbox id \"ad1ea15a723638c6e9e7f07c962b26db8335d9dece4ca104847d8a8fd1cb8077\"" Oct 2 19:17:30.350801 env[1632]: time="2023-10-02T19:17:30.350754737Z" level=info msg="CreateContainer within sandbox \"ad1ea15a723638c6e9e7f07c962b26db8335d9dece4ca104847d8a8fd1cb8077\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:17:30.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.359000 audit: BPF prog-id=116 op=LOAD Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2948 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638306336656634313038633831646239396361653862336337336136 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2948 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638306336656634313038633831646239396361653862336337336136 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit: BPF prog-id=117 op=LOAD Oct 2 19:17:30.361000 audit[2957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003dabf0 items=0 ppid=2948 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638306336656634313038633831646239396361653862336337336136 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit: BPF prog-id=118 op=LOAD Oct 2 19:17:30.361000 audit[2957]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003dac38 items=0 ppid=2948 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638306336656634313038633831646239396361653862336337336136 Oct 2 19:17:30.361000 audit: BPF prog-id=118 op=UNLOAD Oct 2 19:17:30.361000 audit: BPF prog-id=117 op=UNLOAD Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.361000 audit: BPF prog-id=119 op=LOAD Oct 2 19:17:30.361000 audit[2957]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003db048 items=0 ppid=2948 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638306336656634313038633831646239396361653862336337336136 Oct 2 19:17:30.394399 env[1632]: time="2023-10-02T19:17:30.394337005Z" level=info msg="CreateContainer within sandbox \"ad1ea15a723638c6e9e7f07c962b26db8335d9dece4ca104847d8a8fd1cb8077\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"6666cfb1101114cd21066225cd35af29a29ce478ea99b499da3f6249cb03dd6e\"" Oct 2 19:17:30.395688 env[1632]: time="2023-10-02T19:17:30.395638191Z" level=info msg="StartContainer for \"6666cfb1101114cd21066225cd35af29a29ce478ea99b499da3f6249cb03dd6e\"" Oct 2 19:17:30.438015 systemd[1]: Started cri-containerd-6666cfb1101114cd21066225cd35af29a29ce478ea99b499da3f6249cb03dd6e.scope. Oct 2 19:17:30.458378 env[1632]: time="2023-10-02T19:17:30.458330279Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-z7xt9,Uid:ec9f7bb9-2fa2-4cad-b039-fc07793b74bf,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"f80c6ef4108c81db99cae8b3c73a6629e22258cb487f2ab95f4adbcbd341d6e6\"" Oct 2 19:17:30.476228 env[1632]: time="2023-10-02T19:17:30.473853648Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2910 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636363663666231313031313134636432313036363232356364333561 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit: BPF prog-id=120 op=LOAD Oct 2 19:17:30.490000 audit[2989]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0003d2170 items=0 ppid=2910 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636363663666231313031313134636432313036363232356364333561 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit: BPF prog-id=121 op=LOAD Oct 2 19:17:30.490000 audit[2989]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0003d21b8 items=0 ppid=2910 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636363663666231313031313134636432313036363232356364333561 Oct 2 19:17:30.490000 audit: BPF prog-id=121 op=UNLOAD Oct 2 19:17:30.490000 audit: BPF prog-id=120 op=UNLOAD Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { perfmon } for pid=2989 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit[2989]: AVC avc: denied { bpf } for pid=2989 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:30.490000 audit: BPF prog-id=122 op=LOAD Oct 2 19:17:30.490000 audit[2989]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003d2248 items=0 ppid=2910 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636363663666231313031313134636432313036363232356364333561 Oct 2 19:17:30.516044 env[1632]: time="2023-10-02T19:17:30.515999081Z" level=info msg="StartContainer for \"6666cfb1101114cd21066225cd35af29a29ce478ea99b499da3f6249cb03dd6e\" returns successfully" Oct 2 19:17:30.899299 systemd[1]: run-containerd-runc-k8s.io-ad1ea15a723638c6e9e7f07c962b26db8335d9dece4ca104847d8a8fd1cb8077-runc.GSqS1F.mount: Deactivated successfully. Oct 2 19:17:30.974000 audit[3045]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3045 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:30.974000 audit[3045]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9d8163f0 a2=0 a3=7ffe9d8163dc items=0 ppid=3006 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.974000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:17:30.976000 audit[3046]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=3046 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:30.976000 audit[3046]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb1dcff90 a2=0 a3=7ffdb1dcff7c items=0 ppid=3006 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:17:30.979000 audit[3047]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=3047 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:30.979000 audit[3047]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfc317b00 a2=0 a3=7ffcfc317aec items=0 ppid=3006 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:17:30.980000 audit[3048]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=3048 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:30.980000 audit[3048]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd603df770 a2=0 a3=7ffd603df75c items=0 ppid=3006 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.980000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:17:30.985000 audit[3049]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=3049 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:30.985000 audit[3049]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe42b52eb0 a2=0 a3=7ffe42b52e9c items=0 ppid=3006 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.985000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:17:30.995000 audit[3050]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=3050 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:30.995000 audit[3050]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffbd38a810 a2=0 a3=7fffbd38a7fc items=0 ppid=3006 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:30.995000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:17:31.083000 audit[3051]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3051 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.083000 audit[3051]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff36441210 a2=0 a3=7fff364411fc items=0 ppid=3006 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:17:31.089000 audit[3053]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3053 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.089000 audit[3053]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc338d2d30 a2=0 a3=7ffc338d2d1c items=0 ppid=3006 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:17:31.097000 audit[3056]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3056 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.097000 audit[3056]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff20c60860 a2=0 a3=7fff20c6084c items=0 ppid=3006 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:17:31.099000 audit[3057]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3057 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.099000 audit[3057]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc57a47f10 a2=0 a3=7ffc57a47efc items=0 ppid=3006 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:17:31.104000 audit[3059]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3059 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.104000 audit[3059]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd5c9e3890 a2=0 a3=7ffd5c9e387c items=0 ppid=3006 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:17:31.106000 audit[3060]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3060 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.106000 audit[3060]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff529f5d10 a2=0 a3=7fff529f5cfc items=0 ppid=3006 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:17:31.112000 audit[3062]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3062 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.112000 audit[3062]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffedae74930 a2=0 a3=7ffedae7491c items=0 ppid=3006 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:17:31.120000 audit[3065]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.120000 audit[3065]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff95454230 a2=0 a3=7fff9545421c items=0 ppid=3006 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:17:31.122000 audit[3066]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3066 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.122000 audit[3066]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9919e8f0 a2=0 a3=7fff9919e8dc items=0 ppid=3006 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:17:31.127000 audit[3068]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3068 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.127000 audit[3068]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe1fb209f0 a2=0 a3=7ffe1fb209dc items=0 ppid=3006 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:17:31.129000 audit[3069]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3069 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.129000 audit[3069]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc73705e0 a2=0 a3=7fffc73705cc items=0 ppid=3006 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:17:31.134000 audit[3071]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3071 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.134000 audit[3071]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3acbba60 a2=0 a3=7ffc3acbba4c items=0 ppid=3006 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:17:31.145000 audit[3074]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3074 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.145000 audit[3074]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd60ed86d0 a2=0 a3=7ffd60ed86bc items=0 ppid=3006 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:17:31.152000 audit[3077]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3077 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.152000 audit[3077]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcaab75440 a2=0 a3=7ffcaab7542c items=0 ppid=3006 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.152000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:17:31.155000 audit[3078]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.155000 audit[3078]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd86bffc70 a2=0 a3=7ffd86bffc5c items=0 ppid=3006 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.155000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:17:31.161000 audit[3080]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.161000 audit[3080]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc0b368b00 a2=0 a3=7ffc0b368aec items=0 ppid=3006 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:17:31.168000 audit[3083]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3083 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.168000 audit[3083]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd52163f0 a2=0 a3=7ffdd52163dc items=0 ppid=3006 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:17:31.191000 audit[3088]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.191000 audit[3088]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbbe972f0 a2=0 a3=7ffcbbe972dc items=0 ppid=3006 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:17:31.197000 audit[3090]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:17:31.197000 audit[3090]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fffa72d2aa0 a2=0 a3=7fffa72d2a8c items=0 ppid=3006 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:17:31.240000 audit[3092]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:31.240000 audit[3092]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffcdac7ee40 a2=0 a3=7ffcdac7ee2c items=0 ppid=3006 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.240000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:31.251000 audit[3092]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:31.251000 audit[3092]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffcdac7ee40 a2=0 a3=7ffcdac7ee2c items=0 ppid=3006 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.251000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:31.254000 audit[3098]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3098 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.254000 audit[3098]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd3572dad0 a2=0 a3=7ffd3572dabc items=0 ppid=3006 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:17:31.258000 audit[3100]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3100 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.258000 audit[3100]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff58408120 a2=0 a3=7fff5840810c items=0 ppid=3006 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:17:31.262000 audit[3103]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3103 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.262000 audit[3103]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcdaebde70 a2=0 a3=7ffcdaebde5c items=0 ppid=3006 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:17:31.264000 audit[3104]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3104 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.264000 audit[3104]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3fb1e200 a2=0 a3=7fff3fb1e1ec items=0 ppid=3006 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:17:31.268000 audit[3106]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3106 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.268000 audit[3106]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe35c1fed0 a2=0 a3=7ffe35c1febc items=0 ppid=3006 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.268000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:17:31.269000 audit[3107]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3107 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.269000 audit[3107]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3dce7990 a2=0 a3=7ffe3dce797c items=0 ppid=3006 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:17:31.273000 audit[3109]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3109 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.273000 audit[3109]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff46bb3cb0 a2=0 a3=7fff46bb3c9c items=0 ppid=3006 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:17:31.278000 audit[3112]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3112 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.278000 audit[3112]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd6429c7a0 a2=0 a3=7ffd6429c78c items=0 ppid=3006 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:17:31.279000 audit[3113]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3113 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.279000 audit[3113]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd90b983a0 a2=0 a3=7ffd90b9838c items=0 ppid=3006 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.279000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:17:31.284000 audit[3115]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3115 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.284000 audit[3115]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe0d2c2dd0 a2=0 a3=7ffe0d2c2dbc items=0 ppid=3006 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.284000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:17:31.285000 audit[3116]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3116 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.285000 audit[3116]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca1493820 a2=0 a3=7ffca149380c items=0 ppid=3006 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:17:31.288000 audit[3118]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3118 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.288000 audit[3118]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd1b9bcf0 a2=0 a3=7fffd1b9bcdc items=0 ppid=3006 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:17:31.293000 audit[3121]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3121 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.293000 audit[3121]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2ca6ddd0 a2=0 a3=7ffc2ca6ddbc items=0 ppid=3006 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:17:31.299000 audit[3124]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3124 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.299000 audit[3124]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd63e52e70 a2=0 a3=7ffd63e52e5c items=0 ppid=3006 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:17:31.300000 audit[3125]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3125 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.300000 audit[3125]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff38898620 a2=0 a3=7fff3889860c items=0 ppid=3006 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:17:31.306000 audit[3127]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3127 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.306000 audit[3127]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe62d9f610 a2=0 a3=7ffe62d9f5fc items=0 ppid=3006 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:17:31.311000 audit[3130]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3130 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.311000 audit[3130]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe67b1cfc0 a2=0 a3=7ffe67b1cfac items=0 ppid=3006 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:17:31.312000 audit[3131]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=3131 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.312000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbabf0da0 a2=0 a3=7fffbabf0d8c items=0 ppid=3006 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:17:31.319000 audit[3133]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=3133 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.319000 audit[3133]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcc0648aa0 a2=0 a3=7ffcc0648a8c items=0 ppid=3006 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:17:31.325000 audit[3136]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=3136 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.325000 audit[3136]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc8d1dc520 a2=0 a3=7ffc8d1dc50c items=0 ppid=3006 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:17:31.327000 audit[3137]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=3137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.327000 audit[3137]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff44e16dc0 a2=0 a3=7fff44e16dac items=0 ppid=3006 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:17:31.331000 audit[3139]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=3139 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:17:31.331000 audit[3139]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc1deb7ca0 a2=0 a3=7ffc1deb7c8c items=0 ppid=3006 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.331000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:17:31.336000 audit[3141]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3141 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:17:31.336000 audit[3141]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffddd5cbb30 a2=0 a3=7ffddd5cbb1c items=0 ppid=3006 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.336000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:31.339080 kubelet[2831]: I1002 19:17:31.339050 2831 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-p5knh" podStartSLOduration=2.339001393 podCreationTimestamp="2023-10-02 19:17:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:17:31.33734451 +0000 UTC m=+15.375665900" watchObservedRunningTime="2023-10-02 19:17:31.339001393 +0000 UTC m=+15.377322780" Oct 2 19:17:31.339000 audit[3141]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3141 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:17:31.339000 audit[3141]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffddd5cbb30 a2=0 a3=7ffddd5cbb1c items=0 ppid=3006 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:31.339000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:31.837199 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1486674070.mount: Deactivated successfully. Oct 2 19:17:33.251904 env[1632]: time="2023-10-02T19:17:33.251747071Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:33.258416 env[1632]: time="2023-10-02T19:17:33.258274384Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:33.260386 env[1632]: time="2023-10-02T19:17:33.260338155Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:33.263044 env[1632]: time="2023-10-02T19:17:33.262993857Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:33.264123 env[1632]: time="2023-10-02T19:17:33.264087618Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:17:33.268423 env[1632]: time="2023-10-02T19:17:33.268385166Z" level=info msg="CreateContainer within sandbox \"f80c6ef4108c81db99cae8b3c73a6629e22258cb487f2ab95f4adbcbd341d6e6\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:17:33.292414 env[1632]: time="2023-10-02T19:17:33.292128879Z" level=info msg="CreateContainer within sandbox \"f80c6ef4108c81db99cae8b3c73a6629e22258cb487f2ab95f4adbcbd341d6e6\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"dff31c85853ed27dc971426c43b6d88f5c21a90f430b19726dcdec5b3a4d00b3\"" Oct 2 19:17:33.300273 env[1632]: time="2023-10-02T19:17:33.300232451Z" level=info msg="StartContainer for \"dff31c85853ed27dc971426c43b6d88f5c21a90f430b19726dcdec5b3a4d00b3\"" Oct 2 19:17:33.348275 systemd[1]: run-containerd-runc-k8s.io-dff31c85853ed27dc971426c43b6d88f5c21a90f430b19726dcdec5b3a4d00b3-runc.xStQLZ.mount: Deactivated successfully. Oct 2 19:17:33.350878 systemd[1]: Started cri-containerd-dff31c85853ed27dc971426c43b6d88f5c21a90f430b19726dcdec5b3a4d00b3.scope. Oct 2 19:17:33.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.367000 audit: BPF prog-id=123 op=LOAD Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2948 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:33.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466663331633835383533656432376463393731343236633433623664 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2948 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:33.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466663331633835383533656432376463393731343236633433623664 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit: BPF prog-id=124 op=LOAD Oct 2 19:17:33.368000 audit[3149]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000210de0 items=0 ppid=2948 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:33.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466663331633835383533656432376463393731343236633433623664 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit: BPF prog-id=125 op=LOAD Oct 2 19:17:33.368000 audit[3149]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000210e28 items=0 ppid=2948 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:33.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466663331633835383533656432376463393731343236633433623664 Oct 2 19:17:33.368000 audit: BPF prog-id=125 op=UNLOAD Oct 2 19:17:33.368000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:33.368000 audit: BPF prog-id=126 op=LOAD Oct 2 19:17:33.368000 audit[3149]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000211238 items=0 ppid=2948 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:33.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466663331633835383533656432376463393731343236633433623664 Oct 2 19:17:33.396060 env[1632]: time="2023-10-02T19:17:33.396003635Z" level=info msg="StartContainer for \"dff31c85853ed27dc971426c43b6d88f5c21a90f430b19726dcdec5b3a4d00b3\" returns successfully" Oct 2 19:17:34.358123 kubelet[2831]: I1002 19:17:34.358088 2831 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-59c686f986-z7xt9" podStartSLOduration=2.563378913 podCreationTimestamp="2023-10-02 19:17:29 +0000 UTC" firstStartedPulling="2023-10-02 19:17:30.469826582 +0000 UTC m=+14.508147962" lastFinishedPulling="2023-10-02 19:17:33.264487927 +0000 UTC m=+17.302809307" observedRunningTime="2023-10-02 19:17:34.357800596 +0000 UTC m=+18.396121984" watchObservedRunningTime="2023-10-02 19:17:34.358040258 +0000 UTC m=+18.396361646" Oct 2 19:17:35.503000 audit[3183]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3183 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:35.516892 kernel: kauditd_printk_skb: 357 callbacks suppressed Oct 2 19:17:35.517055 kernel: audit: type=1325 audit(1696274255.503:1093): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3183 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:35.517105 kernel: audit: type=1300 audit(1696274255.503:1093): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe652c93a0 a2=0 a3=7ffe652c938c items=0 ppid=3006 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:35.503000 audit[3183]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe652c93a0 a2=0 a3=7ffe652c938c items=0 ppid=3006 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:35.503000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:35.523731 kernel: audit: type=1327 audit(1696274255.503:1093): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:35.503000 audit[3183]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3183 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:35.541739 kernel: audit: type=1325 audit(1696274255.503:1094): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3183 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:35.541910 kernel: audit: type=1300 audit(1696274255.503:1094): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe652c93a0 a2=0 a3=31030 items=0 ppid=3006 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:35.503000 audit[3183]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe652c93a0 a2=0 a3=31030 items=0 ppid=3006 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:35.503000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:35.541000 audit[3185]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3185 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:35.551043 kernel: audit: type=1327 audit(1696274255.503:1094): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:35.551235 kernel: audit: type=1325 audit(1696274255.541:1095): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3185 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:35.551375 kernel: audit: type=1300 audit(1696274255.541:1095): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff9e6a87a0 a2=0 a3=7fff9e6a878c items=0 ppid=3006 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:35.541000 audit[3185]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff9e6a87a0 a2=0 a3=7fff9e6a878c items=0 ppid=3006 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:35.541000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:35.561803 kernel: audit: type=1327 audit(1696274255.541:1095): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:35.545000 audit[3185]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3185 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:35.545000 audit[3185]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff9e6a87a0 a2=0 a3=31030 items=0 ppid=3006 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:35.545000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:35.566878 kernel: audit: type=1325 audit(1696274255.545:1096): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3185 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:35.742404 kubelet[2831]: I1002 19:17:35.742366 2831 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:17:35.750635 systemd[1]: Created slice kubepods-besteffort-podf728f760_db78_440e_9c22_d3b390157f17.slice. Oct 2 19:17:35.823369 kubelet[2831]: I1002 19:17:35.823225 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f728f760-db78-440e-9c22-d3b390157f17-typha-certs\") pod \"calico-typha-bb56b9ddd-gklj8\" (UID: \"f728f760-db78-440e-9c22-d3b390157f17\") " pod="calico-system/calico-typha-bb56b9ddd-gklj8" Oct 2 19:17:35.823369 kubelet[2831]: I1002 19:17:35.823345 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fszdl\" (UniqueName: \"kubernetes.io/projected/f728f760-db78-440e-9c22-d3b390157f17-kube-api-access-fszdl\") pod \"calico-typha-bb56b9ddd-gklj8\" (UID: \"f728f760-db78-440e-9c22-d3b390157f17\") " pod="calico-system/calico-typha-bb56b9ddd-gklj8" Oct 2 19:17:35.823662 kubelet[2831]: I1002 19:17:35.823412 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f728f760-db78-440e-9c22-d3b390157f17-tigera-ca-bundle\") pod \"calico-typha-bb56b9ddd-gklj8\" (UID: \"f728f760-db78-440e-9c22-d3b390157f17\") " pod="calico-system/calico-typha-bb56b9ddd-gklj8" Oct 2 19:17:35.864982 kubelet[2831]: I1002 19:17:35.864950 2831 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:17:35.875809 systemd[1]: Created slice kubepods-besteffort-podce48a519_6b81_49dd_8009_db10e3105860.slice. Oct 2 19:17:35.924659 kubelet[2831]: I1002 19:17:35.924625 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ce48a519-6b81-49dd-8009-db10e3105860-var-lib-calico\") pod \"calico-node-gcrn5\" (UID: \"ce48a519-6b81-49dd-8009-db10e3105860\") " pod="calico-system/calico-node-gcrn5" Oct 2 19:17:35.925098 kubelet[2831]: I1002 19:17:35.925080 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ce48a519-6b81-49dd-8009-db10e3105860-cni-log-dir\") pod \"calico-node-gcrn5\" (UID: \"ce48a519-6b81-49dd-8009-db10e3105860\") " pod="calico-system/calico-node-gcrn5" Oct 2 19:17:35.925478 kubelet[2831]: I1002 19:17:35.925464 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ce48a519-6b81-49dd-8009-db10e3105860-tigera-ca-bundle\") pod \"calico-node-gcrn5\" (UID: \"ce48a519-6b81-49dd-8009-db10e3105860\") " pod="calico-system/calico-node-gcrn5" Oct 2 19:17:35.925672 kubelet[2831]: I1002 19:17:35.925661 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ce48a519-6b81-49dd-8009-db10e3105860-node-certs\") pod \"calico-node-gcrn5\" (UID: \"ce48a519-6b81-49dd-8009-db10e3105860\") " pod="calico-system/calico-node-gcrn5" Oct 2 19:17:35.925809 kubelet[2831]: I1002 19:17:35.925796 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ce48a519-6b81-49dd-8009-db10e3105860-cni-bin-dir\") pod \"calico-node-gcrn5\" (UID: \"ce48a519-6b81-49dd-8009-db10e3105860\") " pod="calico-system/calico-node-gcrn5" Oct 2 19:17:35.925993 kubelet[2831]: I1002 19:17:35.925981 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ce48a519-6b81-49dd-8009-db10e3105860-lib-modules\") pod \"calico-node-gcrn5\" (UID: \"ce48a519-6b81-49dd-8009-db10e3105860\") " pod="calico-system/calico-node-gcrn5" Oct 2 19:17:35.926109 kubelet[2831]: I1002 19:17:35.926099 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ce48a519-6b81-49dd-8009-db10e3105860-var-run-calico\") pod \"calico-node-gcrn5\" (UID: \"ce48a519-6b81-49dd-8009-db10e3105860\") " pod="calico-system/calico-node-gcrn5" Oct 2 19:17:35.926213 kubelet[2831]: I1002 19:17:35.926203 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rlwzd\" (UniqueName: \"kubernetes.io/projected/ce48a519-6b81-49dd-8009-db10e3105860-kube-api-access-rlwzd\") pod \"calico-node-gcrn5\" (UID: \"ce48a519-6b81-49dd-8009-db10e3105860\") " pod="calico-system/calico-node-gcrn5" Oct 2 19:17:35.926332 kubelet[2831]: I1002 19:17:35.926322 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ce48a519-6b81-49dd-8009-db10e3105860-flexvol-driver-host\") pod \"calico-node-gcrn5\" (UID: \"ce48a519-6b81-49dd-8009-db10e3105860\") " pod="calico-system/calico-node-gcrn5" Oct 2 19:17:35.926453 kubelet[2831]: I1002 19:17:35.926443 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ce48a519-6b81-49dd-8009-db10e3105860-xtables-lock\") pod \"calico-node-gcrn5\" (UID: \"ce48a519-6b81-49dd-8009-db10e3105860\") " pod="calico-system/calico-node-gcrn5" Oct 2 19:17:35.926561 kubelet[2831]: I1002 19:17:35.926550 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ce48a519-6b81-49dd-8009-db10e3105860-policysync\") pod \"calico-node-gcrn5\" (UID: \"ce48a519-6b81-49dd-8009-db10e3105860\") " pod="calico-system/calico-node-gcrn5" Oct 2 19:17:35.926670 kubelet[2831]: I1002 19:17:35.926660 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ce48a519-6b81-49dd-8009-db10e3105860-cni-net-dir\") pod \"calico-node-gcrn5\" (UID: \"ce48a519-6b81-49dd-8009-db10e3105860\") " pod="calico-system/calico-node-gcrn5" Oct 2 19:17:36.029267 kubelet[2831]: E1002 19:17:36.029237 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:36.029452 kubelet[2831]: W1002 19:17:36.029431 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:36.029586 kubelet[2831]: E1002 19:17:36.029574 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:36.030047 kubelet[2831]: E1002 19:17:36.030028 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:36.030165 kubelet[2831]: W1002 19:17:36.030151 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:36.030241 kubelet[2831]: E1002 19:17:36.030232 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:36.030515 kubelet[2831]: E1002 19:17:36.030502 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:36.030602 kubelet[2831]: W1002 19:17:36.030591 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:36.030686 kubelet[2831]: E1002 19:17:36.030677 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:36.030992 kubelet[2831]: E1002 19:17:36.030980 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:36.031094 kubelet[2831]: W1002 19:17:36.031082 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:36.031174 kubelet[2831]: E1002 19:17:36.031165 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:36.036840 kubelet[2831]: E1002 19:17:36.036818 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:36.037018 kubelet[2831]: W1002 19:17:36.037002 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:36.037102 kubelet[2831]: E1002 19:17:36.037092 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:36.042125 kubelet[2831]: E1002 19:17:36.042103 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:36.042299 kubelet[2831]: W1002 19:17:36.042282 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:36.042387 kubelet[2831]: E1002 19:17:36.042377 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:36.057372 env[1632]: time="2023-10-02T19:17:36.056885374Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-bb56b9ddd-gklj8,Uid:f728f760-db78-440e-9c22-d3b390157f17,Namespace:calico-system,Attempt:0,}" Oct 2 19:17:36.076536 kubelet[2831]: E1002 19:17:36.075181 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:36.076536 kubelet[2831]: W1002 19:17:36.075214 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:36.076536 kubelet[2831]: E1002 19:17:36.075239 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:36.093609 env[1632]: time="2023-10-02T19:17:36.091788379Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:17:36.093609 env[1632]: time="2023-10-02T19:17:36.091893473Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:17:36.093609 env[1632]: time="2023-10-02T19:17:36.091928584Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:17:36.093609 env[1632]: time="2023-10-02T19:17:36.092135380Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f05f90291216092c4ce07d5f0175e95342aaf2472d89acd03442987ce57d7e50 pid=3204 runtime=io.containerd.runc.v2 Oct 2 19:17:36.112126 systemd[1]: Started cri-containerd-f05f90291216092c4ce07d5f0175e95342aaf2472d89acd03442987ce57d7e50.scope. Oct 2 19:17:36.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.143000 audit: BPF prog-id=127 op=LOAD Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3204 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:36.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630356639303239313231363039326334636530376435663031373565 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3204 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:36.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630356639303239313231363039326334636530376435663031373565 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit: BPF prog-id=128 op=LOAD Oct 2 19:17:36.144000 audit[3215]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000220340 items=0 ppid=3204 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:36.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630356639303239313231363039326334636530376435663031373565 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit: BPF prog-id=129 op=LOAD Oct 2 19:17:36.144000 audit[3215]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000220388 items=0 ppid=3204 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:36.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630356639303239313231363039326334636530376435663031373565 Oct 2 19:17:36.144000 audit: BPF prog-id=129 op=UNLOAD Oct 2 19:17:36.144000 audit: BPF prog-id=128 op=UNLOAD Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.144000 audit: BPF prog-id=130 op=LOAD Oct 2 19:17:36.144000 audit[3215]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000220798 items=0 ppid=3204 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:36.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630356639303239313231363039326334636530376435663031373565 Oct 2 19:17:36.182804 env[1632]: time="2023-10-02T19:17:36.182759964Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gcrn5,Uid:ce48a519-6b81-49dd-8009-db10e3105860,Namespace:calico-system,Attempt:0,}" Oct 2 19:17:36.202481 env[1632]: time="2023-10-02T19:17:36.202427105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-bb56b9ddd-gklj8,Uid:f728f760-db78-440e-9c22-d3b390157f17,Namespace:calico-system,Attempt:0,} returns sandbox id \"f05f90291216092c4ce07d5f0175e95342aaf2472d89acd03442987ce57d7e50\"" Oct 2 19:17:36.233040 env[1632]: time="2023-10-02T19:17:36.231656641Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 19:17:36.256250 env[1632]: time="2023-10-02T19:17:36.254313019Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:17:36.256250 env[1632]: time="2023-10-02T19:17:36.254358447Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:17:36.256250 env[1632]: time="2023-10-02T19:17:36.254375541Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:17:36.256250 env[1632]: time="2023-10-02T19:17:36.254524526Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7edfbe534302e463e618845423dee5bbe89ac38c47a8afc388301bc8cf92dd69 pid=3245 runtime=io.containerd.runc.v2 Oct 2 19:17:36.289329 systemd[1]: Started cri-containerd-7edfbe534302e463e618845423dee5bbe89ac38c47a8afc388301bc8cf92dd69.scope. Oct 2 19:17:36.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.307000 audit: BPF prog-id=131 op=LOAD Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3245 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:36.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646662653533343330326534363365363138383435343233646565 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3245 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:36.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646662653533343330326534363365363138383435343233646565 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit: BPF prog-id=132 op=LOAD Oct 2 19:17:36.309000 audit[3255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000213510 items=0 ppid=3245 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:36.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646662653533343330326534363365363138383435343233646565 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.309000 audit: BPF prog-id=133 op=LOAD Oct 2 19:17:36.309000 audit[3255]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000213558 items=0 ppid=3245 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:36.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646662653533343330326534363365363138383435343233646565 Oct 2 19:17:36.309000 audit: BPF prog-id=133 op=UNLOAD Oct 2 19:17:36.309000 audit: BPF prog-id=132 op=UNLOAD Oct 2 19:17:36.312000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.312000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.312000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.312000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.312000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.312000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.312000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.312000 audit[3255]: AVC avc: denied { perfmon } for pid=3255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.312000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.312000 audit[3255]: AVC avc: denied { bpf } for pid=3255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:36.312000 audit: BPF prog-id=134 op=LOAD Oct 2 19:17:36.312000 audit[3255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000213968 items=0 ppid=3245 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:36.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646662653533343330326534363365363138383435343233646565 Oct 2 19:17:36.347656 env[1632]: time="2023-10-02T19:17:36.347535126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gcrn5,Uid:ce48a519-6b81-49dd-8009-db10e3105860,Namespace:calico-system,Attempt:0,} returns sandbox id \"7edfbe534302e463e618845423dee5bbe89ac38c47a8afc388301bc8cf92dd69\"" Oct 2 19:17:36.583000 audit[3278]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3278 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:36.583000 audit[3278]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffcec576360 a2=0 a3=7ffcec57634c items=0 ppid=3006 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:36.583000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:36.585000 audit[3278]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3278 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:36.585000 audit[3278]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffcec576360 a2=0 a3=31030 items=0 ppid=3006 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:36.585000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:37.425050 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1612150530.mount: Deactivated successfully. Oct 2 19:17:39.232101 env[1632]: time="2023-10-02T19:17:39.232050844Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:39.235340 env[1632]: time="2023-10-02T19:17:39.235296368Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:39.238088 env[1632]: time="2023-10-02T19:17:39.238050853Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:39.241205 env[1632]: time="2023-10-02T19:17:39.241168066Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:39.242721 env[1632]: time="2023-10-02T19:17:39.242681765Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\"" Oct 2 19:17:39.246224 env[1632]: time="2023-10-02T19:17:39.246187530Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:17:39.248210 env[1632]: time="2023-10-02T19:17:39.248170311Z" level=info msg="CreateContainer within sandbox \"f05f90291216092c4ce07d5f0175e95342aaf2472d89acd03442987ce57d7e50\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 19:17:39.273250 env[1632]: time="2023-10-02T19:17:39.273191029Z" level=info msg="CreateContainer within sandbox \"f05f90291216092c4ce07d5f0175e95342aaf2472d89acd03442987ce57d7e50\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"a6c7ed5976d37719b6e36a46ae55fe1185f86d8e0ce4f11c939a3b11dd20f555\"" Oct 2 19:17:39.276011 env[1632]: time="2023-10-02T19:17:39.274182714Z" level=info msg="StartContainer for \"a6c7ed5976d37719b6e36a46ae55fe1185f86d8e0ce4f11c939a3b11dd20f555\"" Oct 2 19:17:39.313686 systemd[1]: run-containerd-runc-k8s.io-a6c7ed5976d37719b6e36a46ae55fe1185f86d8e0ce4f11c939a3b11dd20f555-runc.6Lf6Fe.mount: Deactivated successfully. Oct 2 19:17:39.316036 systemd[1]: Started cri-containerd-a6c7ed5976d37719b6e36a46ae55fe1185f86d8e0ce4f11c939a3b11dd20f555.scope. Oct 2 19:17:39.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.339000 audit: BPF prog-id=135 op=LOAD Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3204 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:39.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136633765643539373664333737313962366533366134366165353566 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3204 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:39.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136633765643539373664333737313962366533366134366165353566 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit: BPF prog-id=136 op=LOAD Oct 2 19:17:39.341000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00018fee0 items=0 ppid=3204 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:39.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136633765643539373664333737313962366533366134366165353566 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit: BPF prog-id=137 op=LOAD Oct 2 19:17:39.341000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00018ff28 items=0 ppid=3204 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:39.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136633765643539373664333737313962366533366134366165353566 Oct 2 19:17:39.341000 audit: BPF prog-id=137 op=UNLOAD Oct 2 19:17:39.341000 audit: BPF prog-id=136 op=UNLOAD Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:39.341000 audit: BPF prog-id=138 op=LOAD Oct 2 19:17:39.341000 audit[3288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c6338 items=0 ppid=3204 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:39.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136633765643539373664333737313962366533366134366165353566 Oct 2 19:17:39.380449 env[1632]: time="2023-10-02T19:17:39.380396868Z" level=info msg="StartContainer for \"a6c7ed5976d37719b6e36a46ae55fe1185f86d8e0ce4f11c939a3b11dd20f555\" returns successfully" Oct 2 19:17:40.384879 kubelet[2831]: E1002 19:17:40.384837 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.384879 kubelet[2831]: W1002 19:17:40.384878 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.386148 kubelet[2831]: E1002 19:17:40.384902 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.386148 kubelet[2831]: E1002 19:17:40.385204 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.386148 kubelet[2831]: W1002 19:17:40.385256 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.386148 kubelet[2831]: E1002 19:17:40.385276 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.386148 kubelet[2831]: E1002 19:17:40.385985 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.386148 kubelet[2831]: W1002 19:17:40.386001 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.386148 kubelet[2831]: E1002 19:17:40.386054 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.386653 kubelet[2831]: E1002 19:17:40.386315 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.386653 kubelet[2831]: W1002 19:17:40.386325 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.386653 kubelet[2831]: E1002 19:17:40.386341 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.386653 kubelet[2831]: E1002 19:17:40.386533 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.386653 kubelet[2831]: W1002 19:17:40.386542 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.386653 kubelet[2831]: E1002 19:17:40.386556 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.387454 kubelet[2831]: E1002 19:17:40.387195 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.387454 kubelet[2831]: W1002 19:17:40.387206 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.387454 kubelet[2831]: E1002 19:17:40.387223 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.387602 kubelet[2831]: E1002 19:17:40.387504 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.387602 kubelet[2831]: W1002 19:17:40.387514 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.387602 kubelet[2831]: E1002 19:17:40.387530 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.387790 kubelet[2831]: E1002 19:17:40.387723 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.387790 kubelet[2831]: W1002 19:17:40.387733 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.387790 kubelet[2831]: E1002 19:17:40.387747 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.388074 kubelet[2831]: E1002 19:17:40.387957 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.388074 kubelet[2831]: W1002 19:17:40.387966 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.388074 kubelet[2831]: E1002 19:17:40.387982 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.388292 kubelet[2831]: E1002 19:17:40.388245 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.388292 kubelet[2831]: W1002 19:17:40.388264 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.388292 kubelet[2831]: E1002 19:17:40.388282 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.388505 kubelet[2831]: E1002 19:17:40.388486 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.388505 kubelet[2831]: W1002 19:17:40.388495 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.388601 kubelet[2831]: E1002 19:17:40.388510 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.388881 kubelet[2831]: E1002 19:17:40.388694 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.388881 kubelet[2831]: W1002 19:17:40.388708 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.388881 kubelet[2831]: E1002 19:17:40.388824 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.438722 kubelet[2831]: I1002 19:17:40.438683 2831 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-bb56b9ddd-gklj8" podStartSLOduration=2.399271119 podCreationTimestamp="2023-10-02 19:17:35 +0000 UTC" firstStartedPulling="2023-10-02 19:17:36.203828961 +0000 UTC m=+20.242150348" lastFinishedPulling="2023-10-02 19:17:39.243175928 +0000 UTC m=+23.281497310" observedRunningTime="2023-10-02 19:17:40.413536843 +0000 UTC m=+24.451858228" watchObservedRunningTime="2023-10-02 19:17:40.438618081 +0000 UTC m=+24.476939470" Oct 2 19:17:40.488717 kubelet[2831]: E1002 19:17:40.484741 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.488717 kubelet[2831]: W1002 19:17:40.484760 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.488717 kubelet[2831]: E1002 19:17:40.484785 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.488717 kubelet[2831]: E1002 19:17:40.486347 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.488717 kubelet[2831]: W1002 19:17:40.486365 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.488717 kubelet[2831]: E1002 19:17:40.486394 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.488717 kubelet[2831]: E1002 19:17:40.486687 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.488717 kubelet[2831]: W1002 19:17:40.486697 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.488717 kubelet[2831]: E1002 19:17:40.486812 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.488717 kubelet[2831]: E1002 19:17:40.487049 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.489800 kubelet[2831]: W1002 19:17:40.487060 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.489800 kubelet[2831]: E1002 19:17:40.487152 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.489800 kubelet[2831]: E1002 19:17:40.487282 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.489800 kubelet[2831]: W1002 19:17:40.487290 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.489800 kubelet[2831]: E1002 19:17:40.487308 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.489800 kubelet[2831]: E1002 19:17:40.487518 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.489800 kubelet[2831]: W1002 19:17:40.487528 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.489800 kubelet[2831]: E1002 19:17:40.487547 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.489800 kubelet[2831]: E1002 19:17:40.487740 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.489800 kubelet[2831]: W1002 19:17:40.487748 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.491021 kubelet[2831]: E1002 19:17:40.487765 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.492043 kubelet[2831]: E1002 19:17:40.491137 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.492043 kubelet[2831]: W1002 19:17:40.491155 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.492043 kubelet[2831]: E1002 19:17:40.491281 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.492043 kubelet[2831]: E1002 19:17:40.491944 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.492043 kubelet[2831]: W1002 19:17:40.491957 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.492832 kubelet[2831]: E1002 19:17:40.492115 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.492832 kubelet[2831]: E1002 19:17:40.492273 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.492832 kubelet[2831]: W1002 19:17:40.492282 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.492832 kubelet[2831]: E1002 19:17:40.492374 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.492832 kubelet[2831]: E1002 19:17:40.492580 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.492832 kubelet[2831]: W1002 19:17:40.492589 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.492000 audit[3330]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:40.492000 audit[3330]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc6d076ce0 a2=0 a3=7ffc6d076ccc items=0 ppid=3006 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:40.498645 kubelet[2831]: E1002 19:17:40.498249 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.499608 kubelet[2831]: E1002 19:17:40.499407 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.499608 kubelet[2831]: W1002 19:17:40.499433 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.499608 kubelet[2831]: E1002 19:17:40.499468 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.500001 kubelet[2831]: E1002 19:17:40.499870 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.500001 kubelet[2831]: W1002 19:17:40.499903 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.500225 kubelet[2831]: E1002 19:17:40.500156 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.500339 kubelet[2831]: E1002 19:17:40.500330 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.500419 kubelet[2831]: W1002 19:17:40.500409 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.500497 kubelet[2831]: E1002 19:17:40.500489 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.501095 kubelet[2831]: E1002 19:17:40.501082 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.501200 kubelet[2831]: W1002 19:17:40.501189 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.501284 kubelet[2831]: E1002 19:17:40.501275 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.501932 kubelet[2831]: E1002 19:17:40.501918 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.502094 kubelet[2831]: W1002 19:17:40.502081 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.502195 kubelet[2831]: E1002 19:17:40.502186 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.503416 kubelet[2831]: E1002 19:17:40.503403 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.503565 kubelet[2831]: W1002 19:17:40.503553 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.503651 kubelet[2831]: E1002 19:17:40.503643 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.492000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:40.506489 kubelet[2831]: E1002 19:17:40.506473 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:40.506612 kubelet[2831]: W1002 19:17:40.506600 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:40.506695 kubelet[2831]: E1002 19:17:40.506686 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:40.525694 kernel: kauditd_printk_skb: 182 callbacks suppressed Oct 2 19:17:40.525834 kernel: audit: type=1325 audit(1696274260.504:1154): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:40.504000 audit[3330]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:17:40.504000 audit[3330]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffc6d076ce0 a2=0 a3=7ffc6d076ccc items=0 ppid=3006 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:40.537886 kernel: audit: type=1300 audit(1696274260.504:1154): arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffc6d076ce0 a2=0 a3=7ffc6d076ccc items=0 ppid=3006 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:40.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:40.543925 kernel: audit: type=1327 audit(1696274260.504:1154): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:17:41.406200 kubelet[2831]: E1002 19:17:41.404309 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.406200 kubelet[2831]: W1002 19:17:41.404333 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.406200 kubelet[2831]: E1002 19:17:41.404362 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.406200 kubelet[2831]: E1002 19:17:41.404567 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.406200 kubelet[2831]: W1002 19:17:41.404576 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.406200 kubelet[2831]: E1002 19:17:41.404591 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.406200 kubelet[2831]: E1002 19:17:41.404762 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.406200 kubelet[2831]: W1002 19:17:41.404770 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.406200 kubelet[2831]: E1002 19:17:41.404783 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.406200 kubelet[2831]: E1002 19:17:41.405121 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.408142 kubelet[2831]: W1002 19:17:41.405132 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.408142 kubelet[2831]: E1002 19:17:41.405149 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.408142 kubelet[2831]: E1002 19:17:41.405322 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.408142 kubelet[2831]: W1002 19:17:41.405330 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.408142 kubelet[2831]: E1002 19:17:41.405344 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.408142 kubelet[2831]: E1002 19:17:41.405508 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.408142 kubelet[2831]: W1002 19:17:41.405516 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.408142 kubelet[2831]: E1002 19:17:41.405591 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.409061 kubelet[2831]: E1002 19:17:41.408638 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.409061 kubelet[2831]: W1002 19:17:41.408657 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.409061 kubelet[2831]: E1002 19:17:41.408683 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.409061 kubelet[2831]: E1002 19:17:41.408955 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.409061 kubelet[2831]: W1002 19:17:41.408968 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.409061 kubelet[2831]: E1002 19:17:41.408984 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.410475 kubelet[2831]: E1002 19:17:41.410029 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.410475 kubelet[2831]: W1002 19:17:41.410134 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.410475 kubelet[2831]: E1002 19:17:41.410155 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.410475 kubelet[2831]: E1002 19:17:41.410375 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.410475 kubelet[2831]: W1002 19:17:41.410385 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.410475 kubelet[2831]: E1002 19:17:41.410400 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.412618 kubelet[2831]: E1002 19:17:41.411955 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.412618 kubelet[2831]: W1002 19:17:41.411969 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.412618 kubelet[2831]: E1002 19:17:41.411987 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.412618 kubelet[2831]: E1002 19:17:41.412183 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.412618 kubelet[2831]: W1002 19:17:41.412191 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.412618 kubelet[2831]: E1002 19:17:41.412204 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.493883 kubelet[2831]: E1002 19:17:41.493426 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.493883 kubelet[2831]: W1002 19:17:41.493451 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.493883 kubelet[2831]: E1002 19:17:41.493478 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.493883 kubelet[2831]: E1002 19:17:41.493774 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.493883 kubelet[2831]: W1002 19:17:41.493787 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.493883 kubelet[2831]: E1002 19:17:41.493809 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.496380 kubelet[2831]: E1002 19:17:41.494953 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.496380 kubelet[2831]: W1002 19:17:41.494968 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.496380 kubelet[2831]: E1002 19:17:41.494991 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.496380 kubelet[2831]: E1002 19:17:41.495214 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.496380 kubelet[2831]: W1002 19:17:41.495223 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.496380 kubelet[2831]: E1002 19:17:41.495241 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.496380 kubelet[2831]: E1002 19:17:41.495433 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.496380 kubelet[2831]: W1002 19:17:41.495441 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.496380 kubelet[2831]: E1002 19:17:41.495458 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.496380 kubelet[2831]: E1002 19:17:41.495678 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.497127 kubelet[2831]: W1002 19:17:41.495685 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.497127 kubelet[2831]: E1002 19:17:41.495703 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.497127 kubelet[2831]: E1002 19:17:41.496205 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.497127 kubelet[2831]: W1002 19:17:41.496217 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.497127 kubelet[2831]: E1002 19:17:41.496260 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.498443 kubelet[2831]: E1002 19:17:41.497562 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.498443 kubelet[2831]: W1002 19:17:41.497575 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.498443 kubelet[2831]: E1002 19:17:41.497666 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.498443 kubelet[2831]: E1002 19:17:41.497791 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.498443 kubelet[2831]: W1002 19:17:41.497799 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.498443 kubelet[2831]: E1002 19:17:41.497901 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.498443 kubelet[2831]: E1002 19:17:41.498198 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.498443 kubelet[2831]: W1002 19:17:41.498209 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.498443 kubelet[2831]: E1002 19:17:41.498302 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.499470 kubelet[2831]: E1002 19:17:41.498723 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.499470 kubelet[2831]: W1002 19:17:41.498733 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.499470 kubelet[2831]: E1002 19:17:41.498754 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.500048 kubelet[2831]: E1002 19:17:41.499637 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.500048 kubelet[2831]: W1002 19:17:41.499650 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.500048 kubelet[2831]: E1002 19:17:41.499747 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.500048 kubelet[2831]: E1002 19:17:41.499956 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.500048 kubelet[2831]: W1002 19:17:41.499964 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.500048 kubelet[2831]: E1002 19:17:41.499983 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.500826 kubelet[2831]: E1002 19:17:41.500627 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.500826 kubelet[2831]: W1002 19:17:41.500639 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.500826 kubelet[2831]: E1002 19:17:41.500660 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.501369 kubelet[2831]: E1002 19:17:41.501356 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.501469 kubelet[2831]: W1002 19:17:41.501458 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.501615 kubelet[2831]: E1002 19:17:41.501607 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.502537 kubelet[2831]: E1002 19:17:41.502464 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.502654 kubelet[2831]: W1002 19:17:41.502641 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.502758 kubelet[2831]: E1002 19:17:41.502750 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.503281 kubelet[2831]: E1002 19:17:41.503268 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.503407 kubelet[2831]: W1002 19:17:41.503397 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.503554 kubelet[2831]: E1002 19:17:41.503544 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.504008 kubelet[2831]: E1002 19:17:41.503996 2831 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:17:41.504174 kubelet[2831]: W1002 19:17:41.504159 2831 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:17:41.504359 kubelet[2831]: E1002 19:17:41.504346 2831 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:17:41.518176 env[1632]: time="2023-10-02T19:17:41.518122146Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:41.522259 env[1632]: time="2023-10-02T19:17:41.522112798Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:41.525503 env[1632]: time="2023-10-02T19:17:41.525461052Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:41.527418 env[1632]: time="2023-10-02T19:17:41.527334727Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:41.529379 env[1632]: time="2023-10-02T19:17:41.529333518Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:17:41.535933 env[1632]: time="2023-10-02T19:17:41.535769879Z" level=info msg="CreateContainer within sandbox \"7edfbe534302e463e618845423dee5bbe89ac38c47a8afc388301bc8cf92dd69\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:17:41.561079 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3484770887.mount: Deactivated successfully. Oct 2 19:17:41.573674 env[1632]: time="2023-10-02T19:17:41.573623794Z" level=info msg="CreateContainer within sandbox \"7edfbe534302e463e618845423dee5bbe89ac38c47a8afc388301bc8cf92dd69\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c83e7b6e802d33e8bd7d727006c08dd8d8c8b9fe09f5cbca21b03cc94c27103e\"" Oct 2 19:17:41.577300 env[1632]: time="2023-10-02T19:17:41.574429435Z" level=info msg="StartContainer for \"c83e7b6e802d33e8bd7d727006c08dd8d8c8b9fe09f5cbca21b03cc94c27103e\"" Oct 2 19:17:41.628024 systemd[1]: Started cri-containerd-c83e7b6e802d33e8bd7d727006c08dd8d8c8b9fe09f5cbca21b03cc94c27103e.scope. Oct 2 19:17:41.666142 kernel: audit: type=1400 audit(1696274261.651:1155): avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.666423 kernel: audit: type=1300 audit(1696274261.651:1155): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3245 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:41.651000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.651000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3245 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:41.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338336537623665383032643333653862643764373237303036633038 Oct 2 19:17:41.682071 kernel: audit: type=1327 audit(1696274261.651:1155): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338336537623665383032643333653862643764373237303036633038 Oct 2 19:17:41.651000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.651000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.697815 kernel: audit: type=1400 audit(1696274261.651:1156): avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.698012 kernel: audit: type=1400 audit(1696274261.651:1156): avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.698149 kernel: audit: type=1400 audit(1696274261.651:1156): avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.651000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.651000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.712434 env[1632]: time="2023-10-02T19:17:41.712383221Z" level=info msg="StartContainer for \"c83e7b6e802d33e8bd7d727006c08dd8d8c8b9fe09f5cbca21b03cc94c27103e\" returns successfully" Oct 2 19:17:41.713893 kernel: audit: type=1400 audit(1696274261.651:1156): avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.651000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.651000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.651000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.651000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.651000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.651000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.651000 audit: BPF prog-id=139 op=LOAD Oct 2 19:17:41.651000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8440 items=0 ppid=3245 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:41.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338336537623665383032643333653862643764373237303036633038 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit: BPF prog-id=140 op=LOAD Oct 2 19:17:41.665000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8488 items=0 ppid=3245 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:41.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338336537623665383032643333653862643764373237303036633038 Oct 2 19:17:41.665000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:17:41.665000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:41.665000 audit: BPF prog-id=141 op=LOAD Oct 2 19:17:41.665000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8518 items=0 ppid=3245 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:41.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338336537623665383032643333653862643764373237303036633038 Oct 2 19:17:41.732789 systemd[1]: cri-containerd-c83e7b6e802d33e8bd7d727006c08dd8d8c8b9fe09f5cbca21b03cc94c27103e.scope: Deactivated successfully. Oct 2 19:17:41.740000 audit: BPF prog-id=141 op=UNLOAD Oct 2 19:17:41.794718 env[1632]: time="2023-10-02T19:17:41.793348422Z" level=info msg="shim disconnected" id=c83e7b6e802d33e8bd7d727006c08dd8d8c8b9fe09f5cbca21b03cc94c27103e Oct 2 19:17:41.795067 env[1632]: time="2023-10-02T19:17:41.794746597Z" level=warning msg="cleaning up after shim disconnected" id=c83e7b6e802d33e8bd7d727006c08dd8d8c8b9fe09f5cbca21b03cc94c27103e namespace=k8s.io Oct 2 19:17:41.795067 env[1632]: time="2023-10-02T19:17:41.794775935Z" level=info msg="cleaning up dead shim" Oct 2 19:17:41.809734 env[1632]: time="2023-10-02T19:17:41.809555714Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:17:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3427 runtime=io.containerd.runc.v2\n" Oct 2 19:17:42.388718 env[1632]: time="2023-10-02T19:17:42.387679139Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:17:42.556676 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c83e7b6e802d33e8bd7d727006c08dd8d8c8b9fe09f5cbca21b03cc94c27103e-rootfs.mount: Deactivated successfully. Oct 2 19:17:43.631252 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount171566955.mount: Deactivated successfully. Oct 2 19:17:47.853320 env[1632]: time="2023-10-02T19:17:47.853264911Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:47.856164 env[1632]: time="2023-10-02T19:17:47.856123316Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:47.858500 env[1632]: time="2023-10-02T19:17:47.858460624Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:47.860629 env[1632]: time="2023-10-02T19:17:47.860589758Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:47.861677 env[1632]: time="2023-10-02T19:17:47.861597169Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:17:47.872632 env[1632]: time="2023-10-02T19:17:47.872577287Z" level=info msg="CreateContainer within sandbox \"7edfbe534302e463e618845423dee5bbe89ac38c47a8afc388301bc8cf92dd69\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:17:47.895643 env[1632]: time="2023-10-02T19:17:47.895589327Z" level=info msg="CreateContainer within sandbox \"7edfbe534302e463e618845423dee5bbe89ac38c47a8afc388301bc8cf92dd69\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"6adf7d0a17296dc830a8b35b63bc5c4a9a399246a3ed91d5952d5668af62c3ea\"" Oct 2 19:17:47.898320 env[1632]: time="2023-10-02T19:17:47.896452953Z" level=info msg="StartContainer for \"6adf7d0a17296dc830a8b35b63bc5c4a9a399246a3ed91d5952d5668af62c3ea\"" Oct 2 19:17:47.936702 systemd[1]: run-containerd-runc-k8s.io-6adf7d0a17296dc830a8b35b63bc5c4a9a399246a3ed91d5952d5668af62c3ea-runc.7Qahgf.mount: Deactivated successfully. Oct 2 19:17:47.947253 systemd[1]: Started cri-containerd-6adf7d0a17296dc830a8b35b63bc5c4a9a399246a3ed91d5952d5668af62c3ea.scope. Oct 2 19:17:47.973000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.976810 kernel: kauditd_printk_skb: 37 callbacks suppressed Oct 2 19:17:47.977022 kernel: audit: type=1400 audit(1696274267.973:1162): avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.973000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3245 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:47.989477 kernel: audit: type=1300 audit(1696274267.973:1162): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3245 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:47.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661646637643061313732393664633833306138623335623633626335 Oct 2 19:17:47.996299 kernel: audit: type=1327 audit(1696274267.973:1162): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661646637643061313732393664633833306138623335623633626335 Oct 2 19:17:47.973000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.000777 kernel: audit: type=1400 audit(1696274267.973:1163): avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.973000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.973000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.016298 kernel: audit: type=1400 audit(1696274267.973:1163): avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.017465 kernel: audit: type=1400 audit(1696274267.973:1163): avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.017501 kernel: audit: type=1400 audit(1696274267.973:1163): avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.973000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.973000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.973000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.035396 kernel: audit: type=1400 audit(1696274267.973:1163): avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.035543 kernel: audit: type=1400 audit(1696274267.973:1163): avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.973000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.042147 kernel: audit: type=1400 audit(1696274267.973:1163): avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.973000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.973000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.973000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.973000 audit: BPF prog-id=142 op=LOAD Oct 2 19:17:47.973000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0003887a0 items=0 ppid=3245 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:47.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661646637643061313732393664633833306138623335623633626335 Oct 2 19:17:47.989000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.989000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.989000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.989000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.989000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.989000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.989000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.989000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.989000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:47.989000 audit: BPF prog-id=143 op=LOAD Oct 2 19:17:47.989000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0003887e8 items=0 ppid=3245 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:47.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661646637643061313732393664633833306138623335623633626335 Oct 2 19:17:48.000000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:17:48.000000 audit: BPF prog-id=142 op=UNLOAD Oct 2 19:17:48.000000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.000000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.000000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.000000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.000000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.000000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.000000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.000000 audit[3454]: AVC avc: denied { perfmon } for pid=3454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.000000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.000000 audit[3454]: AVC avc: denied { bpf } for pid=3454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:48.000000 audit: BPF prog-id=144 op=LOAD Oct 2 19:17:48.000000 audit[3454]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000388878 items=0 ppid=3245 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:48.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661646637643061313732393664633833306138623335623633626335 Oct 2 19:17:48.073877 env[1632]: time="2023-10-02T19:17:48.073772290Z" level=info msg="StartContainer for \"6adf7d0a17296dc830a8b35b63bc5c4a9a399246a3ed91d5952d5668af62c3ea\" returns successfully" Oct 2 19:17:48.892026 env[1632]: time="2023-10-02T19:17:48.891945791Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:17:48.912096 systemd[1]: cri-containerd-6adf7d0a17296dc830a8b35b63bc5c4a9a399246a3ed91d5952d5668af62c3ea.scope: Deactivated successfully. Oct 2 19:17:48.914000 audit: BPF prog-id=144 op=UNLOAD Oct 2 19:17:48.958795 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6adf7d0a17296dc830a8b35b63bc5c4a9a399246a3ed91d5952d5668af62c3ea-rootfs.mount: Deactivated successfully. Oct 2 19:17:49.009615 kubelet[2831]: I1002 19:17:49.009587 2831 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:17:49.082120 kubelet[2831]: I1002 19:17:49.082066 2831 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:17:49.083792 kubelet[2831]: I1002 19:17:49.083765 2831 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:17:49.091324 systemd[1]: Created slice kubepods-burstable-pod32a66284_edb9_4f52_84a1_ade5bfe7b780.slice. Oct 2 19:17:49.102417 systemd[1]: Created slice kubepods-burstable-poda8a33ebd_4c7f_4b5f_b963_08624be62b41.slice. Oct 2 19:17:49.115500 kubelet[2831]: I1002 19:17:49.115451 2831 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:17:49.125249 systemd[1]: Created slice kubepods-besteffort-pod22669c5e_cfda_4de4_b127_3a16a77d35ba.slice. Oct 2 19:17:49.162983 kubelet[2831]: I1002 19:17:49.162844 2831 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:17:49.172684 kubelet[2831]: I1002 19:17:49.172645 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/32a66284-edb9-4f52-84a1-ade5bfe7b780-config-volume\") pod \"coredns-5d78c9869d-476mp\" (UID: \"32a66284-edb9-4f52-84a1-ade5bfe7b780\") " pod="kube-system/coredns-5d78c9869d-476mp" Oct 2 19:17:49.174985 kubelet[2831]: I1002 19:17:49.174955 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2ghpv\" (UniqueName: \"kubernetes.io/projected/a8a33ebd-4c7f-4b5f-b963-08624be62b41-kube-api-access-2ghpv\") pod \"coredns-5d78c9869d-fhxmt\" (UID: \"a8a33ebd-4c7f-4b5f-b963-08624be62b41\") " pod="kube-system/coredns-5d78c9869d-fhxmt" Oct 2 19:17:49.175201 kubelet[2831]: I1002 19:17:49.175187 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a8a33ebd-4c7f-4b5f-b963-08624be62b41-config-volume\") pod \"coredns-5d78c9869d-fhxmt\" (UID: \"a8a33ebd-4c7f-4b5f-b963-08624be62b41\") " pod="kube-system/coredns-5d78c9869d-fhxmt" Oct 2 19:17:49.175730 kubelet[2831]: I1002 19:17:49.175713 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qfr49\" (UniqueName: \"kubernetes.io/projected/32a66284-edb9-4f52-84a1-ade5bfe7b780-kube-api-access-qfr49\") pod \"coredns-5d78c9869d-476mp\" (UID: \"32a66284-edb9-4f52-84a1-ade5bfe7b780\") " pod="kube-system/coredns-5d78c9869d-476mp" Oct 2 19:17:49.188203 systemd[1]: Created slice kubepods-besteffort-podddf8d927_2e24_4d63_8790_6f900827a156.slice. Oct 2 19:17:49.276188 kubelet[2831]: I1002 19:17:49.276146 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ddf8d927-2e24-4d63-8790-6f900827a156-socket-dir\") pod \"csi-node-driver-swqx9\" (UID: \"ddf8d927-2e24-4d63-8790-6f900827a156\") " pod="calico-system/csi-node-driver-swqx9" Oct 2 19:17:49.283248 kubelet[2831]: I1002 19:17:49.276214 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xmv7q\" (UniqueName: \"kubernetes.io/projected/22669c5e-cfda-4de4-b127-3a16a77d35ba-kube-api-access-xmv7q\") pod \"calico-kube-controllers-7bd445fdb4-4gqzg\" (UID: \"22669c5e-cfda-4de4-b127-3a16a77d35ba\") " pod="calico-system/calico-kube-controllers-7bd445fdb4-4gqzg" Oct 2 19:17:49.283248 kubelet[2831]: I1002 19:17:49.276286 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m6vrn\" (UniqueName: \"kubernetes.io/projected/ddf8d927-2e24-4d63-8790-6f900827a156-kube-api-access-m6vrn\") pod \"csi-node-driver-swqx9\" (UID: \"ddf8d927-2e24-4d63-8790-6f900827a156\") " pod="calico-system/csi-node-driver-swqx9" Oct 2 19:17:49.283248 kubelet[2831]: I1002 19:17:49.276315 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ddf8d927-2e24-4d63-8790-6f900827a156-varrun\") pod \"csi-node-driver-swqx9\" (UID: \"ddf8d927-2e24-4d63-8790-6f900827a156\") " pod="calico-system/csi-node-driver-swqx9" Oct 2 19:17:49.283248 kubelet[2831]: I1002 19:17:49.276344 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/ddf8d927-2e24-4d63-8790-6f900827a156-etccalico\") pod \"csi-node-driver-swqx9\" (UID: \"ddf8d927-2e24-4d63-8790-6f900827a156\") " pod="calico-system/csi-node-driver-swqx9" Oct 2 19:17:49.283248 kubelet[2831]: I1002 19:17:49.276397 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ddf8d927-2e24-4d63-8790-6f900827a156-kubelet-dir\") pod \"csi-node-driver-swqx9\" (UID: \"ddf8d927-2e24-4d63-8790-6f900827a156\") " pod="calico-system/csi-node-driver-swqx9" Oct 2 19:17:49.285122 kubelet[2831]: I1002 19:17:49.276985 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ddf8d927-2e24-4d63-8790-6f900827a156-registration-dir\") pod \"csi-node-driver-swqx9\" (UID: \"ddf8d927-2e24-4d63-8790-6f900827a156\") " pod="calico-system/csi-node-driver-swqx9" Oct 2 19:17:49.294257 env[1632]: time="2023-10-02T19:17:49.294198004Z" level=info msg="shim disconnected" id=6adf7d0a17296dc830a8b35b63bc5c4a9a399246a3ed91d5952d5668af62c3ea Oct 2 19:17:49.294442 env[1632]: time="2023-10-02T19:17:49.294263518Z" level=warning msg="cleaning up after shim disconnected" id=6adf7d0a17296dc830a8b35b63bc5c4a9a399246a3ed91d5952d5668af62c3ea namespace=k8s.io Oct 2 19:17:49.294442 env[1632]: time="2023-10-02T19:17:49.294276684Z" level=info msg="cleaning up dead shim" Oct 2 19:17:49.321676 env[1632]: time="2023-10-02T19:17:49.321621606Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:17:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3500 runtime=io.containerd.runc.v2\n" Oct 2 19:17:49.407763 env[1632]: time="2023-10-02T19:17:49.407147532Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-476mp,Uid:32a66284-edb9-4f52-84a1-ade5bfe7b780,Namespace:kube-system,Attempt:0,}" Oct 2 19:17:49.410262 env[1632]: time="2023-10-02T19:17:49.410220888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-fhxmt,Uid:a8a33ebd-4c7f-4b5f-b963-08624be62b41,Namespace:kube-system,Attempt:0,}" Oct 2 19:17:49.419211 env[1632]: time="2023-10-02T19:17:49.415559294Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:17:49.445315 env[1632]: time="2023-10-02T19:17:49.445198091Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-4gqzg,Uid:22669c5e-cfda-4de4-b127-3a16a77d35ba,Namespace:calico-system,Attempt:0,}" Oct 2 19:17:49.500288 env[1632]: time="2023-10-02T19:17:49.500246091Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-swqx9,Uid:ddf8d927-2e24-4d63-8790-6f900827a156,Namespace:calico-system,Attempt:0,}" Oct 2 19:17:49.660482 env[1632]: time="2023-10-02T19:17:49.660399923Z" level=error msg="Failed to destroy network for sandbox \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.660981 env[1632]: time="2023-10-02T19:17:49.660900032Z" level=error msg="encountered an error cleaning up failed sandbox \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.661086 env[1632]: time="2023-10-02T19:17:49.660971261Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-fhxmt,Uid:a8a33ebd-4c7f-4b5f-b963-08624be62b41,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.661795 kubelet[2831]: E1002 19:17:49.661310 2831 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.661795 kubelet[2831]: E1002 19:17:49.661375 2831 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-fhxmt" Oct 2 19:17:49.661795 kubelet[2831]: E1002 19:17:49.661416 2831 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-fhxmt" Oct 2 19:17:49.662126 kubelet[2831]: E1002 19:17:49.661481 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-fhxmt_kube-system(a8a33ebd-4c7f-4b5f-b963-08624be62b41)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-fhxmt_kube-system(a8a33ebd-4c7f-4b5f-b963-08624be62b41)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-fhxmt" podUID=a8a33ebd-4c7f-4b5f-b963-08624be62b41 Oct 2 19:17:49.691154 env[1632]: time="2023-10-02T19:17:49.691028875Z" level=error msg="Failed to destroy network for sandbox \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.692344 env[1632]: time="2023-10-02T19:17:49.692289187Z" level=error msg="encountered an error cleaning up failed sandbox \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.692477 env[1632]: time="2023-10-02T19:17:49.692376857Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-476mp,Uid:32a66284-edb9-4f52-84a1-ade5bfe7b780,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.692741 kubelet[2831]: E1002 19:17:49.692714 2831 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.692959 kubelet[2831]: E1002 19:17:49.692911 2831 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-476mp" Oct 2 19:17:49.693020 kubelet[2831]: E1002 19:17:49.692960 2831 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-476mp" Oct 2 19:17:49.693076 kubelet[2831]: E1002 19:17:49.693049 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-476mp_kube-system(32a66284-edb9-4f52-84a1-ade5bfe7b780)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-476mp_kube-system(32a66284-edb9-4f52-84a1-ade5bfe7b780)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-476mp" podUID=32a66284-edb9-4f52-84a1-ade5bfe7b780 Oct 2 19:17:49.745243 env[1632]: time="2023-10-02T19:17:49.745182642Z" level=error msg="Failed to destroy network for sandbox \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.745639 env[1632]: time="2023-10-02T19:17:49.745593449Z" level=error msg="encountered an error cleaning up failed sandbox \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.745743 env[1632]: time="2023-10-02T19:17:49.745663174Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-4gqzg,Uid:22669c5e-cfda-4de4-b127-3a16a77d35ba,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.746005 kubelet[2831]: E1002 19:17:49.745984 2831 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.746158 kubelet[2831]: E1002 19:17:49.746054 2831 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-4gqzg" Oct 2 19:17:49.746158 kubelet[2831]: E1002 19:17:49.746090 2831 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-4gqzg" Oct 2 19:17:49.746256 kubelet[2831]: E1002 19:17:49.746172 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7bd445fdb4-4gqzg_calico-system(22669c5e-cfda-4de4-b127-3a16a77d35ba)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7bd445fdb4-4gqzg_calico-system(22669c5e-cfda-4de4-b127-3a16a77d35ba)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-4gqzg" podUID=22669c5e-cfda-4de4-b127-3a16a77d35ba Oct 2 19:17:49.758241 env[1632]: time="2023-10-02T19:17:49.758143286Z" level=error msg="Failed to destroy network for sandbox \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.758717 env[1632]: time="2023-10-02T19:17:49.758671837Z" level=error msg="encountered an error cleaning up failed sandbox \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.758824 env[1632]: time="2023-10-02T19:17:49.758737456Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-swqx9,Uid:ddf8d927-2e24-4d63-8790-6f900827a156,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.759097 kubelet[2831]: E1002 19:17:49.759076 2831 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:49.759197 kubelet[2831]: E1002 19:17:49.759132 2831 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-swqx9" Oct 2 19:17:49.759197 kubelet[2831]: E1002 19:17:49.759170 2831 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-swqx9" Oct 2 19:17:49.759290 kubelet[2831]: E1002 19:17:49.759236 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-swqx9_calico-system(ddf8d927-2e24-4d63-8790-6f900827a156)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-swqx9_calico-system(ddf8d927-2e24-4d63-8790-6f900827a156)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-swqx9" podUID=ddf8d927-2e24-4d63-8790-6f900827a156 Oct 2 19:17:50.418597 kubelet[2831]: I1002 19:17:50.418523 2831 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Oct 2 19:17:50.421826 env[1632]: time="2023-10-02T19:17:50.419951263Z" level=info msg="StopPodSandbox for \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\"" Oct 2 19:17:50.425185 kubelet[2831]: I1002 19:17:50.424267 2831 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Oct 2 19:17:50.425589 env[1632]: time="2023-10-02T19:17:50.425551931Z" level=info msg="StopPodSandbox for \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\"" Oct 2 19:17:50.430026 kubelet[2831]: I1002 19:17:50.430002 2831 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Oct 2 19:17:50.432428 env[1632]: time="2023-10-02T19:17:50.432369475Z" level=info msg="StopPodSandbox for \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\"" Oct 2 19:17:50.433579 kubelet[2831]: I1002 19:17:50.433184 2831 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Oct 2 19:17:50.433890 env[1632]: time="2023-10-02T19:17:50.433829780Z" level=info msg="StopPodSandbox for \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\"" Oct 2 19:17:50.541135 env[1632]: time="2023-10-02T19:17:50.541066724Z" level=error msg="StopPodSandbox for \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\" failed" error="failed to destroy network for sandbox \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:50.541812 kubelet[2831]: E1002 19:17:50.541783 2831 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Oct 2 19:17:50.541955 kubelet[2831]: E1002 19:17:50.541869 2831 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac} Oct 2 19:17:50.542012 kubelet[2831]: E1002 19:17:50.541917 2831 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"22669c5e-cfda-4de4-b127-3a16a77d35ba\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:17:50.542183 kubelet[2831]: E1002 19:17:50.542025 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"22669c5e-cfda-4de4-b127-3a16a77d35ba\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-4gqzg" podUID=22669c5e-cfda-4de4-b127-3a16a77d35ba Oct 2 19:17:50.565410 env[1632]: time="2023-10-02T19:17:50.565345403Z" level=error msg="StopPodSandbox for \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\" failed" error="failed to destroy network for sandbox \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:50.566066 kubelet[2831]: E1002 19:17:50.566040 2831 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Oct 2 19:17:50.566468 kubelet[2831]: E1002 19:17:50.566357 2831 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1} Oct 2 19:17:50.566569 kubelet[2831]: E1002 19:17:50.566479 2831 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a8a33ebd-4c7f-4b5f-b963-08624be62b41\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:17:50.566569 kubelet[2831]: E1002 19:17:50.566546 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a8a33ebd-4c7f-4b5f-b963-08624be62b41\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-fhxmt" podUID=a8a33ebd-4c7f-4b5f-b963-08624be62b41 Oct 2 19:17:50.571090 env[1632]: time="2023-10-02T19:17:50.571028618Z" level=error msg="StopPodSandbox for \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\" failed" error="failed to destroy network for sandbox \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:50.572207 kubelet[2831]: E1002 19:17:50.571935 2831 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Oct 2 19:17:50.572207 kubelet[2831]: E1002 19:17:50.571996 2831 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652} Oct 2 19:17:50.572207 kubelet[2831]: E1002 19:17:50.572042 2831 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ddf8d927-2e24-4d63-8790-6f900827a156\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:17:50.572207 kubelet[2831]: E1002 19:17:50.572091 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ddf8d927-2e24-4d63-8790-6f900827a156\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-swqx9" podUID=ddf8d927-2e24-4d63-8790-6f900827a156 Oct 2 19:17:50.573490 env[1632]: time="2023-10-02T19:17:50.573439283Z" level=error msg="StopPodSandbox for \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\" failed" error="failed to destroy network for sandbox \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:17:50.574398 kubelet[2831]: E1002 19:17:50.574322 2831 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Oct 2 19:17:50.574507 kubelet[2831]: E1002 19:17:50.574411 2831 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64} Oct 2 19:17:50.574507 kubelet[2831]: E1002 19:17:50.574460 2831 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"32a66284-edb9-4f52-84a1-ade5bfe7b780\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:17:50.574507 kubelet[2831]: E1002 19:17:50.574500 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"32a66284-edb9-4f52-84a1-ade5bfe7b780\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-476mp" podUID=32a66284-edb9-4f52-84a1-ade5bfe7b780 Oct 2 19:17:55.492979 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4259856565.mount: Deactivated successfully. Oct 2 19:17:55.572999 env[1632]: time="2023-10-02T19:17:55.572947787Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:55.575966 env[1632]: time="2023-10-02T19:17:55.575926779Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:55.577763 env[1632]: time="2023-10-02T19:17:55.577730273Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:55.579502 env[1632]: time="2023-10-02T19:17:55.579470674Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:17:55.579881 env[1632]: time="2023-10-02T19:17:55.579839535Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:17:55.584300 env[1632]: time="2023-10-02T19:17:55.584260363Z" level=info msg="CreateContainer within sandbox \"7edfbe534302e463e618845423dee5bbe89ac38c47a8afc388301bc8cf92dd69\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:17:55.599678 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2258790394.mount: Deactivated successfully. Oct 2 19:17:55.612650 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount608022361.mount: Deactivated successfully. Oct 2 19:17:55.619722 env[1632]: time="2023-10-02T19:17:55.619673273Z" level=info msg="CreateContainer within sandbox \"7edfbe534302e463e618845423dee5bbe89ac38c47a8afc388301bc8cf92dd69\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5cc8377b8aa0c7ff66809a361dda2d9ccd2b7434cbfeede3ddc5650c2a5acf23\"" Oct 2 19:17:55.623344 env[1632]: time="2023-10-02T19:17:55.623304570Z" level=info msg="StartContainer for \"5cc8377b8aa0c7ff66809a361dda2d9ccd2b7434cbfeede3ddc5650c2a5acf23\"" Oct 2 19:17:55.644488 systemd[1]: Started cri-containerd-5cc8377b8aa0c7ff66809a361dda2d9ccd2b7434cbfeede3ddc5650c2a5acf23.scope. Oct 2 19:17:55.692235 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:17:55.692495 kernel: audit: type=1400 audit(1696274275.678:1169): avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.692551 kernel: audit: type=1300 audit(1696274275.678:1169): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3245 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:55.678000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.678000 audit[3736]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3245 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:55.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633833373762386161306337666636363830396133363164646132 Oct 2 19:17:55.701207 kernel: audit: type=1327 audit(1696274275.678:1169): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633833373762386161306337666636363830396133363164646132 Oct 2 19:17:55.701327 kernel: audit: type=1400 audit(1696274275.678:1170): avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.678000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.678000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.712204 kernel: audit: type=1400 audit(1696274275.678:1170): avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.678000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.721939 kernel: audit: type=1400 audit(1696274275.678:1170): avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.722062 kernel: audit: type=1400 audit(1696274275.678:1170): avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.678000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.678000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.731878 kernel: audit: type=1400 audit(1696274275.678:1170): avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.678000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.743081 kernel: audit: type=1400 audit(1696274275.678:1170): avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.743356 kernel: audit: type=1400 audit(1696274275.678:1170): avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.678000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.678000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.678000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.678000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.678000 audit: BPF prog-id=145 op=LOAD Oct 2 19:17:55.678000 audit[3736]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003cc0e0 items=0 ppid=3245 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:55.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633833373762386161306337666636363830396133363164646132 Oct 2 19:17:55.691000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.691000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.691000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.691000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.691000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.691000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.691000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.691000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.691000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.691000 audit: BPF prog-id=146 op=LOAD Oct 2 19:17:55.691000 audit[3736]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003cc128 items=0 ppid=3245 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:55.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633833373762386161306337666636363830396133363164646132 Oct 2 19:17:55.692000 audit: BPF prog-id=146 op=UNLOAD Oct 2 19:17:55.692000 audit: BPF prog-id=145 op=UNLOAD Oct 2 19:17:55.692000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.692000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.692000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.692000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.692000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.692000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.692000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.692000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.692000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.692000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:55.692000 audit: BPF prog-id=147 op=LOAD Oct 2 19:17:55.692000 audit[3736]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003cc1b8 items=0 ppid=3245 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:55.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633833373762386161306337666636363830396133363164646132 Oct 2 19:17:55.746248 env[1632]: time="2023-10-02T19:17:55.746073135Z" level=info msg="StartContainer for \"5cc8377b8aa0c7ff66809a361dda2d9ccd2b7434cbfeede3ddc5650c2a5acf23\" returns successfully" Oct 2 19:17:55.846282 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:17:55.846432 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:17:57.655000 audit[3877]: AVC avc: denied { write } for pid=3877 comm="tee" name="fd" dev="proc" ino=25052 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:17:57.655000 audit[3877]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd80b13972 a2=241 a3=1b6 items=1 ppid=3848 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:57.655000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:17:57.655000 audit: PATH item=0 name="/dev/fd/63" inode=24523 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:17:57.655000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:17:57.656000 audit[3879]: AVC avc: denied { write } for pid=3879 comm="tee" name="fd" dev="proc" ino=25056 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:17:57.656000 audit[3879]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd32f23983 a2=241 a3=1b6 items=1 ppid=3844 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:57.656000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:17:57.656000 audit: PATH item=0 name="/dev/fd/63" inode=24526 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:17:57.656000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:17:57.669000 audit[3881]: AVC avc: denied { write } for pid=3881 comm="tee" name="fd" dev="proc" ino=25066 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:17:57.669000 audit[3881]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea1f93981 a2=241 a3=1b6 items=1 ppid=3849 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:57.669000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:17:57.669000 audit: PATH item=0 name="/dev/fd/63" inode=25049 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:17:57.669000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:17:57.680000 audit[3891]: AVC avc: denied { write } for pid=3891 comm="tee" name="fd" dev="proc" ino=24548 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:17:57.683000 audit[3896]: AVC avc: denied { write } for pid=3896 comm="tee" name="fd" dev="proc" ino=24551 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:17:57.686000 audit[3902]: AVC avc: denied { write } for pid=3902 comm="tee" name="fd" dev="proc" ino=24554 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:17:57.680000 audit[3891]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd8098981 a2=241 a3=1b6 items=1 ppid=3846 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:57.680000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:17:57.680000 audit: PATH item=0 name="/dev/fd/63" inode=24536 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:17:57.680000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:17:57.695000 audit[3899]: AVC avc: denied { write } for pid=3899 comm="tee" name="fd" dev="proc" ino=24558 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:17:57.683000 audit[3896]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2176d981 a2=241 a3=1b6 items=1 ppid=3855 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:57.683000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:17:57.683000 audit: PATH item=0 name="/dev/fd/63" inode=25060 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:17:57.683000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:17:57.695000 audit[3899]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffec739982 a2=241 a3=1b6 items=1 ppid=3850 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:57.695000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:17:57.695000 audit: PATH item=0 name="/dev/fd/63" inode=24539 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:17:57.695000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:17:57.686000 audit[3902]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc00901971 a2=241 a3=1b6 items=1 ppid=3858 pid=3902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:57.686000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:17:57.686000 audit: PATH item=0 name="/dev/fd/63" inode=24542 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:17:57.686000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:17:58.389900 (udev-worker)[3769]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:17:58.391181 (udev-worker)[3985]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit: BPF prog-id=148 op=LOAD Oct 2 19:17:58.397000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc30515b10 a2=70 a3=7ff8e32bb000 items=0 ppid=3847 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:58.397000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:58.397000 audit: BPF prog-id=148 op=UNLOAD Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit: BPF prog-id=149 op=LOAD Oct 2 19:17:58.397000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc30515b10 a2=70 a3=6e items=0 ppid=3847 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:58.397000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:58.397000 audit: BPF prog-id=149 op=UNLOAD Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc30515ac0 a2=70 a3=7ffc30515b10 items=0 ppid=3847 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:58.397000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit: BPF prog-id=150 op=LOAD Oct 2 19:17:58.397000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc30515aa0 a2=70 a3=7ffc30515b10 items=0 ppid=3847 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:58.397000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:58.397000 audit: BPF prog-id=150 op=UNLOAD Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc30515b80 a2=70 a3=0 items=0 ppid=3847 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:58.397000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc30515b70 a2=70 a3=0 items=0 ppid=3847 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:58.397000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:58.397000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.397000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc30515bb0 a2=70 a3=0 items=0 ppid=3847 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:58.397000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:58.399000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.399000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.399000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.399000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.399000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.399000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.399000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.399000 audit[3988]: AVC avc: denied { perfmon } for pid=3988 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.399000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.399000 audit[3988]: AVC avc: denied { bpf } for pid=3988 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.399000 audit: BPF prog-id=151 op=LOAD Oct 2 19:17:58.399000 audit[3988]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc30515ad0 a2=70 a3=ffffffff items=0 ppid=3847 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:58.399000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:17:58.404000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.404000 audit[3990]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda7e909b0 a2=70 a3=fff80800 items=0 ppid=3847 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:58.404000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:17:58.404000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:17:58.404000 audit[3990]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffda7e90880 a2=70 a3=3 items=0 ppid=3847 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:58.404000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:17:58.414000 audit: BPF prog-id=151 op=UNLOAD Oct 2 19:17:58.495245 systemd[1]: run-containerd-runc-k8s.io-5cc8377b8aa0c7ff66809a361dda2d9ccd2b7434cbfeede3ddc5650c2a5acf23-runc.kqVxuY.mount: Deactivated successfully. Oct 2 19:17:58.582000 audit[4030]: NETFILTER_CFG table=raw:97 family=2 entries=19 op=nft_register_chain pid=4030 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:17:58.582000 audit[4030]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffcf8bfdca0 a2=0 a3=7ffcf8bfdc8c items=0 ppid=3847 pid=4030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:58.582000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:17:58.599000 audit[4036]: NETFILTER_CFG table=mangle:98 family=2 entries=19 op=nft_register_chain pid=4036 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:17:58.599000 audit[4036]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff35fffd10 a2=0 a3=7fff35fffcfc items=0 ppid=3847 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:58.599000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:17:58.609000 audit[4037]: NETFILTER_CFG table=nat:99 family=2 entries=16 op=nft_register_chain pid=4037 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:17:58.609000 audit[4037]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffdffdced80 a2=0 a3=7ffdffdced6c items=0 ppid=3847 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:58.609000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:17:58.619000 audit[4038]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4038 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:17:58.619000 audit[4038]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffe234c7190 a2=0 a3=7ffe234c717c items=0 ppid=3847 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:17:58.619000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:17:59.223480 (udev-worker)[3996]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:17:59.227557 systemd-networkd[1446]: vxlan.calico: Link UP Oct 2 19:17:59.227567 systemd-networkd[1446]: vxlan.calico: Gained carrier Oct 2 19:18:00.808040 systemd-networkd[1446]: vxlan.calico: Gained IPv6LL Oct 2 19:18:03.217627 env[1632]: time="2023-10-02T19:18:03.217574914Z" level=info msg="StopPodSandbox for \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\"" Oct 2 19:18:03.384568 kubelet[2831]: I1002 19:18:03.384479 2831 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-gcrn5" podStartSLOduration=9.153091173 podCreationTimestamp="2023-10-02 19:17:35 +0000 UTC" firstStartedPulling="2023-10-02 19:17:36.353329388 +0000 UTC m=+20.391650774" lastFinishedPulling="2023-10-02 19:17:55.580252506 +0000 UTC m=+39.618573885" observedRunningTime="2023-10-02 19:17:56.547888829 +0000 UTC m=+40.586210217" watchObservedRunningTime="2023-10-02 19:18:03.380014284 +0000 UTC m=+47.418335677" Oct 2 19:18:03.572777 env[1632]: 2023-10-02 19:18:03.380 [INFO][4089] k8s.go 576: Cleaning up netns ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Oct 2 19:18:03.572777 env[1632]: 2023-10-02 19:18:03.381 [INFO][4089] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" iface="eth0" netns="/var/run/netns/cni-665062f6-364c-0c02-4bb9-255b7484698f" Oct 2 19:18:03.572777 env[1632]: 2023-10-02 19:18:03.381 [INFO][4089] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" iface="eth0" netns="/var/run/netns/cni-665062f6-364c-0c02-4bb9-255b7484698f" Oct 2 19:18:03.572777 env[1632]: 2023-10-02 19:18:03.382 [INFO][4089] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" iface="eth0" netns="/var/run/netns/cni-665062f6-364c-0c02-4bb9-255b7484698f" Oct 2 19:18:03.572777 env[1632]: 2023-10-02 19:18:03.383 [INFO][4089] k8s.go 583: Releasing IP address(es) ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Oct 2 19:18:03.572777 env[1632]: 2023-10-02 19:18:03.383 [INFO][4089] utils.go 196: Calico CNI releasing IP address ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Oct 2 19:18:03.572777 env[1632]: 2023-10-02 19:18:03.546 [INFO][4095] ipam_plugin.go 416: Releasing address using handleID ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" HandleID="k8s-pod-network.6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Workload="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:03.572777 env[1632]: time="2023-10-02T19:18:03Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:03.572777 env[1632]: time="2023-10-02T19:18:03Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:03.572777 env[1632]: 2023-10-02 19:18:03.564 [WARNING][4095] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" HandleID="k8s-pod-network.6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Workload="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:03.572777 env[1632]: 2023-10-02 19:18:03.564 [INFO][4095] ipam_plugin.go 444: Releasing address using workloadID ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" HandleID="k8s-pod-network.6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Workload="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:03.572777 env[1632]: time="2023-10-02T19:18:03Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:03.572777 env[1632]: 2023-10-02 19:18:03.569 [INFO][4089] k8s.go 589: Teardown processing complete. ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Oct 2 19:18:03.584907 env[1632]: time="2023-10-02T19:18:03.578660514Z" level=info msg="TearDown network for sandbox \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\" successfully" Oct 2 19:18:03.584907 env[1632]: time="2023-10-02T19:18:03.578757400Z" level=info msg="StopPodSandbox for \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\" returns successfully" Oct 2 19:18:03.584656 systemd[1]: run-netns-cni\x2d665062f6\x2d364c\x2d0c02\x2d4bb9\x2d255b7484698f.mount: Deactivated successfully. Oct 2 19:18:03.586883 env[1632]: time="2023-10-02T19:18:03.586818294Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-4gqzg,Uid:22669c5e-cfda-4de4-b127-3a16a77d35ba,Namespace:calico-system,Attempt:1,}" Oct 2 19:18:03.836693 systemd-networkd[1446]: calieaecfddfdef: Link UP Oct 2 19:18:03.843922 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieaecfddfdef: link becomes ready Oct 2 19:18:03.844058 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:18:03.843158 systemd-networkd[1446]: calieaecfddfdef: Gained carrier Oct 2 19:18:03.844802 (udev-worker)[4119]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.677 [INFO][4101] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0 calico-kube-controllers-7bd445fdb4- calico-system 22669c5e-cfda-4de4-b127-3a16a77d35ba 697 0 2023-10-02 19:17:35 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7bd445fdb4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-27-212 calico-kube-controllers-7bd445fdb4-4gqzg eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calieaecfddfdef [] []}} ContainerID="2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-4gqzg" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-" Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.678 [INFO][4101] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-4gqzg" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.721 [INFO][4113] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" HandleID="k8s-pod-network.2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" Workload="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.742 [INFO][4113] ipam_plugin.go 269: Auto assigning IP ContainerID="2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" HandleID="k8s-pod-network.2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" Workload="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000101120), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-27-212", "pod":"calico-kube-controllers-7bd445fdb4-4gqzg", "timestamp":"2023-10-02 19:18:03.721479116 +0000 UTC"}, Hostname:"ip-172-31-27-212", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:18:03.861647 env[1632]: time="2023-10-02T19:18:03Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:03.861647 env[1632]: time="2023-10-02T19:18:03Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.742 [INFO][4113] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-212' Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.747 [INFO][4113] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" host="ip-172-31-27-212" Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.787 [INFO][4113] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-212" Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.795 [INFO][4113] ipam.go 489: Trying affinity for 192.168.0.192/26 host="ip-172-31-27-212" Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.801 [INFO][4113] ipam.go 155: Attempting to load block cidr=192.168.0.192/26 host="ip-172-31-27-212" Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.807 [INFO][4113] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.0.192/26 host="ip-172-31-27-212" Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.807 [INFO][4113] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.0.192/26 handle="k8s-pod-network.2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" host="ip-172-31-27-212" Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.809 [INFO][4113] ipam.go 1682: Creating new handle: k8s-pod-network.2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5 Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.814 [INFO][4113] ipam.go 1203: Writing block in order to claim IPs block=192.168.0.192/26 handle="k8s-pod-network.2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" host="ip-172-31-27-212" Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.821 [INFO][4113] ipam.go 1216: Successfully claimed IPs: [192.168.0.193/26] block=192.168.0.192/26 handle="k8s-pod-network.2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" host="ip-172-31-27-212" Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.821 [INFO][4113] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.0.193/26] handle="k8s-pod-network.2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" host="ip-172-31-27-212" Oct 2 19:18:03.861647 env[1632]: time="2023-10-02T19:18:03Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:03.861647 env[1632]: 2023-10-02 19:18:03.822 [INFO][4113] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.0.193/26] IPv6=[] ContainerID="2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" HandleID="k8s-pod-network.2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" Workload="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:03.865411 env[1632]: 2023-10-02 19:18:03.825 [INFO][4101] k8s.go 383: Populated endpoint ContainerID="2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-4gqzg" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"22669c5e-cfda-4de4-b127-3a16a77d35ba", ResourceVersion:"697", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"", Pod:"calico-kube-controllers-7bd445fdb4-4gqzg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.0.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calieaecfddfdef", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:03.865411 env[1632]: 2023-10-02 19:18:03.826 [INFO][4101] k8s.go 384: Calico CNI using IPs: [192.168.0.193/32] ContainerID="2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-4gqzg" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:03.865411 env[1632]: 2023-10-02 19:18:03.826 [INFO][4101] dataplane_linux.go 68: Setting the host side veth name to calieaecfddfdef ContainerID="2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-4gqzg" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:03.865411 env[1632]: 2023-10-02 19:18:03.828 [INFO][4101] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-4gqzg" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:03.865411 env[1632]: 2023-10-02 19:18:03.842 [INFO][4101] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-4gqzg" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"22669c5e-cfda-4de4-b127-3a16a77d35ba", ResourceVersion:"697", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5", Pod:"calico-kube-controllers-7bd445fdb4-4gqzg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.0.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calieaecfddfdef", MAC:"6e:c9:ed:81:3d:be", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:03.865411 env[1632]: 2023-10-02 19:18:03.855 [INFO][4101] k8s.go 489: Wrote updated endpoint to datastore ContainerID="2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-4gqzg" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:03.920663 env[1632]: time="2023-10-02T19:18:03.920513986Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:18:03.920663 env[1632]: time="2023-10-02T19:18:03.920602573Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:18:03.921554 env[1632]: time="2023-10-02T19:18:03.921485029Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:18:03.921965 env[1632]: time="2023-10-02T19:18:03.921907406Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5 pid=4139 runtime=io.containerd.runc.v2 Oct 2 19:18:03.967008 systemd[1]: Started cri-containerd-2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5.scope. Oct 2 19:18:03.995355 kernel: kauditd_printk_skb: 151 callbacks suppressed Oct 2 19:18:03.995481 kernel: audit: type=1325 audit(1696274283.987:1200): table=filter:101 family=2 entries=36 op=nft_register_chain pid=4169 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:18:03.987000 audit[4169]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=4169 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:18:03.987000 audit[4169]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd3bb9c0a0 a2=0 a3=7ffd3bb9c08c items=0 ppid=3847 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:04.007354 kernel: audit: type=1300 audit(1696274283.987:1200): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd3bb9c0a0 a2=0 a3=7ffd3bb9c08c items=0 ppid=3847 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:04.007495 kernel: audit: type=1327 audit(1696274283.987:1200): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:18:03.987000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:18:04.012207 kernel: audit: type=1400 audit(1696274283.994:1201): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:03.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:03.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:03.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.033417 kernel: audit: type=1400 audit(1696274283.994:1202): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.033537 kernel: audit: type=1400 audit(1696274283.994:1203): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.033624 kernel: audit: type=1400 audit(1696274283.994:1204): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:03.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:03.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.042731 kernel: audit: type=1400 audit(1696274283.994:1205): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:03.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:03.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.053123 kernel: audit: type=1400 audit(1696274283.994:1206): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.053291 kernel: audit: type=1400 audit(1696274283.994:1207): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:03.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:03.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.002000 audit: BPF prog-id=152 op=LOAD Oct 2 19:18:04.002000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.002000 audit[4150]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4139 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:04.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262623563626235366135333732356331633035383938313732656236 Oct 2 19:18:04.002000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.002000 audit[4150]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4139 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:04.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262623563626235366135333732356331633035383938313732656236 Oct 2 19:18:04.002000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.002000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.002000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.002000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.002000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.002000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.002000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.002000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.002000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.002000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.002000 audit: BPF prog-id=153 op=LOAD Oct 2 19:18:04.002000 audit[4150]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003cee70 items=0 ppid=4139 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:04.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262623563626235366135333732356331633035383938313732656236 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit: BPF prog-id=154 op=LOAD Oct 2 19:18:04.011000 audit[4150]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ceeb8 items=0 ppid=4139 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:04.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262623563626235366135333732356331633035383938313732656236 Oct 2 19:18:04.011000 audit: BPF prog-id=154 op=UNLOAD Oct 2 19:18:04.011000 audit: BPF prog-id=153 op=UNLOAD Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:04.011000 audit: BPF prog-id=155 op=LOAD Oct 2 19:18:04.011000 audit[4150]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003cf2c8 items=0 ppid=4139 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:04.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262623563626235366135333732356331633035383938313732656236 Oct 2 19:18:04.100614 env[1632]: time="2023-10-02T19:18:04.100513650Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-4gqzg,Uid:22669c5e-cfda-4de4-b127-3a16a77d35ba,Namespace:calico-system,Attempt:1,} returns sandbox id \"2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5\"" Oct 2 19:18:04.104509 env[1632]: time="2023-10-02T19:18:04.104387344Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:18:05.220876 env[1632]: time="2023-10-02T19:18:05.220807236Z" level=info msg="StopPodSandbox for \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\"" Oct 2 19:18:05.221452 env[1632]: time="2023-10-02T19:18:05.221416879Z" level=info msg="StopPodSandbox for \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\"" Oct 2 19:18:05.221896 env[1632]: time="2023-10-02T19:18:05.221852350Z" level=info msg="StopPodSandbox for \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\"" Oct 2 19:18:05.224158 systemd-networkd[1446]: calieaecfddfdef: Gained IPv6LL Oct 2 19:18:05.652547 env[1632]: 2023-10-02 19:18:05.478 [INFO][4210] k8s.go 576: Cleaning up netns ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Oct 2 19:18:05.652547 env[1632]: 2023-10-02 19:18:05.478 [INFO][4210] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" iface="eth0" netns="/var/run/netns/cni-e3740d3a-9463-9bad-6280-4f17352bdfc3" Oct 2 19:18:05.652547 env[1632]: 2023-10-02 19:18:05.478 [INFO][4210] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" iface="eth0" netns="/var/run/netns/cni-e3740d3a-9463-9bad-6280-4f17352bdfc3" Oct 2 19:18:05.652547 env[1632]: 2023-10-02 19:18:05.479 [INFO][4210] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" iface="eth0" netns="/var/run/netns/cni-e3740d3a-9463-9bad-6280-4f17352bdfc3" Oct 2 19:18:05.652547 env[1632]: 2023-10-02 19:18:05.480 [INFO][4210] k8s.go 583: Releasing IP address(es) ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Oct 2 19:18:05.652547 env[1632]: 2023-10-02 19:18:05.480 [INFO][4210] utils.go 196: Calico CNI releasing IP address ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Oct 2 19:18:05.652547 env[1632]: 2023-10-02 19:18:05.603 [INFO][4241] ipam_plugin.go 416: Releasing address using handleID ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" HandleID="k8s-pod-network.49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:05.652547 env[1632]: time="2023-10-02T19:18:05Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:05.652547 env[1632]: time="2023-10-02T19:18:05Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:05.652547 env[1632]: 2023-10-02 19:18:05.632 [WARNING][4241] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" HandleID="k8s-pod-network.49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:05.652547 env[1632]: 2023-10-02 19:18:05.632 [INFO][4241] ipam_plugin.go 444: Releasing address using workloadID ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" HandleID="k8s-pod-network.49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:05.652547 env[1632]: time="2023-10-02T19:18:05Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:05.652547 env[1632]: 2023-10-02 19:18:05.640 [INFO][4210] k8s.go 589: Teardown processing complete. ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Oct 2 19:18:05.661299 env[1632]: time="2023-10-02T19:18:05.652834282Z" level=info msg="TearDown network for sandbox \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\" successfully" Oct 2 19:18:05.661299 env[1632]: time="2023-10-02T19:18:05.652897833Z" level=info msg="StopPodSandbox for \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\" returns successfully" Oct 2 19:18:05.661299 env[1632]: time="2023-10-02T19:18:05.654034998Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-476mp,Uid:32a66284-edb9-4f52-84a1-ade5bfe7b780,Namespace:kube-system,Attempt:1,}" Oct 2 19:18:05.658956 systemd[1]: run-netns-cni\x2de3740d3a\x2d9463\x2d9bad\x2d6280\x2d4f17352bdfc3.mount: Deactivated successfully. Oct 2 19:18:05.748560 env[1632]: 2023-10-02 19:18:05.495 [INFO][4215] k8s.go 576: Cleaning up netns ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Oct 2 19:18:05.748560 env[1632]: 2023-10-02 19:18:05.495 [INFO][4215] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" iface="eth0" netns="/var/run/netns/cni-58c5a23c-dbcf-5e7b-1461-36425a66046e" Oct 2 19:18:05.748560 env[1632]: 2023-10-02 19:18:05.496 [INFO][4215] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" iface="eth0" netns="/var/run/netns/cni-58c5a23c-dbcf-5e7b-1461-36425a66046e" Oct 2 19:18:05.748560 env[1632]: 2023-10-02 19:18:05.497 [INFO][4215] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" iface="eth0" netns="/var/run/netns/cni-58c5a23c-dbcf-5e7b-1461-36425a66046e" Oct 2 19:18:05.748560 env[1632]: 2023-10-02 19:18:05.497 [INFO][4215] k8s.go 583: Releasing IP address(es) ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Oct 2 19:18:05.748560 env[1632]: 2023-10-02 19:18:05.497 [INFO][4215] utils.go 196: Calico CNI releasing IP address ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Oct 2 19:18:05.748560 env[1632]: 2023-10-02 19:18:05.689 [INFO][4242] ipam_plugin.go 416: Releasing address using handleID ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" HandleID="k8s-pod-network.62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Workload="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:05.748560 env[1632]: time="2023-10-02T19:18:05Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:05.748560 env[1632]: time="2023-10-02T19:18:05Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:05.748560 env[1632]: 2023-10-02 19:18:05.730 [WARNING][4242] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" HandleID="k8s-pod-network.62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Workload="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:05.748560 env[1632]: 2023-10-02 19:18:05.730 [INFO][4242] ipam_plugin.go 444: Releasing address using workloadID ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" HandleID="k8s-pod-network.62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Workload="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:05.748560 env[1632]: time="2023-10-02T19:18:05Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:05.748560 env[1632]: 2023-10-02 19:18:05.735 [INFO][4215] k8s.go 589: Teardown processing complete. ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Oct 2 19:18:05.752221 systemd[1]: run-netns-cni\x2d58c5a23c\x2ddbcf\x2d5e7b\x2d1461\x2d36425a66046e.mount: Deactivated successfully. Oct 2 19:18:05.753757 env[1632]: time="2023-10-02T19:18:05.753710134Z" level=info msg="TearDown network for sandbox \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\" successfully" Oct 2 19:18:05.754285 env[1632]: time="2023-10-02T19:18:05.754254665Z" level=info msg="StopPodSandbox for \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\" returns successfully" Oct 2 19:18:05.777089 env[1632]: time="2023-10-02T19:18:05.776820372Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-swqx9,Uid:ddf8d927-2e24-4d63-8790-6f900827a156,Namespace:calico-system,Attempt:1,}" Oct 2 19:18:05.796308 env[1632]: 2023-10-02 19:18:05.583 [INFO][4234] k8s.go 576: Cleaning up netns ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Oct 2 19:18:05.796308 env[1632]: 2023-10-02 19:18:05.583 [INFO][4234] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" iface="eth0" netns="/var/run/netns/cni-754d4115-e9f9-27df-34da-68949e358b03" Oct 2 19:18:05.796308 env[1632]: 2023-10-02 19:18:05.583 [INFO][4234] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" iface="eth0" netns="/var/run/netns/cni-754d4115-e9f9-27df-34da-68949e358b03" Oct 2 19:18:05.796308 env[1632]: 2023-10-02 19:18:05.586 [INFO][4234] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" iface="eth0" netns="/var/run/netns/cni-754d4115-e9f9-27df-34da-68949e358b03" Oct 2 19:18:05.796308 env[1632]: 2023-10-02 19:18:05.586 [INFO][4234] k8s.go 583: Releasing IP address(es) ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Oct 2 19:18:05.796308 env[1632]: 2023-10-02 19:18:05.586 [INFO][4234] utils.go 196: Calico CNI releasing IP address ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Oct 2 19:18:05.796308 env[1632]: 2023-10-02 19:18:05.757 [INFO][4253] ipam_plugin.go 416: Releasing address using handleID ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" HandleID="k8s-pod-network.241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:05.796308 env[1632]: time="2023-10-02T19:18:05Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:05.796308 env[1632]: time="2023-10-02T19:18:05Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:05.796308 env[1632]: 2023-10-02 19:18:05.778 [WARNING][4253] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" HandleID="k8s-pod-network.241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:05.796308 env[1632]: 2023-10-02 19:18:05.778 [INFO][4253] ipam_plugin.go 444: Releasing address using workloadID ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" HandleID="k8s-pod-network.241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:05.796308 env[1632]: time="2023-10-02T19:18:05Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:05.796308 env[1632]: 2023-10-02 19:18:05.784 [INFO][4234] k8s.go 589: Teardown processing complete. ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Oct 2 19:18:05.804340 env[1632]: time="2023-10-02T19:18:05.804069117Z" level=info msg="TearDown network for sandbox \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\" successfully" Oct 2 19:18:05.804340 env[1632]: time="2023-10-02T19:18:05.804335435Z" level=info msg="StopPodSandbox for \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\" returns successfully" Oct 2 19:18:05.805368 env[1632]: time="2023-10-02T19:18:05.805334577Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-fhxmt,Uid:a8a33ebd-4c7f-4b5f-b963-08624be62b41,Namespace:kube-system,Attempt:1,}" Oct 2 19:18:06.159295 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:18:06.159541 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calice1afb656fe: link becomes ready Oct 2 19:18:06.165966 systemd-networkd[1446]: calice1afb656fe: Link UP Oct 2 19:18:06.165976 systemd-networkd[1446]: calice1afb656fe: Gained carrier Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:05.854 [INFO][4260] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0 coredns-5d78c9869d- kube-system 32a66284-edb9-4f52-84a1-ade5bfe7b780 710 0 2023-10-02 19:17:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-27-212 coredns-5d78c9869d-476mp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calice1afb656fe [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" Namespace="kube-system" Pod="coredns-5d78c9869d-476mp" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-" Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:05.854 [INFO][4260] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" Namespace="kube-system" Pod="coredns-5d78c9869d-476mp" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:05.977 [INFO][4274] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" HandleID="k8s-pod-network.61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:06.000 [INFO][4274] ipam_plugin.go 269: Auto assigning IP ContainerID="61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" HandleID="k8s-pod-network.61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004d720), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-27-212", "pod":"coredns-5d78c9869d-476mp", "timestamp":"2023-10-02 19:18:05.977305092 +0000 UTC"}, Hostname:"ip-172-31-27-212", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:18:06.209426 env[1632]: time="2023-10-02T19:18:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:06.209426 env[1632]: time="2023-10-02T19:18:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:06.000 [INFO][4274] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-212' Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:06.017 [INFO][4274] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" host="ip-172-31-27-212" Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:06.050 [INFO][4274] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-212" Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:06.094 [INFO][4274] ipam.go 489: Trying affinity for 192.168.0.192/26 host="ip-172-31-27-212" Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:06.101 [INFO][4274] ipam.go 155: Attempting to load block cidr=192.168.0.192/26 host="ip-172-31-27-212" Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:06.118 [INFO][4274] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.0.192/26 host="ip-172-31-27-212" Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:06.118 [INFO][4274] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.0.192/26 handle="k8s-pod-network.61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" host="ip-172-31-27-212" Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:06.127 [INFO][4274] ipam.go 1682: Creating new handle: k8s-pod-network.61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4 Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:06.134 [INFO][4274] ipam.go 1203: Writing block in order to claim IPs block=192.168.0.192/26 handle="k8s-pod-network.61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" host="ip-172-31-27-212" Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:06.150 [INFO][4274] ipam.go 1216: Successfully claimed IPs: [192.168.0.194/26] block=192.168.0.192/26 handle="k8s-pod-network.61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" host="ip-172-31-27-212" Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:06.151 [INFO][4274] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.0.194/26] handle="k8s-pod-network.61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" host="ip-172-31-27-212" Oct 2 19:18:06.209426 env[1632]: time="2023-10-02T19:18:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:06.209426 env[1632]: 2023-10-02 19:18:06.151 [INFO][4274] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.0.194/26] IPv6=[] ContainerID="61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" HandleID="k8s-pod-network.61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:06.210576 env[1632]: 2023-10-02 19:18:06.154 [INFO][4260] k8s.go 383: Populated endpoint ContainerID="61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" Namespace="kube-system" Pod="coredns-5d78c9869d-476mp" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"32a66284-edb9-4f52-84a1-ade5bfe7b780", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"", Pod:"coredns-5d78c9869d-476mp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.0.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calice1afb656fe", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:06.210576 env[1632]: 2023-10-02 19:18:06.154 [INFO][4260] k8s.go 384: Calico CNI using IPs: [192.168.0.194/32] ContainerID="61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" Namespace="kube-system" Pod="coredns-5d78c9869d-476mp" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:06.210576 env[1632]: 2023-10-02 19:18:06.154 [INFO][4260] dataplane_linux.go 68: Setting the host side veth name to calice1afb656fe ContainerID="61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" Namespace="kube-system" Pod="coredns-5d78c9869d-476mp" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:06.210576 env[1632]: 2023-10-02 19:18:06.159 [INFO][4260] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" Namespace="kube-system" Pod="coredns-5d78c9869d-476mp" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:06.210576 env[1632]: 2023-10-02 19:18:06.164 [INFO][4260] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" Namespace="kube-system" Pod="coredns-5d78c9869d-476mp" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"32a66284-edb9-4f52-84a1-ade5bfe7b780", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4", Pod:"coredns-5d78c9869d-476mp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.0.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calice1afb656fe", MAC:"c2:63:72:a4:41:cb", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:06.210576 env[1632]: 2023-10-02 19:18:06.181 [INFO][4260] k8s.go 489: Wrote updated endpoint to datastore ContainerID="61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4" Namespace="kube-system" Pod="coredns-5d78c9869d-476mp" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:06.311940 systemd[1]: run-netns-cni\x2d754d4115\x2de9f9\x2d27df\x2d34da\x2d68949e358b03.mount: Deactivated successfully. Oct 2 19:18:06.348664 env[1632]: time="2023-10-02T19:18:06.348565211Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:18:06.350215 env[1632]: time="2023-10-02T19:18:06.350157344Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:18:06.350403 env[1632]: time="2023-10-02T19:18:06.350376807Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:18:06.350823 env[1632]: time="2023-10-02T19:18:06.350779668Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4 pid=4347 runtime=io.containerd.runc.v2 Oct 2 19:18:06.441006 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali29e4e0ce570: link becomes ready Oct 2 19:18:06.467850 systemd-networkd[1446]: cali29e4e0ce570: Link UP Oct 2 19:18:06.467871 systemd-networkd[1446]: cali29e4e0ce570: Gained carrier Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.023 [INFO][4275] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0 csi-node-driver- calico-system ddf8d927-2e24-4d63-8790-6f900827a156 711 0 2023-10-02 19:17:49 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:759544bff5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-27-212 csi-node-driver-swqx9 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali29e4e0ce570 [] []}} ContainerID="73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" Namespace="calico-system" Pod="csi-node-driver-swqx9" WorkloadEndpoint="ip--172--31--27--212-k8s-csi--node--driver--swqx9-" Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.024 [INFO][4275] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" Namespace="calico-system" Pod="csi-node-driver-swqx9" WorkloadEndpoint="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.277 [INFO][4306] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" HandleID="k8s-pod-network.73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" Workload="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.316 [INFO][4306] ipam_plugin.go 269: Auto assigning IP ContainerID="73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" HandleID="k8s-pod-network.73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" Workload="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001b8140), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-27-212", "pod":"csi-node-driver-swqx9", "timestamp":"2023-10-02 19:18:06.275847155 +0000 UTC"}, Hostname:"ip-172-31-27-212", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:18:06.500108 env[1632]: time="2023-10-02T19:18:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:06.500108 env[1632]: time="2023-10-02T19:18:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.316 [INFO][4306] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-212' Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.319 [INFO][4306] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" host="ip-172-31-27-212" Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.330 [INFO][4306] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-212" Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.349 [INFO][4306] ipam.go 489: Trying affinity for 192.168.0.192/26 host="ip-172-31-27-212" Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.365 [INFO][4306] ipam.go 155: Attempting to load block cidr=192.168.0.192/26 host="ip-172-31-27-212" Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.374 [INFO][4306] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.0.192/26 host="ip-172-31-27-212" Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.374 [INFO][4306] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.0.192/26 handle="k8s-pod-network.73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" host="ip-172-31-27-212" Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.386 [INFO][4306] ipam.go 1682: Creating new handle: k8s-pod-network.73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30 Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.399 [INFO][4306] ipam.go 1203: Writing block in order to claim IPs block=192.168.0.192/26 handle="k8s-pod-network.73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" host="ip-172-31-27-212" Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.413 [INFO][4306] ipam.go 1216: Successfully claimed IPs: [192.168.0.195/26] block=192.168.0.192/26 handle="k8s-pod-network.73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" host="ip-172-31-27-212" Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.413 [INFO][4306] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.0.195/26] handle="k8s-pod-network.73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" host="ip-172-31-27-212" Oct 2 19:18:06.500108 env[1632]: time="2023-10-02T19:18:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:06.500108 env[1632]: 2023-10-02 19:18:06.413 [INFO][4306] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.0.195/26] IPv6=[] ContainerID="73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" HandleID="k8s-pod-network.73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" Workload="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:06.501323 env[1632]: 2023-10-02 19:18:06.432 [INFO][4275] k8s.go 383: Populated endpoint ContainerID="73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" Namespace="calico-system" Pod="csi-node-driver-swqx9" WorkloadEndpoint="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ddf8d927-2e24-4d63-8790-6f900827a156", ResourceVersion:"711", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"", Pod:"csi-node-driver-swqx9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.0.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali29e4e0ce570", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:06.501323 env[1632]: 2023-10-02 19:18:06.432 [INFO][4275] k8s.go 384: Calico CNI using IPs: [192.168.0.195/32] ContainerID="73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" Namespace="calico-system" Pod="csi-node-driver-swqx9" WorkloadEndpoint="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:06.501323 env[1632]: 2023-10-02 19:18:06.432 [INFO][4275] dataplane_linux.go 68: Setting the host side veth name to cali29e4e0ce570 ContainerID="73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" Namespace="calico-system" Pod="csi-node-driver-swqx9" WorkloadEndpoint="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:06.501323 env[1632]: 2023-10-02 19:18:06.440 [INFO][4275] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" Namespace="calico-system" Pod="csi-node-driver-swqx9" WorkloadEndpoint="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:06.501323 env[1632]: 2023-10-02 19:18:06.473 [INFO][4275] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" Namespace="calico-system" Pod="csi-node-driver-swqx9" WorkloadEndpoint="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ddf8d927-2e24-4d63-8790-6f900827a156", ResourceVersion:"711", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30", Pod:"csi-node-driver-swqx9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.0.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali29e4e0ce570", MAC:"b2:0b:b2:ff:e5:68", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:06.501323 env[1632]: 2023-10-02 19:18:06.495 [INFO][4275] k8s.go 489: Wrote updated endpoint to datastore ContainerID="73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30" Namespace="calico-system" Pod="csi-node-driver-swqx9" WorkloadEndpoint="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:06.515976 systemd[1]: Started cri-containerd-61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4.scope. Oct 2 19:18:06.536926 systemd[1]: run-containerd-runc-k8s.io-61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4-runc.R7xEYg.mount: Deactivated successfully. Oct 2 19:18:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.574000 audit: BPF prog-id=156 op=LOAD Oct 2 19:18:06.576000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.576000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4347 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631646463376134383034393037633132323037346266666261323139 Oct 2 19:18:06.576000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.576000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4347 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631646463376134383034393037633132323037346266666261323139 Oct 2 19:18:06.577000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.577000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.577000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.577000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.577000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.577000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.577000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.577000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.577000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.577000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.577000 audit: BPF prog-id=157 op=LOAD Oct 2 19:18:06.577000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024390 items=0 ppid=4347 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631646463376134383034393037633132323037346266666261323139 Oct 2 19:18:06.578000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.578000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.578000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.578000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.578000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.578000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.578000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.578000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.578000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.578000 audit: BPF prog-id=158 op=LOAD Oct 2 19:18:06.578000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000243d8 items=0 ppid=4347 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631646463376134383034393037633132323037346266666261323139 Oct 2 19:18:06.579000 audit: BPF prog-id=158 op=UNLOAD Oct 2 19:18:06.579000 audit: BPF prog-id=157 op=UNLOAD Oct 2 19:18:06.579000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.579000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.579000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.579000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.579000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.579000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.579000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.579000 audit[4359]: AVC avc: denied { perfmon } for pid=4359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.579000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.579000 audit[4359]: AVC avc: denied { bpf } for pid=4359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.579000 audit: BPF prog-id=159 op=LOAD Oct 2 19:18:06.579000 audit[4359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000247e8 items=0 ppid=4347 pid=4359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631646463376134383034393037633132323037346266666261323139 Oct 2 19:18:06.614089 env[1632]: time="2023-10-02T19:18:06.614006725Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:18:06.614089 env[1632]: time="2023-10-02T19:18:06.614060485Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:18:06.614364 env[1632]: time="2023-10-02T19:18:06.614319852Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:18:06.626923 env[1632]: time="2023-10-02T19:18:06.614613864Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30 pid=4404 runtime=io.containerd.runc.v2 Oct 2 19:18:06.672438 systemd[1]: Started cri-containerd-73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30.scope. Oct 2 19:18:06.725119 env[1632]: time="2023-10-02T19:18:06.724997071Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-476mp,Uid:32a66284-edb9-4f52-84a1-ade5bfe7b780,Namespace:kube-system,Attempt:1,} returns sandbox id \"61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4\"" Oct 2 19:18:06.741019 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4ab44580a21: link becomes ready Oct 2 19:18:06.743475 env[1632]: time="2023-10-02T19:18:06.743421611Z" level=info msg="CreateContainer within sandbox \"61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:18:06.751795 systemd-networkd[1446]: cali4ab44580a21: Link UP Oct 2 19:18:06.751805 systemd-networkd[1446]: cali4ab44580a21: Gained carrier Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.106 [INFO][4288] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0 coredns-5d78c9869d- kube-system a8a33ebd-4c7f-4b5f-b963-08624be62b41 712 0 2023-10-02 19:17:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-27-212 coredns-5d78c9869d-fhxmt eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4ab44580a21 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" Namespace="kube-system" Pod="coredns-5d78c9869d-fhxmt" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-" Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.106 [INFO][4288] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" Namespace="kube-system" Pod="coredns-5d78c9869d-fhxmt" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.491 [INFO][4312] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" HandleID="k8s-pod-network.ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.573 [INFO][4312] ipam_plugin.go 269: Auto assigning IP ContainerID="ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" HandleID="k8s-pod-network.ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a3e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-27-212", "pod":"coredns-5d78c9869d-fhxmt", "timestamp":"2023-10-02 19:18:06.490824425 +0000 UTC"}, Hostname:"ip-172-31-27-212", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:18:06.788368 env[1632]: time="2023-10-02T19:18:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:06.788368 env[1632]: time="2023-10-02T19:18:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.582 [INFO][4312] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-212' Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.589 [INFO][4312] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" host="ip-172-31-27-212" Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.604 [INFO][4312] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-212" Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.628 [INFO][4312] ipam.go 489: Trying affinity for 192.168.0.192/26 host="ip-172-31-27-212" Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.636 [INFO][4312] ipam.go 155: Attempting to load block cidr=192.168.0.192/26 host="ip-172-31-27-212" Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.647 [INFO][4312] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.0.192/26 host="ip-172-31-27-212" Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.649 [INFO][4312] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.0.192/26 handle="k8s-pod-network.ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" host="ip-172-31-27-212" Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.675 [INFO][4312] ipam.go 1682: Creating new handle: k8s-pod-network.ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80 Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.692 [INFO][4312] ipam.go 1203: Writing block in order to claim IPs block=192.168.0.192/26 handle="k8s-pod-network.ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" host="ip-172-31-27-212" Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.718 [INFO][4312] ipam.go 1216: Successfully claimed IPs: [192.168.0.196/26] block=192.168.0.192/26 handle="k8s-pod-network.ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" host="ip-172-31-27-212" Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.718 [INFO][4312] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.0.196/26] handle="k8s-pod-network.ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" host="ip-172-31-27-212" Oct 2 19:18:06.788368 env[1632]: time="2023-10-02T19:18:06Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:06.788368 env[1632]: 2023-10-02 19:18:06.718 [INFO][4312] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.0.196/26] IPv6=[] ContainerID="ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" HandleID="k8s-pod-network.ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:06.789443 env[1632]: 2023-10-02 19:18:06.734 [INFO][4288] k8s.go 383: Populated endpoint ContainerID="ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" Namespace="kube-system" Pod="coredns-5d78c9869d-fhxmt" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a8a33ebd-4c7f-4b5f-b963-08624be62b41", ResourceVersion:"712", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"", Pod:"coredns-5d78c9869d-fhxmt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.0.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4ab44580a21", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:06.789443 env[1632]: 2023-10-02 19:18:06.734 [INFO][4288] k8s.go 384: Calico CNI using IPs: [192.168.0.196/32] ContainerID="ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" Namespace="kube-system" Pod="coredns-5d78c9869d-fhxmt" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:06.789443 env[1632]: 2023-10-02 19:18:06.734 [INFO][4288] dataplane_linux.go 68: Setting the host side veth name to cali4ab44580a21 ContainerID="ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" Namespace="kube-system" Pod="coredns-5d78c9869d-fhxmt" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:06.789443 env[1632]: 2023-10-02 19:18:06.740 [INFO][4288] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" Namespace="kube-system" Pod="coredns-5d78c9869d-fhxmt" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:06.789443 env[1632]: 2023-10-02 19:18:06.751 [INFO][4288] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" Namespace="kube-system" Pod="coredns-5d78c9869d-fhxmt" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a8a33ebd-4c7f-4b5f-b963-08624be62b41", ResourceVersion:"712", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80", Pod:"coredns-5d78c9869d-fhxmt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.0.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4ab44580a21", MAC:"4a:cf:39:e0:6d:db", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:06.789443 env[1632]: 2023-10-02 19:18:06.780 [INFO][4288] k8s.go 489: Wrote updated endpoint to datastore ContainerID="ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80" Namespace="kube-system" Pod="coredns-5d78c9869d-fhxmt" WorkloadEndpoint="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:06.833403 env[1632]: time="2023-10-02T19:18:06.833347807Z" level=info msg="CreateContainer within sandbox \"61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c051d7a1453faee85989f44b8a5fc5c881a3efc8ca2401c062920df74e1a1b09\"" Oct 2 19:18:06.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.836000 audit: BPF prog-id=160 op=LOAD Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4404 pid=4413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626365343066613537396235653333313139623931386539636264 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4404 pid=4413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626365343066613537396235653333313139623931386539636264 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit: BPF prog-id=161 op=LOAD Oct 2 19:18:06.838000 audit[4413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000300350 items=0 ppid=4404 pid=4413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626365343066613537396235653333313139623931386539636264 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit: BPF prog-id=162 op=LOAD Oct 2 19:18:06.838000 audit[4413]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000300398 items=0 ppid=4404 pid=4413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626365343066613537396235653333313139623931386539636264 Oct 2 19:18:06.838000 audit: BPF prog-id=162 op=UNLOAD Oct 2 19:18:06.838000 audit: BPF prog-id=161 op=UNLOAD Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { perfmon } for pid=4413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit[4413]: AVC avc: denied { bpf } for pid=4413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.838000 audit: BPF prog-id=163 op=LOAD Oct 2 19:18:06.838000 audit[4413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003007a8 items=0 ppid=4404 pid=4413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626365343066613537396235653333313139623931386539636264 Oct 2 19:18:06.846605 env[1632]: time="2023-10-02T19:18:06.832408214Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:18:06.846605 env[1632]: time="2023-10-02T19:18:06.832465023Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:18:06.846605 env[1632]: time="2023-10-02T19:18:06.832479404Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:18:06.846605 env[1632]: time="2023-10-02T19:18:06.832797537Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80 pid=4461 runtime=io.containerd.runc.v2 Oct 2 19:18:06.848630 env[1632]: time="2023-10-02T19:18:06.848593581Z" level=info msg="StartContainer for \"c051d7a1453faee85989f44b8a5fc5c881a3efc8ca2401c062920df74e1a1b09\"" Oct 2 19:18:06.855000 audit[4471]: NETFILTER_CFG table=filter:102 family=2 entries=40 op=nft_register_chain pid=4471 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:18:06.855000 audit[4471]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fff317d8cb0 a2=0 a3=7fff317d8c9c items=0 ppid=3847 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.855000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:18:06.933804 systemd[1]: Started cri-containerd-ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80.scope. Oct 2 19:18:06.955150 systemd[1]: Started cri-containerd-c051d7a1453faee85989f44b8a5fc5c881a3efc8ca2401c062920df74e1a1b09.scope. Oct 2 19:18:06.968474 env[1632]: time="2023-10-02T19:18:06.968420953Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-swqx9,Uid:ddf8d927-2e24-4d63-8790-6f900827a156,Namespace:calico-system,Attempt:1,} returns sandbox id \"73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30\"" Oct 2 19:18:06.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.977000 audit: BPF prog-id=164 op=LOAD Oct 2 19:18:06.978000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.978000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4461 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643262616466373566623630626665376437363766366336323266 Oct 2 19:18:06.978000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.978000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4461 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643262616466373566623630626665376437363766366336323266 Oct 2 19:18:06.978000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.978000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.978000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.978000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.978000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.978000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.978000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.978000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.978000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.978000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.978000 audit: BPF prog-id=165 op=LOAD Oct 2 19:18:06.978000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000382790 items=0 ppid=4461 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643262616466373566623630626665376437363766366336323266 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit: BPF prog-id=166 op=LOAD Oct 2 19:18:06.979000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003827d8 items=0 ppid=4461 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643262616466373566623630626665376437363766366336323266 Oct 2 19:18:06.979000 audit: BPF prog-id=166 op=UNLOAD Oct 2 19:18:06.979000 audit: BPF prog-id=165 op=UNLOAD Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:06.979000 audit: BPF prog-id=167 op=LOAD Oct 2 19:18:06.979000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000382be8 items=0 ppid=4461 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:06.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643262616466373566623630626665376437363766366336323266 Oct 2 19:18:07.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.002000 audit: BPF prog-id=168 op=LOAD Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4347 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:07.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330353164376131343533666165653835393839663434623861356663 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4347 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:07.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330353164376131343533666165653835393839663434623861356663 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit: BPF prog-id=169 op=LOAD Oct 2 19:18:07.003000 audit[4479]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00022f320 items=0 ppid=4347 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:07.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330353164376131343533666165653835393839663434623861356663 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit: BPF prog-id=170 op=LOAD Oct 2 19:18:07.003000 audit[4479]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00022f368 items=0 ppid=4347 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:07.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330353164376131343533666165653835393839663434623861356663 Oct 2 19:18:07.003000 audit: BPF prog-id=170 op=UNLOAD Oct 2 19:18:07.003000 audit: BPF prog-id=169 op=UNLOAD Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { perfmon } for pid=4479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit[4479]: AVC avc: denied { bpf } for pid=4479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.003000 audit: BPF prog-id=171 op=LOAD Oct 2 19:18:07.003000 audit[4479]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00022f778 items=0 ppid=4347 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:07.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330353164376131343533666165653835393839663434623861356663 Oct 2 19:18:07.036399 env[1632]: time="2023-10-02T19:18:07.036336310Z" level=info msg="StartContainer for \"c051d7a1453faee85989f44b8a5fc5c881a3efc8ca2401c062920df74e1a1b09\" returns successfully" Oct 2 19:18:07.067684 env[1632]: time="2023-10-02T19:18:07.067635186Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-fhxmt,Uid:a8a33ebd-4c7f-4b5f-b963-08624be62b41,Namespace:kube-system,Attempt:1,} returns sandbox id \"ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80\"" Oct 2 19:18:07.075557 env[1632]: time="2023-10-02T19:18:07.075509095Z" level=info msg="CreateContainer within sandbox \"ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:18:07.096144 env[1632]: time="2023-10-02T19:18:07.096066969Z" level=info msg="CreateContainer within sandbox \"ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ddfa80fd3c1714fe18a5575b3f104de5ba8252ae636da9fb4429f063973c16de\"" Oct 2 19:18:07.097031 env[1632]: time="2023-10-02T19:18:07.096995435Z" level=info msg="StartContainer for \"ddfa80fd3c1714fe18a5575b3f104de5ba8252ae636da9fb4429f063973c16de\"" Oct 2 19:18:07.154263 systemd[1]: Started cri-containerd-ddfa80fd3c1714fe18a5575b3f104de5ba8252ae636da9fb4429f063973c16de.scope. Oct 2 19:18:07.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.187000 audit: BPF prog-id=172 op=LOAD Oct 2 19:18:07.188000 audit[4547]: AVC avc: denied { bpf } for pid=4547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.188000 audit[4547]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4461 pid=4547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:07.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464666138306664336331373134666531386135353735623366313034 Oct 2 19:18:07.189000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.189000 audit[4547]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4461 pid=4547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:07.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464666138306664336331373134666531386135353735623366313034 Oct 2 19:18:07.189000 audit[4547]: AVC avc: denied { bpf } for pid=4547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.189000 audit[4547]: AVC avc: denied { bpf } for pid=4547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.189000 audit[4547]: AVC avc: denied { bpf } for pid=4547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.189000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.189000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.189000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.189000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.189000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.189000 audit[4547]: AVC avc: denied { bpf } for pid=4547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.189000 audit[4547]: AVC avc: denied { bpf } for pid=4547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.189000 audit: BPF prog-id=173 op=LOAD Oct 2 19:18:07.189000 audit[4547]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a1b20 items=0 ppid=4461 pid=4547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:07.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464666138306664336331373134666531386135353735623366313034 Oct 2 19:18:07.191000 audit[4547]: AVC avc: denied { bpf } for pid=4547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.191000 audit[4547]: AVC avc: denied { bpf } for pid=4547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.191000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.191000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.191000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.191000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.191000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.191000 audit[4547]: AVC avc: denied { bpf } for pid=4547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.191000 audit[4547]: AVC avc: denied { bpf } for pid=4547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.191000 audit: BPF prog-id=174 op=LOAD Oct 2 19:18:07.191000 audit[4547]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a1b68 items=0 ppid=4461 pid=4547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:07.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464666138306664336331373134666531386135353735623366313034 Oct 2 19:18:07.192000 audit: BPF prog-id=174 op=UNLOAD Oct 2 19:18:07.192000 audit: BPF prog-id=173 op=UNLOAD Oct 2 19:18:07.192000 audit[4547]: AVC avc: denied { bpf } for pid=4547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.192000 audit[4547]: AVC avc: denied { bpf } for pid=4547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.192000 audit[4547]: AVC avc: denied { bpf } for pid=4547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.192000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.192000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.192000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.192000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.192000 audit[4547]: AVC avc: denied { perfmon } for pid=4547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.192000 audit[4547]: AVC avc: denied { bpf } for pid=4547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.192000 audit[4547]: AVC avc: denied { bpf } for pid=4547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:07.192000 audit: BPF prog-id=175 op=LOAD Oct 2 19:18:07.192000 audit[4547]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a1f78 items=0 ppid=4461 pid=4547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:07.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464666138306664336331373134666531386135353735623366313034 Oct 2 19:18:07.208340 systemd-networkd[1446]: calice1afb656fe: Gained IPv6LL Oct 2 19:18:07.328601 env[1632]: time="2023-10-02T19:18:07.328550764Z" level=info msg="StartContainer for \"ddfa80fd3c1714fe18a5575b3f104de5ba8252ae636da9fb4429f063973c16de\" returns successfully" Oct 2 19:18:07.526000 audit[4582]: NETFILTER_CFG table=filter:103 family=2 entries=60 op=nft_register_chain pid=4582 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:18:07.526000 audit[4582]: SYSCALL arch=c000003e syscall=46 success=yes exit=33288 a0=3 a1=7ffea61bf530 a2=0 a3=7ffea61bf51c items=0 ppid=3847 pid=4582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:07.526000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:18:07.581793 kubelet[2831]: I1002 19:18:07.581759 2831 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-476mp" podStartSLOduration=38.58168825 podCreationTimestamp="2023-10-02 19:17:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:18:07.54185398 +0000 UTC m=+51.580175369" watchObservedRunningTime="2023-10-02 19:18:07.58168825 +0000 UTC m=+51.620009637" Oct 2 19:18:07.647000 audit[4590]: NETFILTER_CFG table=filter:104 family=2 entries=14 op=nft_register_rule pid=4590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:07.647000 audit[4590]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff7a221600 a2=0 a3=7fff7a2215ec items=0 ppid=3006 pid=4590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:07.647000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:07.648000 audit[4590]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=4590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:07.648000 audit[4590]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7fff7a221600 a2=0 a3=31030 items=0 ppid=3006 pid=4590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:07.648000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:07.656090 systemd-networkd[1446]: cali29e4e0ce570: Gained IPv6LL Oct 2 19:18:07.702000 audit[4592]: NETFILTER_CFG table=filter:106 family=2 entries=14 op=nft_register_rule pid=4592 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:07.702000 audit[4592]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff9ab4b3e0 a2=0 a3=7fff9ab4b3cc items=0 ppid=3006 pid=4592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:07.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:07.718000 audit[4592]: NETFILTER_CFG table=nat:107 family=2 entries=14 op=nft_register_rule pid=4592 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:07.718000 audit[4592]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7fff9ab4b3e0 a2=0 a3=31030 items=0 ppid=3006 pid=4592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:07.718000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:08.104379 systemd-networkd[1446]: cali4ab44580a21: Gained IPv6LL Oct 2 19:18:08.501924 env[1632]: time="2023-10-02T19:18:08.501877708Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:08.513916 env[1632]: time="2023-10-02T19:18:08.513867654Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:08.525465 env[1632]: time="2023-10-02T19:18:08.525421093Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:08.534462 env[1632]: time="2023-10-02T19:18:08.534415513Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:18:08.535941 env[1632]: time="2023-10-02T19:18:08.535901190Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 19:18:08.537388 env[1632]: time="2023-10-02T19:18:08.537357404Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:18:08.539286 env[1632]: time="2023-10-02T19:18:08.539249656Z" level=info msg="CreateContainer within sandbox \"2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:18:08.543535 kubelet[2831]: I1002 19:18:08.543475 2831 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-fhxmt" podStartSLOduration=39.543426399 podCreationTimestamp="2023-10-02 19:17:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:18:07.584608304 +0000 UTC m=+51.622929691" watchObservedRunningTime="2023-10-02 19:18:08.543426399 +0000 UTC m=+52.581747787" Oct 2 19:18:08.563961 env[1632]: time="2023-10-02T19:18:08.563887690Z" level=info msg="CreateContainer within sandbox \"2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365\"" Oct 2 19:18:08.565293 env[1632]: time="2023-10-02T19:18:08.565261623Z" level=info msg="StartContainer for \"7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365\"" Oct 2 19:18:08.630972 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.KpnP70.mount: Deactivated successfully. Oct 2 19:18:08.645068 systemd[1]: Started cri-containerd-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365.scope. Oct 2 19:18:08.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.682000 audit: BPF prog-id=176 op=LOAD Oct 2 19:18:08.683000 audit[4604]: AVC avc: denied { bpf } for pid=4604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.683000 audit[4604]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4139 pid=4604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:08.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383062393461323736636630306636326463313665303134383234 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4139 pid=4604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:08.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383062393461323736636630306636326463313665303134383234 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { bpf } for pid=4604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { bpf } for pid=4604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { bpf } for pid=4604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { bpf } for pid=4604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { bpf } for pid=4604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit: BPF prog-id=177 op=LOAD Oct 2 19:18:08.684000 audit[4604]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002ab160 items=0 ppid=4139 pid=4604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:08.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383062393461323736636630306636326463313665303134383234 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { bpf } for pid=4604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { bpf } for pid=4604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { bpf } for pid=4604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit[4604]: AVC avc: denied { bpf } for pid=4604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.684000 audit: BPF prog-id=178 op=LOAD Oct 2 19:18:08.684000 audit[4604]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002ab1a8 items=0 ppid=4139 pid=4604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:08.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383062393461323736636630306636326463313665303134383234 Oct 2 19:18:08.684000 audit: BPF prog-id=178 op=UNLOAD Oct 2 19:18:08.686000 audit: BPF prog-id=177 op=UNLOAD Oct 2 19:18:08.686000 audit[4604]: AVC avc: denied { bpf } for pid=4604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.686000 audit[4604]: AVC avc: denied { bpf } for pid=4604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.686000 audit[4604]: AVC avc: denied { bpf } for pid=4604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.686000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.686000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.686000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.686000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.686000 audit[4604]: AVC avc: denied { perfmon } for pid=4604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.686000 audit[4604]: AVC avc: denied { bpf } for pid=4604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.686000 audit[4604]: AVC avc: denied { bpf } for pid=4604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:08.686000 audit: BPF prog-id=179 op=LOAD Oct 2 19:18:08.686000 audit[4604]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002ab5b8 items=0 ppid=4139 pid=4604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:08.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383062393461323736636630306636326463313665303134383234 Oct 2 19:18:08.701000 audit[4621]: NETFILTER_CFG table=filter:108 family=2 entries=11 op=nft_register_rule pid=4621 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:08.701000 audit[4621]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff8f984b40 a2=0 a3=7fff8f984b2c items=0 ppid=3006 pid=4621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:08.701000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:08.716408 env[1632]: time="2023-10-02T19:18:08.716357017Z" level=info msg="StartContainer for \"7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365\" returns successfully" Oct 2 19:18:08.732000 audit[4621]: NETFILTER_CFG table=nat:109 family=2 entries=47 op=nft_register_chain pid=4621 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:08.732000 audit[4621]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7fff8f984b40 a2=0 a3=7fff8f984b2c items=0 ppid=3006 pid=4621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:08.732000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:08.744391 env[1632]: time="2023-10-02T19:18:08.744320395Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:18:08.745800 env[1632]: time="2023-10-02T19:18:08.745734766Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:18:08.746557 kubelet[2831]: E1002 19:18:08.746386 2831 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:18:08.748708 kubelet[2831]: E1002 19:18:08.747512 2831 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:18:08.748835 kubelet[2831]: E1002 19:18:08.748488 2831 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-m6vrn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-swqx9_calico-system(ddf8d927-2e24-4d63-8790-6f900827a156): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:18:08.750091 env[1632]: time="2023-10-02T19:18:08.750055967Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:18:08.939430 env[1632]: time="2023-10-02T19:18:08.939351839Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:18:08.941251 env[1632]: time="2023-10-02T19:18:08.941182291Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:18:08.941870 kubelet[2831]: E1002 19:18:08.941708 2831 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:18:08.941870 kubelet[2831]: E1002 19:18:08.941766 2831 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:18:08.942122 kubelet[2831]: E1002 19:18:08.941909 2831 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-m6vrn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-swqx9_calico-system(ddf8d927-2e24-4d63-8790-6f900827a156): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:18:08.942122 kubelet[2831]: E1002 19:18:08.941980 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-swqx9" podUID=ddf8d927-2e24-4d63-8790-6f900827a156 Oct 2 19:18:09.525724 kubelet[2831]: E1002 19:18:09.525699 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-swqx9" podUID=ddf8d927-2e24-4d63-8790-6f900827a156 Oct 2 19:18:09.585173 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.oASZSL.mount: Deactivated successfully. Oct 2 19:18:09.653302 kubelet[2831]: I1002 19:18:09.653250 2831 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7bd445fdb4-4gqzg" podStartSLOduration=30.219536555 podCreationTimestamp="2023-10-02 19:17:35 +0000 UTC" firstStartedPulling="2023-10-02 19:18:04.102757121 +0000 UTC m=+48.141078505" lastFinishedPulling="2023-10-02 19:18:08.536394771 +0000 UTC m=+52.574716151" observedRunningTime="2023-10-02 19:18:09.600839122 +0000 UTC m=+53.639160570" watchObservedRunningTime="2023-10-02 19:18:09.653174201 +0000 UTC m=+53.691495589" Oct 2 19:18:09.839835 kernel: kauditd_printk_skb: 416 callbacks suppressed Oct 2 19:18:09.840032 kernel: audit: type=1325 audit(1696274289.833:1335): table=filter:110 family=2 entries=8 op=nft_register_rule pid=4655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:09.833000 audit[4655]: NETFILTER_CFG table=filter:110 family=2 entries=8 op=nft_register_rule pid=4655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:09.833000 audit[4655]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff69a95560 a2=0 a3=7fff69a9554c items=0 ppid=3006 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:09.848977 kernel: audit: type=1300 audit(1696274289.833:1335): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff69a95560 a2=0 a3=7fff69a9554c items=0 ppid=3006 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:09.833000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:09.855909 kernel: audit: type=1327 audit(1696274289.833:1335): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:09.850000 audit[4655]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=4655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:09.860943 kernel: audit: type=1325 audit(1696274289.850:1336): table=nat:111 family=2 entries=20 op=nft_register_rule pid=4655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:09.850000 audit[4655]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff69a95560 a2=0 a3=7fff69a9554c items=0 ppid=3006 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:09.869967 kernel: audit: type=1300 audit(1696274289.850:1336): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff69a95560 a2=0 a3=7fff69a9554c items=0 ppid=3006 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:09.850000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:09.874914 kernel: audit: type=1327 audit(1696274289.850:1336): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:10.785000 audit[2525]: AVC avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:10.785000 audit[2525]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00218a5a0 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:18:10.801724 kernel: audit: type=1400 audit(1696274290.785:1337): avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:10.802022 kernel: audit: type=1300 audit(1696274290.785:1337): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00218a5a0 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:18:10.802085 kernel: audit: type=1327 audit(1696274290.785:1337): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:10.785000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:10.801000 audit[2525]: AVC avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:10.815423 kernel: audit: type=1400 audit(1696274290.801:1338): avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:10.801000 audit[2525]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00256f0c0 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:18:10.801000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:12.215000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:12.215000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c009626d40 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:18:12.215000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:18:12.215000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:12.215000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c009a5ff20 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:18:12.215000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:18:12.215000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:12.215000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c009a5ff50 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:18:12.215000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:18:12.231000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:12.231000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0039556b0 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:18:12.231000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:18:12.265000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:12.265000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:12.265000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c003955950 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:18:12.265000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:18:12.265000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c009aaad20 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:18:12.265000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:18:13.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.212:22-139.178.89.65:44782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:13.958151 systemd[1]: Started sshd@7-172.31.27.212:22-139.178.89.65:44782.service. Oct 2 19:18:14.190000 audit[4667]: USER_ACCT pid=4667 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:14.191451 sshd[4667]: Accepted publickey for core from 139.178.89.65 port 44782 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:18:14.192000 audit[4667]: CRED_ACQ pid=4667 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:14.193000 audit[4667]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9cc13be0 a2=3 a3=0 items=0 ppid=1 pid=4667 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:14.193000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:14.196229 sshd[4667]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:14.203059 systemd[1]: Started session-8.scope. Oct 2 19:18:14.203688 systemd-logind[1626]: New session 8 of user core. Oct 2 19:18:14.209000 audit[4667]: USER_START pid=4667 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:14.212000 audit[4669]: CRED_ACQ pid=4669 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:14.638481 sshd[4667]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:14.640000 audit[4667]: USER_END pid=4667 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:14.641000 audit[4667]: CRED_DISP pid=4667 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:14.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.212:22-139.178.89.65:44782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.646272 systemd[1]: sshd@7-172.31.27.212:22-139.178.89.65:44782.service: Deactivated successfully. Oct 2 19:18:14.647675 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:18:14.648753 systemd-logind[1626]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:18:14.650496 systemd-logind[1626]: Removed session 8. Oct 2 19:18:16.218358 systemd[1]: run-containerd-runc-k8s.io-5cc8377b8aa0c7ff66809a361dda2d9ccd2b7434cbfeede3ddc5650c2a5acf23-runc.6wAWkw.mount: Deactivated successfully. Oct 2 19:18:16.259386 env[1632]: time="2023-10-02T19:18:16.259353568Z" level=info msg="StopPodSandbox for \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\"" Oct 2 19:18:16.451694 env[1632]: 2023-10-02 19:18:16.387 [WARNING][4717] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a8a33ebd-4c7f-4b5f-b963-08624be62b41", ResourceVersion:"751", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80", Pod:"coredns-5d78c9869d-fhxmt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.0.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4ab44580a21", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:16.451694 env[1632]: 2023-10-02 19:18:16.387 [INFO][4717] k8s.go 576: Cleaning up netns ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Oct 2 19:18:16.451694 env[1632]: 2023-10-02 19:18:16.387 [INFO][4717] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" iface="eth0" netns="" Oct 2 19:18:16.451694 env[1632]: 2023-10-02 19:18:16.387 [INFO][4717] k8s.go 583: Releasing IP address(es) ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Oct 2 19:18:16.451694 env[1632]: 2023-10-02 19:18:16.387 [INFO][4717] utils.go 196: Calico CNI releasing IP address ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Oct 2 19:18:16.451694 env[1632]: 2023-10-02 19:18:16.436 [INFO][4728] ipam_plugin.go 416: Releasing address using handleID ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" HandleID="k8s-pod-network.241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:16.451694 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:16.451694 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:16.451694 env[1632]: 2023-10-02 19:18:16.443 [WARNING][4728] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" HandleID="k8s-pod-network.241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:16.451694 env[1632]: 2023-10-02 19:18:16.443 [INFO][4728] ipam_plugin.go 444: Releasing address using workloadID ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" HandleID="k8s-pod-network.241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:16.451694 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:16.451694 env[1632]: 2023-10-02 19:18:16.449 [INFO][4717] k8s.go 589: Teardown processing complete. ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Oct 2 19:18:16.453143 env[1632]: time="2023-10-02T19:18:16.451733839Z" level=info msg="TearDown network for sandbox \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\" successfully" Oct 2 19:18:16.453143 env[1632]: time="2023-10-02T19:18:16.451770181Z" level=info msg="StopPodSandbox for \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\" returns successfully" Oct 2 19:18:16.453143 env[1632]: time="2023-10-02T19:18:16.452756665Z" level=info msg="RemovePodSandbox for \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\"" Oct 2 19:18:16.453143 env[1632]: time="2023-10-02T19:18:16.452807683Z" level=info msg="Forcibly stopping sandbox \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\"" Oct 2 19:18:16.557773 env[1632]: 2023-10-02 19:18:16.515 [WARNING][4749] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a8a33ebd-4c7f-4b5f-b963-08624be62b41", ResourceVersion:"751", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"ddd2badf75fb60bfe7d767f6c622fb66a79af6d1dde4a52eb4ba5a831685ab80", Pod:"coredns-5d78c9869d-fhxmt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.0.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4ab44580a21", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:16.557773 env[1632]: 2023-10-02 19:18:16.515 [INFO][4749] k8s.go 576: Cleaning up netns ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Oct 2 19:18:16.557773 env[1632]: 2023-10-02 19:18:16.515 [INFO][4749] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" iface="eth0" netns="" Oct 2 19:18:16.557773 env[1632]: 2023-10-02 19:18:16.515 [INFO][4749] k8s.go 583: Releasing IP address(es) ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Oct 2 19:18:16.557773 env[1632]: 2023-10-02 19:18:16.516 [INFO][4749] utils.go 196: Calico CNI releasing IP address ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Oct 2 19:18:16.557773 env[1632]: 2023-10-02 19:18:16.543 [INFO][4755] ipam_plugin.go 416: Releasing address using handleID ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" HandleID="k8s-pod-network.241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:16.557773 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:16.557773 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:16.557773 env[1632]: 2023-10-02 19:18:16.551 [WARNING][4755] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" HandleID="k8s-pod-network.241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:16.557773 env[1632]: 2023-10-02 19:18:16.551 [INFO][4755] ipam_plugin.go 444: Releasing address using workloadID ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" HandleID="k8s-pod-network.241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--fhxmt-eth0" Oct 2 19:18:16.557773 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:16.557773 env[1632]: 2023-10-02 19:18:16.555 [INFO][4749] k8s.go 589: Teardown processing complete. ContainerID="241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1" Oct 2 19:18:16.557773 env[1632]: time="2023-10-02T19:18:16.556696119Z" level=info msg="TearDown network for sandbox \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\" successfully" Oct 2 19:18:16.561149 env[1632]: time="2023-10-02T19:18:16.561091001Z" level=info msg="RemovePodSandbox \"241e9348c5203f98f4e750e2cf7e139e455c9c75f79d13193425e549649bd3e1\" returns successfully" Oct 2 19:18:16.561696 env[1632]: time="2023-10-02T19:18:16.561667028Z" level=info msg="StopPodSandbox for \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\"" Oct 2 19:18:16.671292 env[1632]: 2023-10-02 19:18:16.627 [WARNING][4773] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"22669c5e-cfda-4de4-b127-3a16a77d35ba", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5", Pod:"calico-kube-controllers-7bd445fdb4-4gqzg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.0.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calieaecfddfdef", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:16.671292 env[1632]: 2023-10-02 19:18:16.627 [INFO][4773] k8s.go 576: Cleaning up netns ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Oct 2 19:18:16.671292 env[1632]: 2023-10-02 19:18:16.627 [INFO][4773] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" iface="eth0" netns="" Oct 2 19:18:16.671292 env[1632]: 2023-10-02 19:18:16.628 [INFO][4773] k8s.go 583: Releasing IP address(es) ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Oct 2 19:18:16.671292 env[1632]: 2023-10-02 19:18:16.628 [INFO][4773] utils.go 196: Calico CNI releasing IP address ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Oct 2 19:18:16.671292 env[1632]: 2023-10-02 19:18:16.657 [INFO][4779] ipam_plugin.go 416: Releasing address using handleID ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" HandleID="k8s-pod-network.6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Workload="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:16.671292 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:16.671292 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:16.671292 env[1632]: 2023-10-02 19:18:16.665 [WARNING][4779] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" HandleID="k8s-pod-network.6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Workload="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:16.671292 env[1632]: 2023-10-02 19:18:16.666 [INFO][4779] ipam_plugin.go 444: Releasing address using workloadID ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" HandleID="k8s-pod-network.6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Workload="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:16.671292 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:16.671292 env[1632]: 2023-10-02 19:18:16.669 [INFO][4773] k8s.go 589: Teardown processing complete. ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Oct 2 19:18:16.672555 env[1632]: time="2023-10-02T19:18:16.671329185Z" level=info msg="TearDown network for sandbox \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\" successfully" Oct 2 19:18:16.672555 env[1632]: time="2023-10-02T19:18:16.671367128Z" level=info msg="StopPodSandbox for \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\" returns successfully" Oct 2 19:18:16.673031 env[1632]: time="2023-10-02T19:18:16.672993670Z" level=info msg="RemovePodSandbox for \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\"" Oct 2 19:18:16.673125 env[1632]: time="2023-10-02T19:18:16.673038507Z" level=info msg="Forcibly stopping sandbox \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\"" Oct 2 19:18:16.758874 env[1632]: 2023-10-02 19:18:16.714 [WARNING][4797] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"22669c5e-cfda-4de4-b127-3a16a77d35ba", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"2bb5cbb56a53725c1c05898172eb6bc14bfce444d943441963a705ff1052b7a5", Pod:"calico-kube-controllers-7bd445fdb4-4gqzg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.0.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calieaecfddfdef", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:16.758874 env[1632]: 2023-10-02 19:18:16.714 [INFO][4797] k8s.go 576: Cleaning up netns ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Oct 2 19:18:16.758874 env[1632]: 2023-10-02 19:18:16.714 [INFO][4797] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" iface="eth0" netns="" Oct 2 19:18:16.758874 env[1632]: 2023-10-02 19:18:16.714 [INFO][4797] k8s.go 583: Releasing IP address(es) ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Oct 2 19:18:16.758874 env[1632]: 2023-10-02 19:18:16.714 [INFO][4797] utils.go 196: Calico CNI releasing IP address ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Oct 2 19:18:16.758874 env[1632]: 2023-10-02 19:18:16.745 [INFO][4803] ipam_plugin.go 416: Releasing address using handleID ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" HandleID="k8s-pod-network.6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Workload="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:16.758874 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:16.758874 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:16.758874 env[1632]: 2023-10-02 19:18:16.753 [WARNING][4803] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" HandleID="k8s-pod-network.6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Workload="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:16.758874 env[1632]: 2023-10-02 19:18:16.753 [INFO][4803] ipam_plugin.go 444: Releasing address using workloadID ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" HandleID="k8s-pod-network.6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Workload="ip--172--31--27--212-k8s-calico--kube--controllers--7bd445fdb4--4gqzg-eth0" Oct 2 19:18:16.758874 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:16.758874 env[1632]: 2023-10-02 19:18:16.757 [INFO][4797] k8s.go 589: Teardown processing complete. ContainerID="6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac" Oct 2 19:18:16.760113 env[1632]: time="2023-10-02T19:18:16.758904949Z" level=info msg="TearDown network for sandbox \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\" successfully" Oct 2 19:18:16.763642 env[1632]: time="2023-10-02T19:18:16.763596541Z" level=info msg="RemovePodSandbox \"6141eae48f2f2688cb433ff381b18cc5314600d9accaa1afc0667774e6c761ac\" returns successfully" Oct 2 19:18:16.764368 env[1632]: time="2023-10-02T19:18:16.764337334Z" level=info msg="StopPodSandbox for \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\"" Oct 2 19:18:16.859938 env[1632]: 2023-10-02 19:18:16.815 [WARNING][4821] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ddf8d927-2e24-4d63-8790-6f900827a156", ResourceVersion:"775", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30", Pod:"csi-node-driver-swqx9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.0.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali29e4e0ce570", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:16.859938 env[1632]: 2023-10-02 19:18:16.816 [INFO][4821] k8s.go 576: Cleaning up netns ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Oct 2 19:18:16.859938 env[1632]: 2023-10-02 19:18:16.816 [INFO][4821] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" iface="eth0" netns="" Oct 2 19:18:16.859938 env[1632]: 2023-10-02 19:18:16.816 [INFO][4821] k8s.go 583: Releasing IP address(es) ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Oct 2 19:18:16.859938 env[1632]: 2023-10-02 19:18:16.816 [INFO][4821] utils.go 196: Calico CNI releasing IP address ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Oct 2 19:18:16.859938 env[1632]: 2023-10-02 19:18:16.843 [INFO][4827] ipam_plugin.go 416: Releasing address using handleID ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" HandleID="k8s-pod-network.62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Workload="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:16.859938 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:16.859938 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:16.859938 env[1632]: 2023-10-02 19:18:16.851 [WARNING][4827] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" HandleID="k8s-pod-network.62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Workload="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:16.859938 env[1632]: 2023-10-02 19:18:16.851 [INFO][4827] ipam_plugin.go 444: Releasing address using workloadID ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" HandleID="k8s-pod-network.62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Workload="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:16.859938 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:16.859938 env[1632]: 2023-10-02 19:18:16.858 [INFO][4821] k8s.go 589: Teardown processing complete. ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Oct 2 19:18:16.862097 env[1632]: time="2023-10-02T19:18:16.862051141Z" level=info msg="TearDown network for sandbox \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\" successfully" Oct 2 19:18:16.862097 env[1632]: time="2023-10-02T19:18:16.862091326Z" level=info msg="StopPodSandbox for \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\" returns successfully" Oct 2 19:18:16.862576 env[1632]: time="2023-10-02T19:18:16.862546653Z" level=info msg="RemovePodSandbox for \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\"" Oct 2 19:18:16.862669 env[1632]: time="2023-10-02T19:18:16.862582471Z" level=info msg="Forcibly stopping sandbox \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\"" Oct 2 19:18:16.978966 env[1632]: 2023-10-02 19:18:16.910 [WARNING][4848] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ddf8d927-2e24-4d63-8790-6f900827a156", ResourceVersion:"775", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"73bce40fa579b5e33119b918e9cbd1e00f823d529eff0748151bb5e217d6bc30", Pod:"csi-node-driver-swqx9", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.0.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali29e4e0ce570", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:16.978966 env[1632]: 2023-10-02 19:18:16.911 [INFO][4848] k8s.go 576: Cleaning up netns ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Oct 2 19:18:16.978966 env[1632]: 2023-10-02 19:18:16.911 [INFO][4848] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" iface="eth0" netns="" Oct 2 19:18:16.978966 env[1632]: 2023-10-02 19:18:16.911 [INFO][4848] k8s.go 583: Releasing IP address(es) ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Oct 2 19:18:16.978966 env[1632]: 2023-10-02 19:18:16.911 [INFO][4848] utils.go 196: Calico CNI releasing IP address ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Oct 2 19:18:16.978966 env[1632]: 2023-10-02 19:18:16.958 [INFO][4854] ipam_plugin.go 416: Releasing address using handleID ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" HandleID="k8s-pod-network.62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Workload="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:16.978966 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:16.978966 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:16.978966 env[1632]: 2023-10-02 19:18:16.970 [WARNING][4854] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" HandleID="k8s-pod-network.62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Workload="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:16.978966 env[1632]: 2023-10-02 19:18:16.970 [INFO][4854] ipam_plugin.go 444: Releasing address using workloadID ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" HandleID="k8s-pod-network.62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Workload="ip--172--31--27--212-k8s-csi--node--driver--swqx9-eth0" Oct 2 19:18:16.978966 env[1632]: time="2023-10-02T19:18:16Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:16.978966 env[1632]: 2023-10-02 19:18:16.977 [INFO][4848] k8s.go 589: Teardown processing complete. ContainerID="62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652" Oct 2 19:18:16.978966 env[1632]: time="2023-10-02T19:18:16.978922764Z" level=info msg="TearDown network for sandbox \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\" successfully" Oct 2 19:18:16.983333 env[1632]: time="2023-10-02T19:18:16.983134708Z" level=info msg="RemovePodSandbox \"62394da52ef1487d4f900d7b0bfb1e11b6bcc33b48c8717d757c5c3f7d84f652\" returns successfully" Oct 2 19:18:16.984096 env[1632]: time="2023-10-02T19:18:16.984067385Z" level=info msg="StopPodSandbox for \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\"" Oct 2 19:18:17.123968 env[1632]: 2023-10-02 19:18:17.036 [WARNING][4872] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"32a66284-edb9-4f52-84a1-ade5bfe7b780", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4", Pod:"coredns-5d78c9869d-476mp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.0.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calice1afb656fe", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:17.123968 env[1632]: 2023-10-02 19:18:17.037 [INFO][4872] k8s.go 576: Cleaning up netns ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Oct 2 19:18:17.123968 env[1632]: 2023-10-02 19:18:17.037 [INFO][4872] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" iface="eth0" netns="" Oct 2 19:18:17.123968 env[1632]: 2023-10-02 19:18:17.037 [INFO][4872] k8s.go 583: Releasing IP address(es) ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Oct 2 19:18:17.123968 env[1632]: 2023-10-02 19:18:17.037 [INFO][4872] utils.go 196: Calico CNI releasing IP address ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Oct 2 19:18:17.123968 env[1632]: 2023-10-02 19:18:17.096 [INFO][4878] ipam_plugin.go 416: Releasing address using handleID ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" HandleID="k8s-pod-network.49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:17.123968 env[1632]: time="2023-10-02T19:18:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:17.123968 env[1632]: time="2023-10-02T19:18:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:17.123968 env[1632]: 2023-10-02 19:18:17.103 [WARNING][4878] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" HandleID="k8s-pod-network.49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:17.123968 env[1632]: 2023-10-02 19:18:17.103 [INFO][4878] ipam_plugin.go 444: Releasing address using workloadID ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" HandleID="k8s-pod-network.49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:17.123968 env[1632]: time="2023-10-02T19:18:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:17.123968 env[1632]: 2023-10-02 19:18:17.121 [INFO][4872] k8s.go 589: Teardown processing complete. ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Oct 2 19:18:17.125632 env[1632]: time="2023-10-02T19:18:17.123931578Z" level=info msg="TearDown network for sandbox \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\" successfully" Oct 2 19:18:17.125728 env[1632]: time="2023-10-02T19:18:17.125638755Z" level=info msg="StopPodSandbox for \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\" returns successfully" Oct 2 19:18:17.126165 env[1632]: time="2023-10-02T19:18:17.126135573Z" level=info msg="RemovePodSandbox for \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\"" Oct 2 19:18:17.126369 env[1632]: time="2023-10-02T19:18:17.126172330Z" level=info msg="Forcibly stopping sandbox \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\"" Oct 2 19:18:17.241590 env[1632]: 2023-10-02 19:18:17.196 [WARNING][4898] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"32a66284-edb9-4f52-84a1-ade5bfe7b780", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 17, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"61ddc7a4804907c122074bffba2199a7e9b5b35f6f019c04c58603a07d937df4", Pod:"coredns-5d78c9869d-476mp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.0.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calice1afb656fe", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:17.241590 env[1632]: 2023-10-02 19:18:17.197 [INFO][4898] k8s.go 576: Cleaning up netns ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Oct 2 19:18:17.241590 env[1632]: 2023-10-02 19:18:17.197 [INFO][4898] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" iface="eth0" netns="" Oct 2 19:18:17.241590 env[1632]: 2023-10-02 19:18:17.197 [INFO][4898] k8s.go 583: Releasing IP address(es) ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Oct 2 19:18:17.241590 env[1632]: 2023-10-02 19:18:17.197 [INFO][4898] utils.go 196: Calico CNI releasing IP address ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Oct 2 19:18:17.241590 env[1632]: 2023-10-02 19:18:17.227 [INFO][4904] ipam_plugin.go 416: Releasing address using handleID ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" HandleID="k8s-pod-network.49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:17.241590 env[1632]: time="2023-10-02T19:18:17Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:17.241590 env[1632]: time="2023-10-02T19:18:17Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:17.241590 env[1632]: 2023-10-02 19:18:17.235 [WARNING][4904] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" HandleID="k8s-pod-network.49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:17.241590 env[1632]: 2023-10-02 19:18:17.235 [INFO][4904] ipam_plugin.go 444: Releasing address using workloadID ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" HandleID="k8s-pod-network.49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Workload="ip--172--31--27--212-k8s-coredns--5d78c9869d--476mp-eth0" Oct 2 19:18:17.241590 env[1632]: time="2023-10-02T19:18:17Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:17.241590 env[1632]: 2023-10-02 19:18:17.239 [INFO][4898] k8s.go 589: Teardown processing complete. ContainerID="49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64" Oct 2 19:18:17.242260 env[1632]: time="2023-10-02T19:18:17.242145502Z" level=info msg="TearDown network for sandbox \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\" successfully" Oct 2 19:18:17.246612 env[1632]: time="2023-10-02T19:18:17.246562709Z" level=info msg="RemovePodSandbox \"49e40c45633aa68361268af28d7e71301ad0be384190a59c7c2f45da8d525d64\" returns successfully" Oct 2 19:18:19.473854 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.a2e0FG.mount: Deactivated successfully. Oct 2 19:18:19.521482 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.CRTjgl.mount: Deactivated successfully. Oct 2 19:18:24.217436 env[1632]: time="2023-10-02T19:18:24.217391193Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:18:24.422420 env[1632]: time="2023-10-02T19:18:24.422347063Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:18:24.423829 env[1632]: time="2023-10-02T19:18:24.423743993Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:18:24.424145 kubelet[2831]: E1002 19:18:24.424122 2831 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:18:24.424538 kubelet[2831]: E1002 19:18:24.424187 2831 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:18:24.424538 kubelet[2831]: E1002 19:18:24.424334 2831 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-m6vrn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-swqx9_calico-system(ddf8d927-2e24-4d63-8790-6f900827a156): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:18:24.426187 env[1632]: time="2023-10-02T19:18:24.426077155Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:18:24.603626 env[1632]: time="2023-10-02T19:18:24.603479482Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:18:24.605559 env[1632]: time="2023-10-02T19:18:24.605504854Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:18:24.605874 kubelet[2831]: E1002 19:18:24.605843 2831 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:18:24.605987 kubelet[2831]: E1002 19:18:24.605912 2831 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:18:24.606059 kubelet[2831]: E1002 19:18:24.606040 2831 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-m6vrn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-swqx9_calico-system(ddf8d927-2e24-4d63-8790-6f900827a156): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:18:24.606207 kubelet[2831]: E1002 19:18:24.606116 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-swqx9" podUID=ddf8d927-2e24-4d63-8790-6f900827a156 Oct 2 19:18:24.667729 systemd[1]: Started sshd@8-172.31.27.212:22-139.178.89.65:58330.service. Oct 2 19:18:24.677453 kernel: kauditd_printk_skb: 31 callbacks suppressed Oct 2 19:18:24.677777 kernel: audit: type=1130 audit(1696274304.668:1354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.212:22-139.178.89.65:58330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:24.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.212:22-139.178.89.65:58330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:24.865894 kernel: audit: type=1101 audit(1696274304.855:1355): pid=4957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:24.855000 audit[4957]: USER_ACCT pid=4957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:24.866213 sshd[4957]: Accepted publickey for core from 139.178.89.65 port 58330 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:18:24.866000 audit[4957]: CRED_ACQ pid=4957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:24.868229 sshd[4957]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:24.875004 kernel: audit: type=1103 audit(1696274304.866:1356): pid=4957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:24.879924 kernel: audit: type=1006 audit(1696274304.866:1357): pid=4957 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Oct 2 19:18:24.866000 audit[4957]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd0875960 a2=3 a3=0 items=0 ppid=1 pid=4957 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:24.884286 systemd[1]: Started session-9.scope. Oct 2 19:18:24.888943 kernel: audit: type=1300 audit(1696274304.866:1357): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd0875960 a2=3 a3=0 items=0 ppid=1 pid=4957 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:24.885844 systemd-logind[1626]: New session 9 of user core. Oct 2 19:18:24.866000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:24.892958 kernel: audit: type=1327 audit(1696274304.866:1357): proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:24.895000 audit[4957]: USER_START pid=4957 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:24.904959 kernel: audit: type=1105 audit(1696274304.895:1358): pid=4957 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:24.903000 audit[4959]: CRED_ACQ pid=4959 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:24.913031 kernel: audit: type=1103 audit(1696274304.903:1359): pid=4959 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:25.149656 sshd[4957]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:25.159000 audit[4957]: USER_END pid=4957 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:25.167888 kernel: audit: type=1106 audit(1696274305.159:1360): pid=4957 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:25.167000 audit[4957]: CRED_DISP pid=4957 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:25.174897 kernel: audit: type=1104 audit(1696274305.167:1361): pid=4957 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:25.176994 systemd[1]: sshd@8-172.31.27.212:22-139.178.89.65:58330.service: Deactivated successfully. Oct 2 19:18:25.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.212:22-139.178.89.65:58330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:25.178938 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:18:25.181185 systemd-logind[1626]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:18:25.183310 systemd-logind[1626]: Removed session 9. Oct 2 19:18:25.864000 audit[2525]: AVC avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:25.864000 audit[2525]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026361e0 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:18:25.864000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:25.868000 audit[2525]: AVC avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:25.868000 audit[2525]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002636200 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:18:25.868000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:25.875000 audit[2525]: AVC avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:25.875000 audit[2525]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002636320 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:18:25.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:25.877000 audit[2525]: AVC avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:25.877000 audit[2525]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002636340 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:18:25.877000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:26.229315 systemd[1]: run-containerd-runc-k8s.io-5cc8377b8aa0c7ff66809a361dda2d9ccd2b7434cbfeede3ddc5650c2a5acf23-runc.yYZSjo.mount: Deactivated successfully. Oct 2 19:18:29.469566 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.ImKMYH.mount: Deactivated successfully. Oct 2 19:18:29.507995 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.WMCb86.mount: Deactivated successfully. Oct 2 19:18:35.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.212:22-139.178.89.65:36414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:35.150222 systemd[1]: Started sshd@9-172.31.27.212:22-139.178.89.65:36414.service. Oct 2 19:18:35.151634 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 2 19:18:35.155102 kernel: audit: type=1130 audit(1696274315.149:1367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.212:22-139.178.89.65:36414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:35.219425 kubelet[2831]: E1002 19:18:35.219395 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-swqx9" podUID=ddf8d927-2e24-4d63-8790-6f900827a156 Oct 2 19:18:35.312000 audit[5051]: USER_ACCT pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:35.319275 sshd[5051]: Accepted publickey for core from 139.178.89.65 port 36414 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:18:35.321071 kernel: audit: type=1101 audit(1696274315.312:1368): pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:35.320000 audit[5051]: CRED_ACQ pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:35.321758 sshd[5051]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:35.335175 kernel: audit: type=1103 audit(1696274315.320:1369): pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:35.335295 kernel: audit: type=1006 audit(1696274315.320:1370): pid=5051 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 19:18:35.336997 systemd[1]: Started session-10.scope. Oct 2 19:18:35.344398 systemd-logind[1626]: New session 10 of user core. Oct 2 19:18:35.320000 audit[5051]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff92b533d0 a2=3 a3=0 items=0 ppid=1 pid=5051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:35.320000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:35.363397 kernel: audit: type=1300 audit(1696274315.320:1370): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff92b533d0 a2=3 a3=0 items=0 ppid=1 pid=5051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:35.363519 kernel: audit: type=1327 audit(1696274315.320:1370): proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:35.363540 kernel: audit: type=1105 audit(1696274315.354:1371): pid=5051 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:35.354000 audit[5051]: USER_START pid=5051 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:35.358000 audit[5053]: CRED_ACQ pid=5053 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:35.380902 kernel: audit: type=1103 audit(1696274315.358:1372): pid=5053 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:35.635140 sshd[5051]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:35.638000 audit[5051]: USER_END pid=5051 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:35.639000 audit[5051]: CRED_DISP pid=5051 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:35.648010 systemd[1]: sshd@9-172.31.27.212:22-139.178.89.65:36414.service: Deactivated successfully. Oct 2 19:18:35.648992 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:18:35.651069 systemd-logind[1626]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:18:35.652740 kernel: audit: type=1106 audit(1696274315.638:1373): pid=5051 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:35.652874 kernel: audit: type=1104 audit(1696274315.639:1374): pid=5051 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:35.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.212:22-139.178.89.65:36414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:35.653784 systemd-logind[1626]: Removed session 10. Oct 2 19:18:35.670304 systemd[1]: Started sshd@10-172.31.27.212:22-139.178.89.65:36422.service. Oct 2 19:18:35.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.212:22-139.178.89.65:36422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:35.858000 audit[5065]: USER_ACCT pid=5065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:35.859501 sshd[5065]: Accepted publickey for core from 139.178.89.65 port 36422 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:18:35.862000 audit[5065]: CRED_ACQ pid=5065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:35.862000 audit[5065]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd62a54eb0 a2=3 a3=0 items=0 ppid=1 pid=5065 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:35.862000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:35.864017 sshd[5065]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:35.873514 systemd-logind[1626]: New session 11 of user core. Oct 2 19:18:35.874589 systemd[1]: Started session-11.scope. Oct 2 19:18:35.883000 audit[5065]: USER_START pid=5065 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:35.886000 audit[5067]: CRED_ACQ pid=5067 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:37.810597 sshd[5065]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:37.811000 audit[5065]: USER_END pid=5065 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:37.812000 audit[5065]: CRED_DISP pid=5065 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:37.822021 systemd[1]: sshd@10-172.31.27.212:22-139.178.89.65:36422.service: Deactivated successfully. Oct 2 19:18:37.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.212:22-139.178.89.65:36422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:37.823668 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:18:37.823821 systemd-logind[1626]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:18:37.826093 systemd-logind[1626]: Removed session 11. Oct 2 19:18:37.850680 systemd[1]: Started sshd@11-172.31.27.212:22-139.178.89.65:60358.service. Oct 2 19:18:37.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.212:22-139.178.89.65:60358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:38.023000 audit[5099]: USER_ACCT pid=5099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:38.025594 sshd[5099]: Accepted publickey for core from 139.178.89.65 port 60358 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:18:38.025000 audit[5099]: CRED_ACQ pid=5099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:38.025000 audit[5099]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9ac6bab0 a2=3 a3=0 items=0 ppid=1 pid=5099 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:38.025000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:38.027103 sshd[5099]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:38.034991 systemd-logind[1626]: New session 12 of user core. Oct 2 19:18:38.035696 systemd[1]: Started session-12.scope. Oct 2 19:18:38.043000 audit[5099]: USER_START pid=5099 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:38.044000 audit[5101]: CRED_ACQ pid=5101 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:38.338897 sshd[5099]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:38.339000 audit[5099]: USER_END pid=5099 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:38.340000 audit[5099]: CRED_DISP pid=5099 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:38.345837 systemd-logind[1626]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:18:38.346947 systemd[1]: sshd@11-172.31.27.212:22-139.178.89.65:60358.service: Deactivated successfully. Oct 2 19:18:38.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.212:22-139.178.89.65:60358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:38.348277 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:18:38.348950 systemd-logind[1626]: Removed session 12. Oct 2 19:18:39.476014 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.qFWOT3.mount: Deactivated successfully. Oct 2 19:18:39.533868 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.jbYjEn.mount: Deactivated successfully. Oct 2 19:18:46.239586 env[1632]: time="2023-10-02T19:18:46.239540306Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:18:46.247758 systemd[1]: run-containerd-runc-k8s.io-5cc8377b8aa0c7ff66809a361dda2d9ccd2b7434cbfeede3ddc5650c2a5acf23-runc.WzEo9O.mount: Deactivated successfully. Oct 2 19:18:46.447626 env[1632]: time="2023-10-02T19:18:46.447579173Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:18:46.449137 env[1632]: time="2023-10-02T19:18:46.449090686Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:18:46.449280 kubelet[2831]: E1002 19:18:46.449262 2831 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:18:46.449657 kubelet[2831]: E1002 19:18:46.449302 2831 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:18:46.449657 kubelet[2831]: E1002 19:18:46.449411 2831 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-m6vrn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-swqx9_calico-system(ddf8d927-2e24-4d63-8790-6f900827a156): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:18:46.450672 env[1632]: time="2023-10-02T19:18:46.450628613Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:18:46.750537 env[1632]: time="2023-10-02T19:18:46.750464302Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:18:46.751956 env[1632]: time="2023-10-02T19:18:46.751902892Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:18:46.752259 kubelet[2831]: E1002 19:18:46.752232 2831 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:18:46.752382 kubelet[2831]: E1002 19:18:46.752293 2831 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:18:46.753206 kubelet[2831]: E1002 19:18:46.753182 2831 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-m6vrn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-swqx9_calico-system(ddf8d927-2e24-4d63-8790-6f900827a156): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:18:46.753359 kubelet[2831]: E1002 19:18:46.753259 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-swqx9" podUID=ddf8d927-2e24-4d63-8790-6f900827a156 Oct 2 19:18:48.369711 systemd[1]: Started sshd@12-172.31.27.212:22-139.178.89.65:58160.service. Oct 2 19:18:48.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.212:22-139.178.89.65:58160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:48.392197 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:18:48.394480 kernel: audit: type=1130 audit(1696274328.369:1394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.212:22-139.178.89.65:58160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:48.569000 audit[5174]: USER_ACCT pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:48.577702 sshd[5174]: Accepted publickey for core from 139.178.89.65 port 58160 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:18:48.578173 kernel: audit: type=1101 audit(1696274328.569:1395): pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:48.576000 audit[5174]: CRED_ACQ pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:48.578960 sshd[5174]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:48.588603 systemd[1]: Started session-13.scope. Oct 2 19:18:48.589744 kernel: audit: type=1103 audit(1696274328.576:1396): pid=5174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:48.589800 kernel: audit: type=1006 audit(1696274328.576:1397): pid=5174 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 2 19:18:48.589829 kernel: audit: type=1300 audit(1696274328.576:1397): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda91b2a50 a2=3 a3=0 items=0 ppid=1 pid=5174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:48.576000 audit[5174]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda91b2a50 a2=3 a3=0 items=0 ppid=1 pid=5174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:48.591344 systemd-logind[1626]: New session 13 of user core. Oct 2 19:18:48.576000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:48.604629 kernel: audit: type=1327 audit(1696274328.576:1397): proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:48.605000 audit[5174]: USER_START pid=5174 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:48.610000 audit[5176]: CRED_ACQ pid=5176 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:48.619114 kernel: audit: type=1105 audit(1696274328.605:1398): pid=5174 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:48.619353 kernel: audit: type=1103 audit(1696274328.610:1399): pid=5176 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:48.826987 sshd[5174]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:48.829000 audit[5174]: USER_END pid=5174 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:48.839898 kernel: audit: type=1106 audit(1696274328.829:1400): pid=5174 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:48.840320 systemd[1]: sshd@12-172.31.27.212:22-139.178.89.65:58160.service: Deactivated successfully. Oct 2 19:18:48.843052 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:18:48.829000 audit[5174]: CRED_DISP pid=5174 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:48.846329 systemd-logind[1626]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:18:48.848211 systemd-logind[1626]: Removed session 13. Oct 2 19:18:48.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.212:22-139.178.89.65:58160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:48.852990 kernel: audit: type=1104 audit(1696274328.829:1401): pid=5174 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:18:49.469414 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.HnbYSF.mount: Deactivated successfully. Oct 2 19:18:50.572476 kubelet[2831]: I1002 19:18:50.572417 2831 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:18:50.581711 systemd[1]: Created slice kubepods-besteffort-podd01a1e7d_55da_423d_b6fe_02b3a655dcba.slice. Oct 2 19:18:50.616317 kubelet[2831]: I1002 19:18:50.616273 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d01a1e7d-55da-423d-b6fe-02b3a655dcba-calico-apiserver-certs\") pod \"calico-apiserver-5494f4c47-hqtzd\" (UID: \"d01a1e7d-55da-423d-b6fe-02b3a655dcba\") " pod="calico-apiserver/calico-apiserver-5494f4c47-hqtzd" Oct 2 19:18:50.616511 kubelet[2831]: I1002 19:18:50.616442 2831 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-px6xr\" (UniqueName: \"kubernetes.io/projected/d01a1e7d-55da-423d-b6fe-02b3a655dcba-kube-api-access-px6xr\") pod \"calico-apiserver-5494f4c47-hqtzd\" (UID: \"d01a1e7d-55da-423d-b6fe-02b3a655dcba\") " pod="calico-apiserver/calico-apiserver-5494f4c47-hqtzd" Oct 2 19:18:50.710000 audit[5226]: NETFILTER_CFG table=filter:112 family=2 entries=9 op=nft_register_rule pid=5226 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:50.710000 audit[5226]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe549a8220 a2=0 a3=7ffe549a820c items=0 ppid=3006 pid=5226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.710000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:50.714000 audit[5226]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=5226 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:50.714000 audit[5226]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe549a8220 a2=0 a3=7ffe549a820c items=0 ppid=3006 pid=5226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.714000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:50.720809 kubelet[2831]: E1002 19:18:50.720771 2831 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Oct 2 19:18:50.723302 kubelet[2831]: E1002 19:18:50.723275 2831 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/d01a1e7d-55da-423d-b6fe-02b3a655dcba-calico-apiserver-certs podName:d01a1e7d-55da-423d-b6fe-02b3a655dcba nodeName:}" failed. No retries permitted until 2023-10-02 19:18:51.221253512 +0000 UTC m=+95.259574900 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/d01a1e7d-55da-423d-b6fe-02b3a655dcba-calico-apiserver-certs") pod "calico-apiserver-5494f4c47-hqtzd" (UID: "d01a1e7d-55da-423d-b6fe-02b3a655dcba") : secret "calico-apiserver-certs" not found Oct 2 19:18:50.767000 audit[5229]: NETFILTER_CFG table=filter:114 family=2 entries=10 op=nft_register_rule pid=5229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:50.767000 audit[5229]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe893dcaa0 a2=0 a3=7ffe893dca8c items=0 ppid=3006 pid=5229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.767000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:50.773000 audit[5229]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=5229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:50.773000 audit[5229]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe893dcaa0 a2=0 a3=7ffe893dca8c items=0 ppid=3006 pid=5229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:50.773000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:51.486558 env[1632]: time="2023-10-02T19:18:51.486393323Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5494f4c47-hqtzd,Uid:d01a1e7d-55da-423d-b6fe-02b3a655dcba,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:18:51.780288 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali05b4def5a6d: link becomes ready Oct 2 19:18:51.779615 (udev-worker)[5248]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:18:51.781478 systemd-networkd[1446]: cali05b4def5a6d: Link UP Oct 2 19:18:51.781794 systemd-networkd[1446]: cali05b4def5a6d: Gained carrier Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.620 [INFO][5231] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--212-k8s-calico--apiserver--5494f4c47--hqtzd-eth0 calico-apiserver-5494f4c47- calico-apiserver d01a1e7d-55da-423d-b6fe-02b3a655dcba 1039 0 2023-10-02 19:18:50 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5494f4c47 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-27-212 calico-apiserver-5494f4c47-hqtzd eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali05b4def5a6d [] []}} ContainerID="34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" Namespace="calico-apiserver" Pod="calico-apiserver-5494f4c47-hqtzd" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--apiserver--5494f4c47--hqtzd-" Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.620 [INFO][5231] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" Namespace="calico-apiserver" Pod="calico-apiserver-5494f4c47-hqtzd" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--apiserver--5494f4c47--hqtzd-eth0" Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.684 [INFO][5242] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" HandleID="k8s-pod-network.34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" Workload="ip--172--31--27--212-k8s-calico--apiserver--5494f4c47--hqtzd-eth0" Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.700 [INFO][5242] ipam_plugin.go 269: Auto assigning IP ContainerID="34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" HandleID="k8s-pod-network.34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" Workload="ip--172--31--27--212-k8s-calico--apiserver--5494f4c47--hqtzd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004d860), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-27-212", "pod":"calico-apiserver-5494f4c47-hqtzd", "timestamp":"2023-10-02 19:18:51.684174231 +0000 UTC"}, Hostname:"ip-172-31-27-212", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:18:51.803791 env[1632]: time="2023-10-02T19:18:51Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:18:51.803791 env[1632]: time="2023-10-02T19:18:51Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.700 [INFO][5242] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-212' Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.704 [INFO][5242] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" host="ip-172-31-27-212" Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.711 [INFO][5242] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-212" Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.717 [INFO][5242] ipam.go 489: Trying affinity for 192.168.0.192/26 host="ip-172-31-27-212" Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.719 [INFO][5242] ipam.go 155: Attempting to load block cidr=192.168.0.192/26 host="ip-172-31-27-212" Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.736 [INFO][5242] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.0.192/26 host="ip-172-31-27-212" Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.736 [INFO][5242] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.0.192/26 handle="k8s-pod-network.34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" host="ip-172-31-27-212" Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.739 [INFO][5242] ipam.go 1682: Creating new handle: k8s-pod-network.34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.746 [INFO][5242] ipam.go 1203: Writing block in order to claim IPs block=192.168.0.192/26 handle="k8s-pod-network.34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" host="ip-172-31-27-212" Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.757 [INFO][5242] ipam.go 1216: Successfully claimed IPs: [192.168.0.197/26] block=192.168.0.192/26 handle="k8s-pod-network.34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" host="ip-172-31-27-212" Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.757 [INFO][5242] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.0.197/26] handle="k8s-pod-network.34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" host="ip-172-31-27-212" Oct 2 19:18:51.803791 env[1632]: time="2023-10-02T19:18:51Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:18:51.803791 env[1632]: 2023-10-02 19:18:51.758 [INFO][5242] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.0.197/26] IPv6=[] ContainerID="34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" HandleID="k8s-pod-network.34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" Workload="ip--172--31--27--212-k8s-calico--apiserver--5494f4c47--hqtzd-eth0" Oct 2 19:18:51.805526 env[1632]: 2023-10-02 19:18:51.763 [INFO][5231] k8s.go 383: Populated endpoint ContainerID="34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" Namespace="calico-apiserver" Pod="calico-apiserver-5494f4c47-hqtzd" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--apiserver--5494f4c47--hqtzd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-calico--apiserver--5494f4c47--hqtzd-eth0", GenerateName:"calico-apiserver-5494f4c47-", Namespace:"calico-apiserver", SelfLink:"", UID:"d01a1e7d-55da-423d-b6fe-02b3a655dcba", ResourceVersion:"1039", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 18, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5494f4c47", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"", Pod:"calico-apiserver-5494f4c47-hqtzd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.0.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali05b4def5a6d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:51.805526 env[1632]: 2023-10-02 19:18:51.763 [INFO][5231] k8s.go 384: Calico CNI using IPs: [192.168.0.197/32] ContainerID="34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" Namespace="calico-apiserver" Pod="calico-apiserver-5494f4c47-hqtzd" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--apiserver--5494f4c47--hqtzd-eth0" Oct 2 19:18:51.805526 env[1632]: 2023-10-02 19:18:51.763 [INFO][5231] dataplane_linux.go 68: Setting the host side veth name to cali05b4def5a6d ContainerID="34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" Namespace="calico-apiserver" Pod="calico-apiserver-5494f4c47-hqtzd" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--apiserver--5494f4c47--hqtzd-eth0" Oct 2 19:18:51.805526 env[1632]: 2023-10-02 19:18:51.765 [INFO][5231] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" Namespace="calico-apiserver" Pod="calico-apiserver-5494f4c47-hqtzd" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--apiserver--5494f4c47--hqtzd-eth0" Oct 2 19:18:51.805526 env[1632]: 2023-10-02 19:18:51.779 [INFO][5231] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" Namespace="calico-apiserver" Pod="calico-apiserver-5494f4c47-hqtzd" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--apiserver--5494f4c47--hqtzd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--212-k8s-calico--apiserver--5494f4c47--hqtzd-eth0", GenerateName:"calico-apiserver-5494f4c47-", Namespace:"calico-apiserver", SelfLink:"", UID:"d01a1e7d-55da-423d-b6fe-02b3a655dcba", ResourceVersion:"1039", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 18, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5494f4c47", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-212", ContainerID:"34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc", Pod:"calico-apiserver-5494f4c47-hqtzd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.0.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali05b4def5a6d", MAC:"2a:6b:01:82:39:a6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:18:51.805526 env[1632]: 2023-10-02 19:18:51.800 [INFO][5231] k8s.go 489: Wrote updated endpoint to datastore ContainerID="34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc" Namespace="calico-apiserver" Pod="calico-apiserver-5494f4c47-hqtzd" WorkloadEndpoint="ip--172--31--27--212-k8s-calico--apiserver--5494f4c47--hqtzd-eth0" Oct 2 19:18:51.839639 env[1632]: time="2023-10-02T19:18:51.839514593Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:18:51.840261 env[1632]: time="2023-10-02T19:18:51.839652577Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:18:51.840261 env[1632]: time="2023-10-02T19:18:51.839721411Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:18:51.840261 env[1632]: time="2023-10-02T19:18:51.840169704Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc pid=5269 runtime=io.containerd.runc.v2 Oct 2 19:18:51.878610 systemd[1]: run-containerd-runc-k8s.io-34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc-runc.px49Nw.mount: Deactivated successfully. Oct 2 19:18:51.887981 systemd[1]: Started cri-containerd-34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc.scope. Oct 2 19:18:51.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.918000 audit: BPF prog-id=180 op=LOAD Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { bpf } for pid=5278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5269 pid=5278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334303032333938633563363535326531383464393234306633613139 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=5269 pid=5278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334303032333938633563363535326531383464393234306633613139 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { bpf } for pid=5278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { bpf } for pid=5278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { bpf } for pid=5278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { bpf } for pid=5278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { bpf } for pid=5278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit: BPF prog-id=181 op=LOAD Oct 2 19:18:51.919000 audit[5278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001fa9b0 items=0 ppid=5269 pid=5278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334303032333938633563363535326531383464393234306633613139 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { bpf } for pid=5278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { bpf } for pid=5278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { bpf } for pid=5278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { bpf } for pid=5278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit: BPF prog-id=182 op=LOAD Oct 2 19:18:51.919000 audit[5278]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001fa9f8 items=0 ppid=5269 pid=5278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334303032333938633563363535326531383464393234306633613139 Oct 2 19:18:51.919000 audit: BPF prog-id=182 op=UNLOAD Oct 2 19:18:51.919000 audit: BPF prog-id=181 op=UNLOAD Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { bpf } for pid=5278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { bpf } for pid=5278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { bpf } for pid=5278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { perfmon } for pid=5278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { bpf } for pid=5278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit[5278]: AVC avc: denied { bpf } for pid=5278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:18:51.919000 audit: BPF prog-id=183 op=LOAD Oct 2 19:18:51.919000 audit[5278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001fae08 items=0 ppid=5269 pid=5278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334303032333938633563363535326531383464393234306633613139 Oct 2 19:18:51.950000 audit[5300]: NETFILTER_CFG table=filter:116 family=2 entries=59 op=nft_register_chain pid=5300 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:18:51.950000 audit[5300]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffc1db0c340 a2=0 a3=7ffc1db0c32c items=0 ppid=3847 pid=5300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:51.950000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:18:51.983711 env[1632]: time="2023-10-02T19:18:51.983431457Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5494f4c47-hqtzd,Uid:d01a1e7d-55da-423d-b6fe-02b3a655dcba,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"34002398c5c6552e184d9240f3a190e04e5d0bf38d0ba7afa970dd2c8a8579cc\"" Oct 2 19:18:51.987886 env[1632]: time="2023-10-02T19:18:51.987040487Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:18:52.196231 env[1632]: time="2023-10-02T19:18:52.196165968Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:18:52.197552 env[1632]: time="2023-10-02T19:18:52.197497459Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:18:52.197996 kubelet[2831]: E1002 19:18:52.197971 2831 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:18:52.198412 kubelet[2831]: E1002 19:18:52.198019 2831 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:18:52.198412 kubelet[2831]: E1002 19:18:52.198166 2831 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-px6xr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-5494f4c47-hqtzd_calico-apiserver(d01a1e7d-55da-423d-b6fe-02b3a655dcba): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:18:52.198412 kubelet[2831]: E1002 19:18:52.198216 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5494f4c47-hqtzd" podUID=d01a1e7d-55da-423d-b6fe-02b3a655dcba Oct 2 19:18:52.665248 kubelet[2831]: E1002 19:18:52.665219 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5494f4c47-hqtzd" podUID=d01a1e7d-55da-423d-b6fe-02b3a655dcba Oct 2 19:18:52.697000 audit[5308]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=5308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:52.697000 audit[5308]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc795adb90 a2=0 a3=7ffc795adb7c items=0 ppid=3006 pid=5308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:52.697000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:52.699000 audit[5308]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=5308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:18:52.699000 audit[5308]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc795adb90 a2=0 a3=7ffc795adb7c items=0 ppid=3006 pid=5308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:52.699000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:18:53.665699 kubelet[2831]: E1002 19:18:53.665668 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5494f4c47-hqtzd" podUID=d01a1e7d-55da-423d-b6fe-02b3a655dcba Oct 2 19:18:53.800078 systemd-networkd[1446]: cali05b4def5a6d: Gained IPv6LL Oct 2 19:18:56.213748 systemd[1]: run-containerd-runc-k8s.io-5cc8377b8aa0c7ff66809a361dda2d9ccd2b7434cbfeede3ddc5650c2a5acf23-runc.AsHZNl.mount: Deactivated successfully. Oct 2 19:18:59.482404 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.E6jltV.mount: Deactivated successfully. Oct 2 19:19:00.219273 kubelet[2831]: E1002 19:19:00.219246 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-swqx9" podUID=ddf8d927-2e24-4d63-8790-6f900827a156 Oct 2 19:19:00.467840 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.1VpOsI.mount: Deactivated successfully. Oct 2 19:19:06.232289 systemd[1]: run-containerd-runc-k8s.io-5cc8377b8aa0c7ff66809a361dda2d9ccd2b7434cbfeede3ddc5650c2a5acf23-runc.1tMOTl.mount: Deactivated successfully. Oct 2 19:19:08.222158 env[1632]: time="2023-10-02T19:19:08.222113558Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:19:08.406840 env[1632]: time="2023-10-02T19:19:08.406530918Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:08.409034 env[1632]: time="2023-10-02T19:19:08.408781847Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:08.410454 kubelet[2831]: E1002 19:19:08.410399 2831 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:19:08.411962 kubelet[2831]: E1002 19:19:08.410476 2831 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:19:08.411962 kubelet[2831]: E1002 19:19:08.410980 2831 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-px6xr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-5494f4c47-hqtzd_calico-apiserver(d01a1e7d-55da-423d-b6fe-02b3a655dcba): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:08.411962 kubelet[2831]: E1002 19:19:08.411573 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5494f4c47-hqtzd" podUID=d01a1e7d-55da-423d-b6fe-02b3a655dcba Oct 2 19:19:09.468925 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.7y0Ebc.mount: Deactivated successfully. Oct 2 19:19:09.527032 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.kR8QYj.mount: Deactivated successfully. Oct 2 19:19:10.787000 audit[2525]: AVC avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:10.790088 kernel: kauditd_printk_skb: 79 callbacks suppressed Oct 2 19:19:10.790897 kernel: audit: type=1400 audit(1696274350.787:1428): avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:10.787000 audit[2525]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002093f80 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:19:10.805571 kernel: audit: type=1300 audit(1696274350.787:1428): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002093f80 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:19:10.787000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:10.802000 audit[2525]: AVC avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:10.818500 kernel: audit: type=1327 audit(1696274350.787:1428): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:10.818634 kernel: audit: type=1400 audit(1696274350.802:1429): avc: denied { watch } for pid=2525 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:10.818685 kernel: audit: type=1300 audit(1696274350.802:1429): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015fd720 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:19:10.802000 audit[2525]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015fd720 a2=fc6 a3=0 items=0 ppid=2371 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:19:10.802000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:10.831978 kernel: audit: type=1327 audit(1696274350.802:1429): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:12.219373 kubelet[2831]: E1002 19:19:12.219344 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-swqx9" podUID=ddf8d927-2e24-4d63-8790-6f900827a156 Oct 2 19:19:12.218000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:12.218000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0082906c0 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:19:12.233221 kernel: audit: type=1400 audit(1696274352.218:1430): avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:12.233371 kernel: audit: type=1300 audit(1696274352.218:1430): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0082906c0 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:19:12.233407 kernel: audit: type=1327 audit(1696274352.218:1430): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:19:12.218000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:19:12.218000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:12.245409 kernel: audit: type=1400 audit(1696274352.218:1431): avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:12.218000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c003d0d920 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:19:12.218000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:19:12.218000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:12.218000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0148d2cc0 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:19:12.218000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:19:12.232000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:12.232000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c003a42b70 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:19:12.232000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:19:12.266000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:12.266000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c000fdbd40 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:19:12.266000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:19:12.266000 audit[2483]: AVC avc: denied { watch } for pid=2483 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:12.266000 audit[2483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0075cf7a0 a2=fc6 a3=0 items=0 ppid=2341 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c9,c661 key=(null) Oct 2 19:19:12.266000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:19:16.210514 systemd[1]: run-containerd-runc-k8s.io-5cc8377b8aa0c7ff66809a361dda2d9ccd2b7434cbfeede3ddc5650c2a5acf23-runc.5iEihI.mount: Deactivated successfully. Oct 2 19:19:16.344760 systemd[1]: run-containerd-runc-k8s.io-5cc8377b8aa0c7ff66809a361dda2d9ccd2b7434cbfeede3ddc5650c2a5acf23-runc.6uwxUV.mount: Deactivated successfully. Oct 2 19:19:19.481803 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.LEF1mT.mount: Deactivated successfully. Oct 2 19:19:19.551071 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.UN4uA9.mount: Deactivated successfully. Oct 2 19:19:20.217576 kubelet[2831]: E1002 19:19:20.217549 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5494f4c47-hqtzd" podUID=d01a1e7d-55da-423d-b6fe-02b3a655dcba Oct 2 19:19:23.464092 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 19:19:23.464297 kernel: audit: type=1334 audit(1696274363.456:1436): prog-id=123 op=UNLOAD Oct 2 19:19:23.456000 audit: BPF prog-id=123 op=UNLOAD Oct 2 19:19:23.456354 systemd[1]: cri-containerd-dff31c85853ed27dc971426c43b6d88f5c21a90f430b19726dcdec5b3a4d00b3.scope: Deactivated successfully. Oct 2 19:19:23.457828 systemd[1]: cri-containerd-dff31c85853ed27dc971426c43b6d88f5c21a90f430b19726dcdec5b3a4d00b3.scope: Consumed 2.901s CPU time. Oct 2 19:19:23.464000 audit: BPF prog-id=126 op=UNLOAD Oct 2 19:19:23.470939 kernel: audit: type=1334 audit(1696274363.464:1437): prog-id=126 op=UNLOAD Oct 2 19:19:23.496931 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dff31c85853ed27dc971426c43b6d88f5c21a90f430b19726dcdec5b3a4d00b3-rootfs.mount: Deactivated successfully. Oct 2 19:19:23.513605 env[1632]: time="2023-10-02T19:19:23.513553115Z" level=info msg="shim disconnected" id=dff31c85853ed27dc971426c43b6d88f5c21a90f430b19726dcdec5b3a4d00b3 Oct 2 19:19:23.513605 env[1632]: time="2023-10-02T19:19:23.513598838Z" level=warning msg="cleaning up after shim disconnected" id=dff31c85853ed27dc971426c43b6d88f5c21a90f430b19726dcdec5b3a4d00b3 namespace=k8s.io Oct 2 19:19:23.513605 env[1632]: time="2023-10-02T19:19:23.513610215Z" level=info msg="cleaning up dead shim" Oct 2 19:19:23.530376 env[1632]: time="2023-10-02T19:19:23.530327625Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:19:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5562 runtime=io.containerd.runc.v2\n" Oct 2 19:19:23.751840 kubelet[2831]: I1002 19:19:23.751334 2831 scope.go:115] "RemoveContainer" containerID="dff31c85853ed27dc971426c43b6d88f5c21a90f430b19726dcdec5b3a4d00b3" Oct 2 19:19:23.761336 env[1632]: time="2023-10-02T19:19:23.761277778Z" level=info msg="CreateContainer within sandbox \"f80c6ef4108c81db99cae8b3c73a6629e22258cb487f2ab95f4adbcbd341d6e6\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Oct 2 19:19:23.788041 env[1632]: time="2023-10-02T19:19:23.787989187Z" level=info msg="CreateContainer within sandbox \"f80c6ef4108c81db99cae8b3c73a6629e22258cb487f2ab95f4adbcbd341d6e6\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"c084963b051b824a517fc6b57ba4bf4f20a61d985ea65010d818315ffcd68ee0\"" Oct 2 19:19:23.788723 env[1632]: time="2023-10-02T19:19:23.788693247Z" level=info msg="StartContainer for \"c084963b051b824a517fc6b57ba4bf4f20a61d985ea65010d818315ffcd68ee0\"" Oct 2 19:19:23.829681 systemd[1]: Started cri-containerd-c084963b051b824a517fc6b57ba4bf4f20a61d985ea65010d818315ffcd68ee0.scope. Oct 2 19:19:23.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.858869 kernel: audit: type=1400 audit(1696274363.848:1438): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.859015 kernel: audit: type=1400 audit(1696274363.848:1439): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.859076 kernel: audit: type=1400 audit(1696274363.848:1440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.867790 kernel: audit: type=1400 audit(1696274363.848:1441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.868295 kernel: audit: type=1400 audit(1696274363.848:1442): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.883631 kernel: audit: type=1400 audit(1696274363.848:1443): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.884333 kernel: audit: type=1400 audit(1696274363.848:1444): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.848000 audit: BPF prog-id=184 op=LOAD Oct 2 19:19:23.849000 audit[5582]: AVC avc: denied { bpf } for pid=5582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.891272 kernel: audit: type=1400 audit(1696274363.848:1445): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.849000 audit[5582]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2948 pid=5582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:23.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330383439363362303531623832346135313766633662353762613462 Oct 2 19:19:23.849000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.849000 audit[5582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2948 pid=5582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:23.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330383439363362303531623832346135313766633662353762613462 Oct 2 19:19:23.849000 audit[5582]: AVC avc: denied { bpf } for pid=5582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.849000 audit[5582]: AVC avc: denied { bpf } for pid=5582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.849000 audit[5582]: AVC avc: denied { bpf } for pid=5582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.849000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.849000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.849000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.849000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.849000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.849000 audit[5582]: AVC avc: denied { bpf } for pid=5582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.849000 audit[5582]: AVC avc: denied { bpf } for pid=5582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.849000 audit: BPF prog-id=185 op=LOAD Oct 2 19:19:23.849000 audit[5582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000295540 items=0 ppid=2948 pid=5582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:23.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330383439363362303531623832346135313766633662353762613462 Oct 2 19:19:23.853000 audit[5582]: AVC avc: denied { bpf } for pid=5582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.853000 audit[5582]: AVC avc: denied { bpf } for pid=5582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.853000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.853000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.853000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.853000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.853000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.853000 audit[5582]: AVC avc: denied { bpf } for pid=5582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.853000 audit[5582]: AVC avc: denied { bpf } for pid=5582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.853000 audit: BPF prog-id=186 op=LOAD Oct 2 19:19:23.853000 audit[5582]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000295588 items=0 ppid=2948 pid=5582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:23.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330383439363362303531623832346135313766633662353762613462 Oct 2 19:19:23.858000 audit: BPF prog-id=186 op=UNLOAD Oct 2 19:19:23.858000 audit: BPF prog-id=185 op=UNLOAD Oct 2 19:19:23.858000 audit[5582]: AVC avc: denied { bpf } for pid=5582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.858000 audit[5582]: AVC avc: denied { bpf } for pid=5582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.858000 audit[5582]: AVC avc: denied { bpf } for pid=5582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.858000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.858000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.858000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.858000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.858000 audit[5582]: AVC avc: denied { perfmon } for pid=5582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.858000 audit[5582]: AVC avc: denied { bpf } for pid=5582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.858000 audit[5582]: AVC avc: denied { bpf } for pid=5582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:23.858000 audit: BPF prog-id=187 op=LOAD Oct 2 19:19:23.858000 audit[5582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000295998 items=0 ppid=2948 pid=5582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:23.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330383439363362303531623832346135313766633662353762613462 Oct 2 19:19:23.903082 env[1632]: time="2023-10-02T19:19:23.903030234Z" level=info msg="StartContainer for \"c084963b051b824a517fc6b57ba4bf4f20a61d985ea65010d818315ffcd68ee0\" returns successfully" Oct 2 19:19:24.174751 systemd[1]: cri-containerd-2e95edd57341057e94b0d019701c0910051322f0da05a2282ed038f9e05b0ed7.scope: Deactivated successfully. Oct 2 19:19:24.175213 systemd[1]: cri-containerd-2e95edd57341057e94b0d019701c0910051322f0da05a2282ed038f9e05b0ed7.scope: Consumed 3.198s CPU time. Oct 2 19:19:24.181000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:19:24.181000 audit: BPF prog-id=110 op=UNLOAD Oct 2 19:19:24.219093 kubelet[2831]: E1002 19:19:24.219065 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-swqx9" podUID=ddf8d927-2e24-4d63-8790-6f900827a156 Oct 2 19:19:24.234837 env[1632]: time="2023-10-02T19:19:24.234775501Z" level=info msg="shim disconnected" id=2e95edd57341057e94b0d019701c0910051322f0da05a2282ed038f9e05b0ed7 Oct 2 19:19:24.234837 env[1632]: time="2023-10-02T19:19:24.234822317Z" level=warning msg="cleaning up after shim disconnected" id=2e95edd57341057e94b0d019701c0910051322f0da05a2282ed038f9e05b0ed7 namespace=k8s.io Oct 2 19:19:24.234837 env[1632]: time="2023-10-02T19:19:24.234836223Z" level=info msg="cleaning up dead shim" Oct 2 19:19:24.245513 env[1632]: time="2023-10-02T19:19:24.245455437Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:19:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5623 runtime=io.containerd.runc.v2\n" Oct 2 19:19:24.497557 systemd[1]: run-containerd-runc-k8s.io-c084963b051b824a517fc6b57ba4bf4f20a61d985ea65010d818315ffcd68ee0-runc.MtSGZw.mount: Deactivated successfully. Oct 2 19:19:24.497704 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2e95edd57341057e94b0d019701c0910051322f0da05a2282ed038f9e05b0ed7-rootfs.mount: Deactivated successfully. Oct 2 19:19:24.755832 kubelet[2831]: I1002 19:19:24.755132 2831 scope.go:115] "RemoveContainer" containerID="2e95edd57341057e94b0d019701c0910051322f0da05a2282ed038f9e05b0ed7" Oct 2 19:19:24.765078 env[1632]: time="2023-10-02T19:19:24.764967390Z" level=info msg="CreateContainer within sandbox \"c8df99d5b43663ce7f925030efaee9d0242a2a07b9cb01d1332679a91331355c\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Oct 2 19:19:24.785581 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4123458463.mount: Deactivated successfully. Oct 2 19:19:24.791081 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3254529933.mount: Deactivated successfully. Oct 2 19:19:24.795605 env[1632]: time="2023-10-02T19:19:24.795525948Z" level=info msg="CreateContainer within sandbox \"c8df99d5b43663ce7f925030efaee9d0242a2a07b9cb01d1332679a91331355c\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"792d421c062cc3bdfc73b03d40c5cc6c041f3616f5f08bf9f52bc5df7f348abd\"" Oct 2 19:19:24.796280 env[1632]: time="2023-10-02T19:19:24.796247836Z" level=info msg="StartContainer for \"792d421c062cc3bdfc73b03d40c5cc6c041f3616f5f08bf9f52bc5df7f348abd\"" Oct 2 19:19:24.825962 systemd[1]: Started cri-containerd-792d421c062cc3bdfc73b03d40c5cc6c041f3616f5f08bf9f52bc5df7f348abd.scope. Oct 2 19:19:24.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.851000 audit: BPF prog-id=188 op=LOAD Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { bpf } for pid=5643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2371 pid=5643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:24.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739326434323163303632636333626466633733623033643430633563 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2371 pid=5643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:24.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739326434323163303632636333626466633733623033643430633563 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { bpf } for pid=5643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { bpf } for pid=5643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { bpf } for pid=5643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { bpf } for pid=5643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { bpf } for pid=5643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit: BPF prog-id=189 op=LOAD Oct 2 19:19:24.852000 audit[5643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003cab50 items=0 ppid=2371 pid=5643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:24.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739326434323163303632636333626466633733623033643430633563 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { bpf } for pid=5643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { bpf } for pid=5643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { bpf } for pid=5643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { bpf } for pid=5643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit: BPF prog-id=190 op=LOAD Oct 2 19:19:24.852000 audit[5643]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003cab98 items=0 ppid=2371 pid=5643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:24.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739326434323163303632636333626466633733623033643430633563 Oct 2 19:19:24.852000 audit: BPF prog-id=190 op=UNLOAD Oct 2 19:19:24.852000 audit: BPF prog-id=189 op=UNLOAD Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { bpf } for pid=5643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { bpf } for pid=5643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { bpf } for pid=5643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { perfmon } for pid=5643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { bpf } for pid=5643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit[5643]: AVC avc: denied { bpf } for pid=5643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:24.852000 audit: BPF prog-id=191 op=LOAD Oct 2 19:19:24.852000 audit[5643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003cafa8 items=0 ppid=2371 pid=5643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:24.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739326434323163303632636333626466633733623033643430633563 Oct 2 19:19:24.898632 env[1632]: time="2023-10-02T19:19:24.897114234Z" level=info msg="StartContainer for \"792d421c062cc3bdfc73b03d40c5cc6c041f3616f5f08bf9f52bc5df7f348abd\" returns successfully" Oct 2 19:19:26.119000 audit[5654]: AVC avc: denied { watch } for pid=5654 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:26.119000 audit[5654]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0006a21e0 a2=fc6 a3=0 items=0 ppid=2371 pid=5654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:19:26.119000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:26.120000 audit[5654]: AVC avc: denied { watch } for pid=5654 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:26.120000 audit[5654]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000430340 a2=fc6 a3=0 items=0 ppid=2371 pid=5654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c63,c93 key=(null) Oct 2 19:19:26.120000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:28.321469 kubelet[2831]: E1002 19:19:28.321430 2831 controller.go:193] "Failed to update lease" err="Put \"https://172.31.27.212:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-212?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 19:19:29.483573 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.pO5rE3.mount: Deactivated successfully. Oct 2 19:19:29.552002 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.elSjUW.mount: Deactivated successfully. Oct 2 19:19:29.695318 systemd[1]: cri-containerd-3386001bbff12df585f52967f38e72244863a083bf8b9d3d5e53a233ee2a09a6.scope: Deactivated successfully. Oct 2 19:19:29.696761 systemd[1]: cri-containerd-3386001bbff12df585f52967f38e72244863a083bf8b9d3d5e53a233ee2a09a6.scope: Consumed 1.801s CPU time. Oct 2 19:19:29.701000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:19:29.712727 kernel: kauditd_printk_skb: 114 callbacks suppressed Oct 2 19:19:29.712917 kernel: audit: type=1334 audit(1696274369.701:1478): prog-id=86 op=UNLOAD Oct 2 19:19:29.712974 kernel: audit: type=1334 audit(1696274369.701:1479): prog-id=94 op=UNLOAD Oct 2 19:19:29.701000 audit: BPF prog-id=94 op=UNLOAD Oct 2 19:19:29.770640 env[1632]: time="2023-10-02T19:19:29.770436258Z" level=info msg="shim disconnected" id=3386001bbff12df585f52967f38e72244863a083bf8b9d3d5e53a233ee2a09a6 Oct 2 19:19:29.770640 env[1632]: time="2023-10-02T19:19:29.770489356Z" level=warning msg="cleaning up after shim disconnected" id=3386001bbff12df585f52967f38e72244863a083bf8b9d3d5e53a233ee2a09a6 namespace=k8s.io Oct 2 19:19:29.770640 env[1632]: time="2023-10-02T19:19:29.770501579Z" level=info msg="cleaning up dead shim" Oct 2 19:19:29.786124 env[1632]: time="2023-10-02T19:19:29.786074803Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:19:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5748 runtime=io.containerd.runc.v2\n" Oct 2 19:19:30.477910 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3386001bbff12df585f52967f38e72244863a083bf8b9d3d5e53a233ee2a09a6-rootfs.mount: Deactivated successfully. Oct 2 19:19:30.780768 kubelet[2831]: I1002 19:19:30.780656 2831 scope.go:115] "RemoveContainer" containerID="3386001bbff12df585f52967f38e72244863a083bf8b9d3d5e53a233ee2a09a6" Oct 2 19:19:30.786001 env[1632]: time="2023-10-02T19:19:30.785553853Z" level=info msg="CreateContainer within sandbox \"bcb57faacf484a25747099cdc0a89efc6435e9eb98119b4a1e665b8c0a78b84f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Oct 2 19:19:30.837720 env[1632]: time="2023-10-02T19:19:30.837527689Z" level=info msg="CreateContainer within sandbox \"bcb57faacf484a25747099cdc0a89efc6435e9eb98119b4a1e665b8c0a78b84f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"a546adc6bf77d0a0a10dd0289b1305cd988ef63f64d2064a279279c9a2a29e08\"" Oct 2 19:19:30.839139 env[1632]: time="2023-10-02T19:19:30.839096798Z" level=info msg="StartContainer for \"a546adc6bf77d0a0a10dd0289b1305cd988ef63f64d2064a279279c9a2a29e08\"" Oct 2 19:19:30.902452 systemd[1]: Started cri-containerd-a546adc6bf77d0a0a10dd0289b1305cd988ef63f64d2064a279279c9a2a29e08.scope. Oct 2 19:19:30.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.936606 kernel: audit: type=1400 audit(1696274370.923:1480): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.936743 kernel: audit: type=1400 audit(1696274370.923:1481): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.948772 kernel: audit: type=1400 audit(1696274370.923:1482): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.949414 kernel: audit: type=1400 audit(1696274370.923:1483): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.949527 kernel: audit: type=1400 audit(1696274370.923:1484): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.959067 kernel: audit: type=1400 audit(1696274370.923:1485): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.959330 kernel: audit: type=1400 audit(1696274370.923:1486): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.969318 kernel: audit: type=1400 audit(1696274370.923:1487): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.930000 audit: BPF prog-id=192 op=LOAD Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { bpf } for pid=5769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2397 pid=5769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:30.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135343661646336626637376430613061313064643032383962313330 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=2397 pid=5769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:30.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135343661646336626637376430613061313064643032383962313330 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { bpf } for pid=5769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { bpf } for pid=5769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { bpf } for pid=5769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { bpf } for pid=5769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { bpf } for pid=5769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit: BPF prog-id=193 op=LOAD Oct 2 19:19:30.935000 audit[5769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0002a9600 items=0 ppid=2397 pid=5769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:30.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135343661646336626637376430613061313064643032383962313330 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { bpf } for pid=5769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { bpf } for pid=5769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { bpf } for pid=5769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit[5769]: AVC avc: denied { bpf } for pid=5769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.935000 audit: BPF prog-id=194 op=LOAD Oct 2 19:19:30.935000 audit[5769]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0002a9648 items=0 ppid=2397 pid=5769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:30.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135343661646336626637376430613061313064643032383962313330 Oct 2 19:19:30.936000 audit: BPF prog-id=194 op=UNLOAD Oct 2 19:19:30.936000 audit: BPF prog-id=193 op=UNLOAD Oct 2 19:19:30.936000 audit[5769]: AVC avc: denied { bpf } for pid=5769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.936000 audit[5769]: AVC avc: denied { bpf } for pid=5769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.936000 audit[5769]: AVC avc: denied { bpf } for pid=5769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.936000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.936000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.936000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.936000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.936000 audit[5769]: AVC avc: denied { perfmon } for pid=5769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.936000 audit[5769]: AVC avc: denied { bpf } for pid=5769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.936000 audit[5769]: AVC avc: denied { bpf } for pid=5769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:30.936000 audit: BPF prog-id=195 op=LOAD Oct 2 19:19:30.936000 audit[5769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c0002a9a58 items=0 ppid=2397 pid=5769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:30.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135343661646336626637376430613061313064643032383962313330 Oct 2 19:19:31.016823 env[1632]: time="2023-10-02T19:19:31.016772523Z" level=info msg="StartContainer for \"a546adc6bf77d0a0a10dd0289b1305cd988ef63f64d2064a279279c9a2a29e08\" returns successfully" Oct 2 19:19:31.478798 systemd[1]: run-containerd-runc-k8s.io-a546adc6bf77d0a0a10dd0289b1305cd988ef63f64d2064a279279c9a2a29e08-runc.MARJCl.mount: Deactivated successfully. Oct 2 19:19:35.217227 env[1632]: time="2023-10-02T19:19:35.217183986Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:19:35.400296 env[1632]: time="2023-10-02T19:19:35.400221640Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:35.401541 env[1632]: time="2023-10-02T19:19:35.401495167Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:35.401763 kubelet[2831]: E1002 19:19:35.401743 2831 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:19:35.402136 kubelet[2831]: E1002 19:19:35.401871 2831 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:19:35.402136 kubelet[2831]: E1002 19:19:35.402016 2831 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-px6xr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-5494f4c47-hqtzd_calico-apiserver(d01a1e7d-55da-423d-b6fe-02b3a655dcba): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:35.402620 kubelet[2831]: E1002 19:19:35.402583 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5494f4c47-hqtzd" podUID=d01a1e7d-55da-423d-b6fe-02b3a655dcba Oct 2 19:19:36.217530 systemd[1]: run-containerd-runc-k8s.io-5cc8377b8aa0c7ff66809a361dda2d9ccd2b7434cbfeede3ddc5650c2a5acf23-runc.0C4h5T.mount: Deactivated successfully. Oct 2 19:19:38.217879 env[1632]: time="2023-10-02T19:19:38.217820096Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:19:38.321982 kubelet[2831]: E1002 19:19:38.321887 2831 controller.go:193] "Failed to update lease" err="Put \"https://172.31.27.212:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-212?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 19:19:38.422879 env[1632]: time="2023-10-02T19:19:38.422758634Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:38.424746 env[1632]: time="2023-10-02T19:19:38.424684222Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:38.425181 kubelet[2831]: E1002 19:19:38.425154 2831 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:19:38.425309 kubelet[2831]: E1002 19:19:38.425199 2831 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:19:38.425365 kubelet[2831]: E1002 19:19:38.425323 2831 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-m6vrn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-swqx9_calico-system(ddf8d927-2e24-4d63-8790-6f900827a156): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:38.426620 env[1632]: time="2023-10-02T19:19:38.426581678Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:19:38.619162 env[1632]: time="2023-10-02T19:19:38.618998279Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:38.623885 env[1632]: time="2023-10-02T19:19:38.623804320Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:38.626730 kubelet[2831]: E1002 19:19:38.626700 2831 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:19:38.626974 kubelet[2831]: E1002 19:19:38.626752 2831 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:19:38.626974 kubelet[2831]: E1002 19:19:38.626852 2831 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-m6vrn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-swqx9_calico-system(ddf8d927-2e24-4d63-8790-6f900827a156): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:38.628000 kubelet[2831]: E1002 19:19:38.627006 2831 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-swqx9" podUID=ddf8d927-2e24-4d63-8790-6f900827a156 Oct 2 19:19:39.475358 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.PfClw5.mount: Deactivated successfully. Oct 2 19:19:39.513137 systemd[1]: run-containerd-runc-k8s.io-7d80b94a276cf00f62dc16e014824286121e3baf05e356fe0f6b62232b4ec365-runc.8Aj51N.mount: Deactivated successfully.