Oct 2 19:06:54.214940 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:06:54.214975 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:06:54.214991 kernel: BIOS-provided physical RAM map: Oct 2 19:06:54.215002 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 2 19:06:54.215013 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 2 19:06:54.215032 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 2 19:06:54.215049 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Oct 2 19:06:54.215061 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Oct 2 19:06:54.215072 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Oct 2 19:06:54.215084 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 2 19:06:54.215096 kernel: NX (Execute Disable) protection: active Oct 2 19:06:54.215108 kernel: SMBIOS 2.7 present. Oct 2 19:06:54.215120 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Oct 2 19:06:54.215132 kernel: Hypervisor detected: KVM Oct 2 19:06:54.215149 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 2 19:06:54.215162 kernel: kvm-clock: cpu 0, msr 4af8a001, primary cpu clock Oct 2 19:06:54.215175 kernel: kvm-clock: using sched offset of 7691547910 cycles Oct 2 19:06:54.215188 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 2 19:06:54.215201 kernel: tsc: Detected 2499.996 MHz processor Oct 2 19:06:54.215214 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:06:54.215230 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:06:54.215243 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Oct 2 19:06:54.215256 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:06:54.215268 kernel: Using GB pages for direct mapping Oct 2 19:06:54.215281 kernel: ACPI: Early table checksum verification disabled Oct 2 19:06:54.215294 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Oct 2 19:06:54.215307 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Oct 2 19:06:54.215337 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Oct 2 19:06:54.215348 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Oct 2 19:06:54.215361 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Oct 2 19:06:54.215371 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:06:54.215383 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Oct 2 19:06:54.215395 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Oct 2 19:06:54.215407 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Oct 2 19:06:54.215418 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Oct 2 19:06:54.215429 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Oct 2 19:06:54.215439 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Oct 2 19:06:54.215453 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Oct 2 19:06:54.215464 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Oct 2 19:06:54.215475 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Oct 2 19:06:54.215492 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Oct 2 19:06:54.215505 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Oct 2 19:06:54.215517 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Oct 2 19:06:54.215530 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Oct 2 19:06:54.215546 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Oct 2 19:06:54.215559 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Oct 2 19:06:54.215572 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Oct 2 19:06:54.215585 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:06:54.215597 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:06:54.215610 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Oct 2 19:06:54.215623 kernel: NUMA: Initialized distance table, cnt=1 Oct 2 19:06:54.215635 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Oct 2 19:06:54.215652 kernel: Zone ranges: Oct 2 19:06:54.215666 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:06:54.215679 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Oct 2 19:06:54.215691 kernel: Normal empty Oct 2 19:06:54.215704 kernel: Movable zone start for each node Oct 2 19:06:54.215716 kernel: Early memory node ranges Oct 2 19:06:54.215729 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 2 19:06:54.215742 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Oct 2 19:06:54.215754 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Oct 2 19:06:54.215770 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:06:54.215783 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 2 19:06:54.215795 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Oct 2 19:06:54.215810 kernel: ACPI: PM-Timer IO Port: 0xb008 Oct 2 19:06:54.215824 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 2 19:06:54.215837 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Oct 2 19:06:54.215850 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 2 19:06:54.215863 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:06:54.215877 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 2 19:06:54.215894 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 2 19:06:54.215907 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:06:54.215920 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 2 19:06:54.215932 kernel: TSC deadline timer available Oct 2 19:06:54.215944 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:06:54.215956 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Oct 2 19:06:54.215967 kernel: Booting paravirtualized kernel on KVM Oct 2 19:06:54.215979 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:06:54.215991 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:06:54.216007 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:06:54.216018 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:06:54.216030 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:06:54.216043 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Oct 2 19:06:54.216054 kernel: kvm-guest: PV spinlocks enabled Oct 2 19:06:54.216066 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:06:54.216078 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Oct 2 19:06:54.216090 kernel: Policy zone: DMA32 Oct 2 19:06:54.216104 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:06:54.216119 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:06:54.216130 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:06:54.216143 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:06:54.216155 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:06:54.216168 kernel: Memory: 1936476K/2057760K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 121024K reserved, 0K cma-reserved) Oct 2 19:06:54.216182 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:06:54.216193 kernel: Kernel/User page tables isolation: enabled Oct 2 19:06:54.216205 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:06:54.216221 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:06:54.216235 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:06:54.216249 kernel: rcu: RCU event tracing is enabled. Oct 2 19:06:54.216417 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:06:54.216434 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:06:54.216449 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:06:54.216463 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:06:54.216477 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:06:54.216491 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Oct 2 19:06:54.216509 kernel: random: crng init done Oct 2 19:06:54.216523 kernel: Console: colour VGA+ 80x25 Oct 2 19:06:54.216537 kernel: printk: console [ttyS0] enabled Oct 2 19:06:54.216551 kernel: ACPI: Core revision 20210730 Oct 2 19:06:54.216565 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Oct 2 19:06:54.216580 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:06:54.216594 kernel: x2apic enabled Oct 2 19:06:54.216608 kernel: Switched APIC routing to physical x2apic. Oct 2 19:06:54.216622 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Oct 2 19:06:54.216639 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996) Oct 2 19:06:54.216653 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:06:54.216667 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:06:54.216681 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:06:54.216706 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:06:54.216757 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:06:54.216772 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:06:54.216787 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Oct 2 19:06:54.216801 kernel: RETBleed: Vulnerable Oct 2 19:06:54.216816 kernel: Speculative Store Bypass: Vulnerable Oct 2 19:06:54.216830 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:06:54.216845 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:06:54.216859 kernel: GDS: Unknown: Dependent on hypervisor status Oct 2 19:06:54.216873 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:06:54.216891 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:06:54.216905 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:06:54.216917 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Oct 2 19:06:54.216930 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Oct 2 19:06:54.216944 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Oct 2 19:06:54.216960 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Oct 2 19:06:54.216973 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Oct 2 19:06:54.216988 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Oct 2 19:06:54.217003 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:06:54.217018 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Oct 2 19:06:54.217032 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Oct 2 19:06:54.217047 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Oct 2 19:06:54.217062 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Oct 2 19:06:54.217076 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Oct 2 19:06:54.217091 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Oct 2 19:06:54.217108 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Oct 2 19:06:54.217122 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:06:54.217140 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:06:54.217154 kernel: LSM: Security Framework initializing Oct 2 19:06:54.217167 kernel: SELinux: Initializing. Oct 2 19:06:54.217182 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:06:54.217197 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 2 19:06:54.217213 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Oct 2 19:06:54.217227 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Oct 2 19:06:54.217303 kernel: signal: max sigframe size: 3632 Oct 2 19:06:54.217335 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:06:54.217347 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:06:54.217365 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:06:54.217378 kernel: x86: Booting SMP configuration: Oct 2 19:06:54.217392 kernel: .... node #0, CPUs: #1 Oct 2 19:06:54.217405 kernel: kvm-clock: cpu 1, msr 4af8a041, secondary cpu clock Oct 2 19:06:54.217418 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Oct 2 19:06:54.217433 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Oct 2 19:06:54.217449 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:06:54.217463 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:06:54.217478 kernel: smpboot: Max logical packages: 1 Oct 2 19:06:54.217495 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS) Oct 2 19:06:54.217509 kernel: devtmpfs: initialized Oct 2 19:06:54.217524 kernel: x86/mm: Memory block size: 128MB Oct 2 19:06:54.217538 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:06:54.217553 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:06:54.217567 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:06:54.217582 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:06:54.217597 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:06:54.217613 kernel: audit: type=2000 audit(1696273613.366:1): state=initialized audit_enabled=0 res=1 Oct 2 19:06:54.217630 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:06:54.217644 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:06:54.217658 kernel: cpuidle: using governor menu Oct 2 19:06:54.217672 kernel: ACPI: bus type PCI registered Oct 2 19:06:54.217687 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:06:54.217702 kernel: dca service started, version 1.12.1 Oct 2 19:06:54.217716 kernel: PCI: Using configuration type 1 for base access Oct 2 19:06:54.217731 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:06:54.217746 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:06:54.217763 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:06:54.217778 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:06:54.217792 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:06:54.217806 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:06:54.217821 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:06:54.217836 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:06:54.217850 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:06:54.217865 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:06:54.217880 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Oct 2 19:06:54.217897 kernel: ACPI: Interpreter enabled Oct 2 19:06:54.217912 kernel: ACPI: PM: (supports S0 S5) Oct 2 19:06:54.217926 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:06:54.217941 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:06:54.217955 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Oct 2 19:06:54.217970 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 2 19:06:54.218170 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:06:54.218302 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Oct 2 19:06:54.218585 kernel: acpiphp: Slot [3] registered Oct 2 19:06:54.218602 kernel: acpiphp: Slot [4] registered Oct 2 19:06:54.218615 kernel: acpiphp: Slot [5] registered Oct 2 19:06:54.218629 kernel: acpiphp: Slot [6] registered Oct 2 19:06:54.218643 kernel: acpiphp: Slot [7] registered Oct 2 19:06:54.218656 kernel: acpiphp: Slot [8] registered Oct 2 19:06:54.218668 kernel: acpiphp: Slot [9] registered Oct 2 19:06:54.218682 kernel: acpiphp: Slot [10] registered Oct 2 19:06:54.218697 kernel: acpiphp: Slot [11] registered Oct 2 19:06:54.218714 kernel: acpiphp: Slot [12] registered Oct 2 19:06:54.218726 kernel: acpiphp: Slot [13] registered Oct 2 19:06:54.218738 kernel: acpiphp: Slot [14] registered Oct 2 19:06:54.218749 kernel: acpiphp: Slot [15] registered Oct 2 19:06:54.218762 kernel: acpiphp: Slot [16] registered Oct 2 19:06:54.218774 kernel: acpiphp: Slot [17] registered Oct 2 19:06:54.218788 kernel: acpiphp: Slot [18] registered Oct 2 19:06:54.218801 kernel: acpiphp: Slot [19] registered Oct 2 19:06:54.218814 kernel: acpiphp: Slot [20] registered Oct 2 19:06:54.218829 kernel: acpiphp: Slot [21] registered Oct 2 19:06:54.218842 kernel: acpiphp: Slot [22] registered Oct 2 19:06:54.218855 kernel: acpiphp: Slot [23] registered Oct 2 19:06:54.218869 kernel: acpiphp: Slot [24] registered Oct 2 19:06:54.218882 kernel: acpiphp: Slot [25] registered Oct 2 19:06:54.218895 kernel: acpiphp: Slot [26] registered Oct 2 19:06:54.218907 kernel: acpiphp: Slot [27] registered Oct 2 19:06:54.218921 kernel: acpiphp: Slot [28] registered Oct 2 19:06:54.218934 kernel: acpiphp: Slot [29] registered Oct 2 19:06:54.218947 kernel: acpiphp: Slot [30] registered Oct 2 19:06:54.218962 kernel: acpiphp: Slot [31] registered Oct 2 19:06:54.218975 kernel: PCI host bridge to bus 0000:00 Oct 2 19:06:54.219130 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:06:54.219241 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:06:54.219360 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:06:54.219465 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Oct 2 19:06:54.219803 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 2 19:06:54.219954 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Oct 2 19:06:54.220083 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Oct 2 19:06:54.220207 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Oct 2 19:06:54.220337 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Oct 2 19:06:54.220454 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Oct 2 19:06:54.220575 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Oct 2 19:06:54.220697 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Oct 2 19:06:54.220830 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Oct 2 19:06:54.220956 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Oct 2 19:06:54.221084 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Oct 2 19:06:54.221221 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Oct 2 19:06:54.221369 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Oct 2 19:06:54.221499 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Oct 2 19:06:54.221625 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Oct 2 19:06:54.221757 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:06:54.221891 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Oct 2 19:06:54.222018 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Oct 2 19:06:54.222159 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Oct 2 19:06:54.222283 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Oct 2 19:06:54.222302 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 2 19:06:54.222334 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 2 19:06:54.222349 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 2 19:06:54.222364 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 2 19:06:54.222379 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Oct 2 19:06:54.222394 kernel: iommu: Default domain type: Translated Oct 2 19:06:54.222409 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:06:54.222535 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Oct 2 19:06:54.222663 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:06:54.222791 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Oct 2 19:06:54.222814 kernel: vgaarb: loaded Oct 2 19:06:54.222829 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:06:54.222844 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:06:54.222860 kernel: PTP clock support registered Oct 2 19:06:54.222875 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:06:54.222889 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:06:54.222905 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 2 19:06:54.222920 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Oct 2 19:06:54.222937 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Oct 2 19:06:54.222952 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Oct 2 19:06:54.222966 kernel: clocksource: Switched to clocksource kvm-clock Oct 2 19:06:54.222981 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:06:54.222997 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:06:54.223011 kernel: pnp: PnP ACPI init Oct 2 19:06:54.223034 kernel: pnp: PnP ACPI: found 5 devices Oct 2 19:06:54.223049 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:06:54.223064 kernel: NET: Registered PF_INET protocol family Oct 2 19:06:54.223081 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 19:06:54.223096 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 2 19:06:54.223112 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:06:54.223126 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:06:54.223142 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 19:06:54.223156 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 2 19:06:54.223171 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:06:54.223187 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 2 19:06:54.223202 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:06:54.223219 kernel: NET: Registered PF_XDP protocol family Oct 2 19:06:54.223353 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:06:54.223471 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:06:54.223584 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:06:54.223694 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Oct 2 19:06:54.223822 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Oct 2 19:06:54.223967 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Oct 2 19:06:54.223991 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:06:54.224006 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:06:54.224022 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Oct 2 19:06:54.224034 kernel: clocksource: Switched to clocksource tsc Oct 2 19:06:54.224048 kernel: Initialise system trusted keyrings Oct 2 19:06:54.224063 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 2 19:06:54.224078 kernel: Key type asymmetric registered Oct 2 19:06:54.224093 kernel: Asymmetric key parser 'x509' registered Oct 2 19:06:54.224108 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:06:54.224126 kernel: io scheduler mq-deadline registered Oct 2 19:06:54.224141 kernel: io scheduler kyber registered Oct 2 19:06:54.224156 kernel: io scheduler bfq registered Oct 2 19:06:54.224170 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:06:54.224182 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:06:54.224195 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:06:54.224210 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 2 19:06:54.224226 kernel: i8042: Warning: Keylock active Oct 2 19:06:54.224241 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 2 19:06:54.224259 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 2 19:06:54.224408 kernel: rtc_cmos 00:00: RTC can wake from S4 Oct 2 19:06:54.224527 kernel: rtc_cmos 00:00: registered as rtc0 Oct 2 19:06:54.224718 kernel: rtc_cmos 00:00: setting system clock to 2023-10-02T19:06:53 UTC (1696273613) Oct 2 19:06:54.224836 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Oct 2 19:06:54.224855 kernel: intel_pstate: CPU model not supported Oct 2 19:06:54.224871 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:06:54.224887 kernel: Segment Routing with IPv6 Oct 2 19:06:54.224906 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:06:54.224921 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:06:54.224935 kernel: Key type dns_resolver registered Oct 2 19:06:54.224986 kernel: IPI shorthand broadcast: enabled Oct 2 19:06:54.225002 kernel: sched_clock: Marking stable (500183771, 369474961)->(1100540118, -230881386) Oct 2 19:06:54.225017 kernel: registered taskstats version 1 Oct 2 19:06:54.225032 kernel: Loading compiled-in X.509 certificates Oct 2 19:06:54.225047 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:06:54.225062 kernel: Key type .fscrypt registered Oct 2 19:06:54.225080 kernel: Key type fscrypt-provisioning registered Oct 2 19:06:54.225095 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:06:54.225110 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:06:54.225126 kernel: ima: No architecture policies found Oct 2 19:06:54.225141 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:06:54.225157 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:06:54.225172 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:06:54.225188 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:06:54.225203 kernel: Run /init as init process Oct 2 19:06:54.225221 kernel: with arguments: Oct 2 19:06:54.225236 kernel: /init Oct 2 19:06:54.225251 kernel: with environment: Oct 2 19:06:54.225266 kernel: HOME=/ Oct 2 19:06:54.225280 kernel: TERM=linux Oct 2 19:06:54.225295 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:06:54.225324 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:06:54.225341 systemd[1]: Detected virtualization amazon. Oct 2 19:06:54.225357 systemd[1]: Detected architecture x86-64. Oct 2 19:06:54.225371 systemd[1]: Running in initrd. Oct 2 19:06:54.225384 systemd[1]: No hostname configured, using default hostname. Oct 2 19:06:54.225399 systemd[1]: Hostname set to . Oct 2 19:06:54.225430 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:06:54.225447 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 2 19:06:54.225462 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:06:54.225477 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:06:54.225493 systemd[1]: Reached target cryptsetup.target. Oct 2 19:06:54.225509 systemd[1]: Reached target paths.target. Oct 2 19:06:54.225525 systemd[1]: Reached target slices.target. Oct 2 19:06:54.225541 systemd[1]: Reached target swap.target. Oct 2 19:06:54.225557 systemd[1]: Reached target timers.target. Oct 2 19:06:54.225577 systemd[1]: Listening on iscsid.socket. Oct 2 19:06:54.225593 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:06:54.225609 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:06:54.225626 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:06:54.225642 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:06:54.225737 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:06:54.225760 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:06:54.225776 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:06:54.225792 systemd[1]: Reached target sockets.target. Oct 2 19:06:54.225813 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:06:54.225829 systemd[1]: Finished network-cleanup.service. Oct 2 19:06:54.225846 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:06:54.225863 systemd[1]: Starting systemd-journald.service... Oct 2 19:06:54.225880 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:06:54.225896 systemd[1]: Starting systemd-resolved.service... Oct 2 19:06:54.225913 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:06:54.225936 systemd-journald[185]: Journal started Oct 2 19:06:54.226014 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2028b4ce9f92887cbbe0a3ac1a31bc) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:06:54.231336 systemd[1]: Started systemd-journald.service. Oct 2 19:06:54.234286 systemd-modules-load[186]: Inserted module 'overlay' Oct 2 19:06:54.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.245125 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:06:54.248561 kernel: audit: type=1130 audit(1696273614.239:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.257653 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:06:54.261899 kernel: audit: type=1130 audit(1696273614.251:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.260511 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:06:54.267839 kernel: audit: type=1130 audit(1696273614.257:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.287346 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:06:54.289925 systemd-modules-load[186]: Inserted module 'br_netfilter' Oct 2 19:06:54.484019 kernel: Bridge firewalling registered Oct 2 19:06:54.484090 kernel: SCSI subsystem initialized Oct 2 19:06:54.484113 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:06:54.484132 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:06:54.484150 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:06:54.484167 kernel: audit: type=1130 audit(1696273614.482:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.329607 systemd-resolved[187]: Positive Trust Anchors: Oct 2 19:06:54.329619 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:06:54.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.329674 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:06:54.519453 kernel: audit: type=1130 audit(1696273614.497:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.333903 systemd-resolved[187]: Defaulting to hostname 'linux'. Oct 2 19:06:54.335497 systemd-modules-load[186]: Inserted module 'dm_multipath' Oct 2 19:06:54.535646 kernel: audit: type=1130 audit(1696273614.527:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.478660 systemd[1]: Started systemd-resolved.service. Oct 2 19:06:54.484773 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:06:54.499365 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:06:54.548940 kernel: audit: type=1130 audit(1696273614.538:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.535763 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:06:54.548987 systemd[1]: Reached target nss-lookup.target. Oct 2 19:06:54.559920 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:06:54.564704 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:06:54.582735 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:06:54.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.589417 kernel: audit: type=1130 audit(1696273614.581:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.598634 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:06:54.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.601994 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:06:54.611110 kernel: audit: type=1130 audit(1696273614.599:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.622151 dracut-cmdline[206]: dracut-dracut-053 Oct 2 19:06:54.626619 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:06:54.744344 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:06:54.762340 kernel: iscsi: registered transport (tcp) Oct 2 19:06:54.799381 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:06:54.799525 kernel: QLogic iSCSI HBA Driver Oct 2 19:06:54.873900 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:06:54.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:54.881728 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:06:54.945371 kernel: raid6: avx512x4 gen() 12087 MB/s Oct 2 19:06:54.963353 kernel: raid6: avx512x4 xor() 5296 MB/s Oct 2 19:06:54.981359 kernel: raid6: avx512x2 gen() 13918 MB/s Oct 2 19:06:54.999370 kernel: raid6: avx512x2 xor() 14611 MB/s Oct 2 19:06:55.019374 kernel: raid6: avx512x1 gen() 8898 MB/s Oct 2 19:06:55.038353 kernel: raid6: avx512x1 xor() 16268 MB/s Oct 2 19:06:55.056440 kernel: raid6: avx2x4 gen() 11595 MB/s Oct 2 19:06:55.074347 kernel: raid6: avx2x4 xor() 5972 MB/s Oct 2 19:06:55.092348 kernel: raid6: avx2x2 gen() 15055 MB/s Oct 2 19:06:55.110516 kernel: raid6: avx2x2 xor() 13406 MB/s Oct 2 19:06:55.127376 kernel: raid6: avx2x1 gen() 11356 MB/s Oct 2 19:06:55.145366 kernel: raid6: avx2x1 xor() 12468 MB/s Oct 2 19:06:55.162359 kernel: raid6: sse2x4 gen() 7517 MB/s Oct 2 19:06:55.183142 kernel: raid6: sse2x4 xor() 2301 MB/s Oct 2 19:06:55.201043 kernel: raid6: sse2x2 gen() 4710 MB/s Oct 2 19:06:55.222730 kernel: raid6: sse2x2 xor() 1384 MB/s Oct 2 19:06:55.241379 kernel: raid6: sse2x1 gen() 3080 MB/s Oct 2 19:06:55.259919 kernel: raid6: sse2x1 xor() 3675 MB/s Oct 2 19:06:55.259997 kernel: raid6: using algorithm avx2x2 gen() 15055 MB/s Oct 2 19:06:55.260015 kernel: raid6: .... xor() 13406 MB/s, rmw enabled Oct 2 19:06:55.261244 kernel: raid6: using avx512x2 recovery algorithm Oct 2 19:06:55.280392 kernel: xor: automatically using best checksumming function avx Oct 2 19:06:55.396349 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:06:55.406655 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:06:55.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:55.408000 audit: BPF prog-id=7 op=LOAD Oct 2 19:06:55.408000 audit: BPF prog-id=8 op=LOAD Oct 2 19:06:55.410357 systemd[1]: Starting systemd-udevd.service... Oct 2 19:06:55.429428 systemd-udevd[384]: Using default interface naming scheme 'v252'. Oct 2 19:06:55.442441 systemd[1]: Started systemd-udevd.service. Oct 2 19:06:55.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:55.445829 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:06:55.466915 dracut-pre-trigger[394]: rd.md=0: removing MD RAID activation Oct 2 19:06:55.507758 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:06:55.512048 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:06:55.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:55.579147 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:06:55.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:55.642639 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:06:55.658343 kernel: nvme nvme0: pci function 0000:00:04.0 Oct 2 19:06:55.658592 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Oct 2 19:06:55.677251 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:06:55.677350 kernel: AES CTR mode by8 optimization enabled Oct 2 19:06:55.680684 kernel: nvme nvme0: 2/0/0 default/read/poll queues Oct 2 19:06:55.686300 kernel: ena 0000:00:05.0: ENA device version: 0.10 Oct 2 19:06:55.686550 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Oct 2 19:06:55.693579 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Oct 2 19:06:55.697418 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:ac:d1:45:69:5b Oct 2 19:06:55.698330 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:06:55.698369 kernel: GPT:9289727 != 16777215 Oct 2 19:06:55.698387 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:06:55.698403 kernel: GPT:9289727 != 16777215 Oct 2 19:06:55.698419 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:06:55.698435 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:06:55.701974 (udev-worker)[435]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:06:55.915997 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (437) Oct 2 19:06:55.846227 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:06:55.928559 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:06:55.940214 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:06:55.943752 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:06:55.951836 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:06:55.960519 systemd[1]: Starting disk-uuid.service... Oct 2 19:06:55.976967 disk-uuid[585]: Primary Header is updated. Oct 2 19:06:55.976967 disk-uuid[585]: Secondary Entries is updated. Oct 2 19:06:55.976967 disk-uuid[585]: Secondary Header is updated. Oct 2 19:06:55.981284 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:06:55.990193 kernel: GPT:disk_guids don't match. Oct 2 19:06:55.990245 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:06:55.990258 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:06:56.000343 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:06:57.001414 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 19:06:57.004475 disk-uuid[586]: The operation has completed successfully. Oct 2 19:06:57.189887 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:06:57.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:57.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:57.190072 systemd[1]: Finished disk-uuid.service. Oct 2 19:06:57.215307 systemd[1]: Starting verity-setup.service... Oct 2 19:06:57.269590 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:06:57.395775 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:06:57.399792 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:06:57.412224 systemd[1]: Finished verity-setup.service. Oct 2 19:06:57.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:57.556346 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:06:57.556497 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:06:57.558930 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:06:57.564697 systemd[1]: Starting ignition-setup.service... Oct 2 19:06:57.572959 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:06:57.593179 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:06:57.593244 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:06:57.593263 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:06:57.623341 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:06:57.638533 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:06:57.666041 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:06:57.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:57.667000 audit: BPF prog-id=9 op=LOAD Oct 2 19:06:57.669254 systemd[1]: Starting systemd-networkd.service... Oct 2 19:06:57.674967 systemd[1]: Finished ignition-setup.service. Oct 2 19:06:57.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:57.687436 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:06:57.737025 systemd-networkd[1096]: lo: Link UP Oct 2 19:06:57.737039 systemd-networkd[1096]: lo: Gained carrier Oct 2 19:06:57.739210 systemd-networkd[1096]: Enumeration completed Oct 2 19:06:57.739508 systemd-networkd[1096]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:06:57.739658 systemd[1]: Started systemd-networkd.service. Oct 2 19:06:57.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:57.754101 systemd[1]: Reached target network.target. Oct 2 19:06:57.757349 systemd[1]: Starting iscsiuio.service... Oct 2 19:06:57.768461 systemd-networkd[1096]: eth0: Link UP Oct 2 19:06:57.768596 systemd-networkd[1096]: eth0: Gained carrier Oct 2 19:06:57.772846 systemd[1]: Started iscsiuio.service. Oct 2 19:06:57.774183 systemd[1]: Starting iscsid.service... Oct 2 19:06:57.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:57.780740 iscsid[1102]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:06:57.780740 iscsid[1102]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:06:57.780740 iscsid[1102]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:06:57.780740 iscsid[1102]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:06:57.780740 iscsid[1102]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:06:57.780740 iscsid[1102]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:06:57.796305 systemd[1]: Started iscsid.service. Oct 2 19:06:57.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:57.805596 systemd-networkd[1096]: eth0: DHCPv4 address 172.31.27.110/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:06:57.808039 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:06:57.826751 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:06:57.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:57.829029 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:06:57.836395 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:06:57.838293 systemd[1]: Reached target remote-fs.target. Oct 2 19:06:57.841541 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:06:57.855569 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:06:57.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:58.438830 ignition[1097]: Ignition 2.14.0 Oct 2 19:06:58.438845 ignition[1097]: Stage: fetch-offline Oct 2 19:06:58.438992 ignition[1097]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:06:58.439069 ignition[1097]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:06:58.466837 ignition[1097]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:06:58.468873 ignition[1097]: Ignition finished successfully Oct 2 19:06:58.471556 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:06:58.484433 kernel: kauditd_printk_skb: 18 callbacks suppressed Oct 2 19:06:58.484509 kernel: audit: type=1130 audit(1696273618.471:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:58.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:58.476208 systemd[1]: Starting ignition-fetch.service... Oct 2 19:06:58.494949 ignition[1121]: Ignition 2.14.0 Oct 2 19:06:58.494963 ignition[1121]: Stage: fetch Oct 2 19:06:58.495503 ignition[1121]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:06:58.495531 ignition[1121]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:06:58.505211 ignition[1121]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:06:58.506918 ignition[1121]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:06:58.531356 ignition[1121]: INFO : PUT result: OK Oct 2 19:06:58.535279 ignition[1121]: DEBUG : parsed url from cmdline: "" Oct 2 19:06:58.535279 ignition[1121]: INFO : no config URL provided Oct 2 19:06:58.535279 ignition[1121]: INFO : reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:06:58.539802 ignition[1121]: INFO : no config at "/usr/lib/ignition/user.ign" Oct 2 19:06:58.539802 ignition[1121]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:06:58.539802 ignition[1121]: INFO : PUT result: OK Oct 2 19:06:58.539802 ignition[1121]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Oct 2 19:06:58.546177 ignition[1121]: INFO : GET result: OK Oct 2 19:06:58.546177 ignition[1121]: DEBUG : parsing config with SHA512: 2305c4613f129d9fd35bef294aa545938b9e48cc3c629f28fcde61728837b920e414bcc90a41ff34329084a823f4841ab7bfca35de50c64bd817719d9c09e66b Oct 2 19:06:58.578463 unknown[1121]: fetched base config from "system" Oct 2 19:06:58.578479 unknown[1121]: fetched base config from "system" Oct 2 19:06:58.579679 ignition[1121]: fetch: fetch complete Oct 2 19:06:58.578486 unknown[1121]: fetched user config from "aws" Oct 2 19:06:58.579688 ignition[1121]: fetch: fetch passed Oct 2 19:06:58.579747 ignition[1121]: Ignition finished successfully Oct 2 19:06:58.587289 systemd[1]: Finished ignition-fetch.service. Oct 2 19:06:58.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:58.593474 systemd[1]: Starting ignition-kargs.service... Oct 2 19:06:58.614049 kernel: audit: type=1130 audit(1696273618.590:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:58.632902 ignition[1127]: Ignition 2.14.0 Oct 2 19:06:58.632915 ignition[1127]: Stage: kargs Oct 2 19:06:58.633307 ignition[1127]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:06:58.633355 ignition[1127]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:06:58.644125 ignition[1127]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:06:58.646130 ignition[1127]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:06:58.648721 ignition[1127]: INFO : PUT result: OK Oct 2 19:06:58.652720 ignition[1127]: kargs: kargs passed Oct 2 19:06:58.652776 ignition[1127]: Ignition finished successfully Oct 2 19:06:58.656104 systemd[1]: Finished ignition-kargs.service. Oct 2 19:06:58.673619 kernel: audit: type=1130 audit(1696273618.656:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:58.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:58.658221 systemd[1]: Starting ignition-disks.service... Oct 2 19:06:58.693725 ignition[1133]: Ignition 2.14.0 Oct 2 19:06:58.693739 ignition[1133]: Stage: disks Oct 2 19:06:58.694001 ignition[1133]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:06:58.694032 ignition[1133]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:06:58.706774 ignition[1133]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:06:58.708398 ignition[1133]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:06:58.710158 ignition[1133]: INFO : PUT result: OK Oct 2 19:06:58.714085 ignition[1133]: disks: disks passed Oct 2 19:06:58.714172 ignition[1133]: Ignition finished successfully Oct 2 19:06:58.717358 systemd[1]: Finished ignition-disks.service. Oct 2 19:06:58.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:58.717619 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:06:58.754131 kernel: audit: type=1130 audit(1696273618.716:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:58.760469 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:06:58.761736 systemd[1]: Reached target local-fs.target. Oct 2 19:06:58.764799 systemd[1]: Reached target sysinit.target. Oct 2 19:06:58.765903 systemd[1]: Reached target basic.target. Oct 2 19:06:58.770180 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:06:58.834334 systemd-fsck[1141]: ROOT: clean, 603/553520 files, 56012/553472 blocks Oct 2 19:06:58.839480 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:06:58.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:58.849087 systemd[1]: Mounting sysroot.mount... Oct 2 19:06:58.865363 kernel: audit: type=1130 audit(1696273618.846:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:58.893388 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:06:58.895846 systemd[1]: Mounted sysroot.mount. Oct 2 19:06:58.898255 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:06:58.912556 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:06:58.915091 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 19:06:58.915175 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:06:58.915209 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:06:58.926061 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:06:58.943273 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:06:58.952582 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:06:58.976466 initrd-setup-root[1163]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:06:58.993901 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1158) Oct 2 19:06:58.998946 initrd-setup-root[1171]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:06:59.003343 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:06:59.003384 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:06:59.003403 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:06:59.010619 initrd-setup-root[1195]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:06:59.016342 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:06:59.021712 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:06:59.024722 initrd-setup-root[1205]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:06:59.293232 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:06:59.310055 kernel: audit: type=1130 audit(1696273619.292:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.294567 systemd[1]: Starting ignition-mount.service... Oct 2 19:06:59.320266 systemd[1]: Starting sysroot-boot.service... Oct 2 19:06:59.327940 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:06:59.328096 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:06:59.365614 ignition[1223]: INFO : Ignition 2.14.0 Oct 2 19:06:59.365614 ignition[1223]: INFO : Stage: mount Oct 2 19:06:59.368496 ignition[1223]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:06:59.368496 ignition[1223]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:06:59.386713 ignition[1223]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:06:59.388926 ignition[1223]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:06:59.390791 ignition[1223]: INFO : PUT result: OK Oct 2 19:06:59.394408 ignition[1223]: INFO : mount: mount passed Oct 2 19:06:59.396061 ignition[1223]: INFO : Ignition finished successfully Oct 2 19:06:59.399547 systemd[1]: Finished sysroot-boot.service. Oct 2 19:06:59.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.404999 systemd[1]: Finished ignition-mount.service. Oct 2 19:06:59.412932 kernel: audit: type=1130 audit(1696273619.399:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.414054 systemd[1]: Starting ignition-files.service... Oct 2 19:06:59.423705 kernel: audit: type=1130 audit(1696273619.411:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:06:59.429473 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:06:59.447345 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1234) Oct 2 19:06:59.451246 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:06:59.451311 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 19:06:59.451349 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 19:06:59.459338 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 19:06:59.462647 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:06:59.481306 ignition[1253]: INFO : Ignition 2.14.0 Oct 2 19:06:59.481306 ignition[1253]: INFO : Stage: files Oct 2 19:06:59.484578 ignition[1253]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:06:59.484578 ignition[1253]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:06:59.495598 ignition[1253]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:06:59.497720 ignition[1253]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:06:59.501137 ignition[1253]: INFO : PUT result: OK Oct 2 19:06:59.506399 ignition[1253]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:06:59.515832 ignition[1253]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:06:59.515832 ignition[1253]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:06:59.532389 ignition[1253]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:06:59.534965 ignition[1253]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:06:59.538216 unknown[1253]: wrote ssh authorized keys file for user: core Oct 2 19:06:59.540510 ignition[1253]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:06:59.544537 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:06:59.553865 ignition[1253]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:06:59.745468 systemd-networkd[1096]: eth0: Gained IPv6LL Oct 2 19:06:59.901043 ignition[1253]: INFO : GET result: OK Oct 2 19:07:00.197973 ignition[1253]: DEBUG : file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:07:00.201853 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:07:00.201853 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:07:00.201853 ignition[1253]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:07:00.453939 ignition[1253]: INFO : GET result: OK Oct 2 19:07:00.702188 ignition[1253]: DEBUG : file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:07:00.709247 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:07:00.709247 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:07:00.709247 ignition[1253]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:07:00.757100 ignition[1253]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem354697050" Oct 2 19:07:00.764840 ignition[1253]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem354697050": device or resource busy Oct 2 19:07:00.771827 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1253) Oct 2 19:07:00.771864 ignition[1253]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem354697050", trying btrfs: device or resource busy Oct 2 19:07:00.771864 ignition[1253]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem354697050" Oct 2 19:07:00.782464 ignition[1253]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem354697050" Oct 2 19:07:00.786567 ignition[1253]: INFO : op(3): [started] unmounting "/mnt/oem354697050" Oct 2 19:07:00.799809 ignition[1253]: INFO : op(3): [finished] unmounting "/mnt/oem354697050" Oct 2 19:07:00.799809 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 19:07:00.799809 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:07:00.799809 ignition[1253]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:07:00.788705 systemd[1]: mnt-oem354697050.mount: Deactivated successfully. Oct 2 19:07:00.904864 ignition[1253]: INFO : GET result: OK Oct 2 19:07:02.426684 ignition[1253]: DEBUG : file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Oct 2 19:07:02.430567 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:07:02.430567 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:07:02.430567 ignition[1253]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:07:02.523338 ignition[1253]: INFO : GET result: OK Oct 2 19:07:04.934420 ignition[1253]: DEBUG : file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Oct 2 19:07:04.937877 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:07:04.937877 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:07:04.937877 ignition[1253]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:07:05.054151 ignition[1253]: INFO : GET result: OK Oct 2 19:07:06.056846 ignition[1253]: DEBUG : file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Oct 2 19:07:06.062636 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:07:06.062636 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:07:06.062636 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:07:06.062636 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:07:06.078043 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:07:06.078043 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:07:06.078043 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:07:06.078043 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:07:06.078043 ignition[1253]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:07:06.109295 ignition[1253]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem149456058" Oct 2 19:07:06.109295 ignition[1253]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem149456058": device or resource busy Oct 2 19:07:06.109295 ignition[1253]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem149456058", trying btrfs: device or resource busy Oct 2 19:07:06.109295 ignition[1253]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem149456058" Oct 2 19:07:06.109295 ignition[1253]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem149456058" Oct 2 19:07:06.130254 ignition[1253]: INFO : op(6): [started] unmounting "/mnt/oem149456058" Oct 2 19:07:06.127022 systemd[1]: mnt-oem149456058.mount: Deactivated successfully. Oct 2 19:07:06.133884 ignition[1253]: INFO : op(6): [finished] unmounting "/mnt/oem149456058" Oct 2 19:07:06.133884 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 19:07:06.133884 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:07:06.133884 ignition[1253]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:07:06.150235 ignition[1253]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem483435958" Oct 2 19:07:06.152706 ignition[1253]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem483435958": device or resource busy Oct 2 19:07:06.152706 ignition[1253]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem483435958", trying btrfs: device or resource busy Oct 2 19:07:06.152706 ignition[1253]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem483435958" Oct 2 19:07:06.152706 ignition[1253]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem483435958" Oct 2 19:07:06.166538 ignition[1253]: INFO : op(9): [started] unmounting "/mnt/oem483435958" Oct 2 19:07:06.166538 ignition[1253]: INFO : op(9): [finished] unmounting "/mnt/oem483435958" Oct 2 19:07:06.166538 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 19:07:06.173113 systemd[1]: mnt-oem483435958.mount: Deactivated successfully. Oct 2 19:07:06.177734 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:07:06.181865 ignition[1253]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:07:06.194358 ignition[1253]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1487473063" Oct 2 19:07:06.201856 ignition[1253]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1487473063": device or resource busy Oct 2 19:07:06.201856 ignition[1253]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1487473063", trying btrfs: device or resource busy Oct 2 19:07:06.201856 ignition[1253]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1487473063" Oct 2 19:07:06.201856 ignition[1253]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1487473063" Oct 2 19:07:06.212577 ignition[1253]: INFO : op(c): [started] unmounting "/mnt/oem1487473063" Oct 2 19:07:06.212577 ignition[1253]: INFO : op(c): [finished] unmounting "/mnt/oem1487473063" Oct 2 19:07:06.212577 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:07:06.212577 ignition[1253]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:07:06.212577 ignition[1253]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:07:06.212577 ignition[1253]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" Oct 2 19:07:06.212577 ignition[1253]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(12): [started] processing unit "nvidia.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(12): [finished] processing unit "nvidia.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(13): [started] processing unit "prepare-critools.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(13): op(14): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(13): op(14): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(13): [finished] processing unit "prepare-critools.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(17): [started] setting preset to enabled for "nvidia.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(17): [finished] setting preset to enabled for "nvidia.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(19): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(1a): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:07:06.226739 ignition[1253]: INFO : files: op(1a): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:07:06.268844 ignition[1253]: INFO : files: op(1b): [started] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:07:06.268844 ignition[1253]: INFO : files: op(1b): [finished] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 19:07:06.268844 ignition[1253]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:07:06.268844 ignition[1253]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:07:06.268844 ignition[1253]: INFO : files: files passed Oct 2 19:07:06.268844 ignition[1253]: INFO : Ignition finished successfully Oct 2 19:07:06.268178 systemd[1]: Finished ignition-files.service. Oct 2 19:07:06.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.303762 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:07:06.306141 kernel: audit: type=1130 audit(1696273626.297:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.307599 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:07:06.310108 systemd[1]: Starting ignition-quench.service... Oct 2 19:07:06.318772 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:07:06.318912 systemd[1]: Finished ignition-quench.service. Oct 2 19:07:06.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.332791 kernel: audit: type=1130 audit(1696273626.319:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.332866 kernel: audit: type=1131 audit(1696273626.319:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.334858 initrd-setup-root-after-ignition[1278]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:07:06.338618 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:07:06.346347 kernel: audit: type=1130 audit(1696273626.338:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.340013 systemd[1]: Reached target ignition-complete.target. Oct 2 19:07:06.349362 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:07:06.372214 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:07:06.372336 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:07:06.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.375705 systemd[1]: Reached target initrd-fs.target. Oct 2 19:07:06.388455 kernel: audit: type=1130 audit(1696273626.374:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.388498 kernel: audit: type=1131 audit(1696273626.374:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.389669 systemd[1]: Reached target initrd.target. Oct 2 19:07:06.391875 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:07:06.394524 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:07:06.415811 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:07:06.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.419750 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:07:06.428861 kernel: audit: type=1130 audit(1696273626.417:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.437835 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:07:06.440027 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:07:06.442113 systemd[1]: Stopped target timers.target. Oct 2 19:07:06.444327 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:07:06.445435 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:07:06.451504 systemd[1]: Stopped target initrd.target. Oct 2 19:07:06.460179 kernel: audit: type=1131 audit(1696273626.449:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.460257 systemd[1]: Stopped target basic.target. Oct 2 19:07:06.469497 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:07:06.479624 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:07:06.481595 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:07:06.485178 systemd[1]: Stopped target remote-fs.target. Oct 2 19:07:06.487677 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:07:06.490542 systemd[1]: Stopped target sysinit.target. Oct 2 19:07:06.493376 systemd[1]: Stopped target local-fs.target. Oct 2 19:07:06.495399 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:07:06.497527 systemd[1]: Stopped target swap.target. Oct 2 19:07:06.500661 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:07:06.500963 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:07:06.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.507422 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:07:06.514465 kernel: audit: type=1131 audit(1696273626.505:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.517044 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:07:06.517432 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:07:06.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.521791 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:07:06.529563 kernel: audit: type=1131 audit(1696273626.520:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.522418 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:07:06.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.534199 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:07:06.534425 systemd[1]: Stopped ignition-files.service. Oct 2 19:07:06.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.539356 systemd[1]: Stopping ignition-mount.service... Oct 2 19:07:06.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.540377 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:07:06.540547 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:07:06.543873 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:07:06.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.558093 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:07:06.558583 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:07:06.561496 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:07:06.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.563861 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:07:06.575653 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:07:06.575970 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:07:06.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.584739 ignition[1291]: INFO : Ignition 2.14.0 Oct 2 19:07:06.584739 ignition[1291]: INFO : Stage: umount Oct 2 19:07:06.588574 ignition[1291]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:07:06.588574 ignition[1291]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 19:07:06.604219 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:07:06.604361 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:07:06.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.608682 ignition[1291]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 19:07:06.611827 ignition[1291]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 19:07:06.615049 ignition[1291]: INFO : PUT result: OK Oct 2 19:07:06.619947 ignition[1291]: INFO : umount: umount passed Oct 2 19:07:06.621609 ignition[1291]: INFO : Ignition finished successfully Oct 2 19:07:06.623583 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:07:06.623704 systemd[1]: Stopped ignition-mount.service. Oct 2 19:07:06.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.626504 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:07:06.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.626560 systemd[1]: Stopped ignition-disks.service. Oct 2 19:07:06.628825 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:07:06.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.628871 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:07:06.628958 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:07:06.629060 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:07:06.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.635802 systemd[1]: Stopped target network.target. Oct 2 19:07:06.637866 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:07:06.637935 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:07:06.643278 systemd[1]: Stopped target paths.target. Oct 2 19:07:06.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.647803 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:07:06.649770 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:07:06.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.653652 systemd[1]: Stopped target slices.target. Oct 2 19:07:06.654815 systemd[1]: Stopped target sockets.target. Oct 2 19:07:06.657400 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:07:06.657439 systemd[1]: Closed iscsid.socket. Oct 2 19:07:06.660544 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:07:06.660579 systemd[1]: Closed iscsiuio.socket. Oct 2 19:07:06.663792 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:07:06.663853 systemd[1]: Stopped ignition-setup.service. Oct 2 19:07:06.666213 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:07:06.667703 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:07:06.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.674029 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:07:06.676496 systemd-networkd[1096]: eth0: DHCPv6 lease lost Oct 2 19:07:06.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.678785 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:07:06.693000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:07:06.682558 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:07:06.694000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:07:06.682688 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:07:06.691074 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:07:06.691213 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:07:06.695031 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:07:06.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.695088 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:07:06.698136 systemd[1]: Stopping network-cleanup.service... Oct 2 19:07:06.704051 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:07:06.704126 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:07:06.706064 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:07:06.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.706118 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:07:06.707647 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:07:06.707698 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:07:06.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.710669 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:07:06.719302 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:07:06.720699 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:07:06.722270 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:07:06.723564 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:07:06.724748 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:07:06.731455 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:07:06.737564 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:07:06.737646 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:07:06.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.743035 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:07:06.743112 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:07:06.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.743520 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:07:06.743560 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:07:06.747232 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:07:06.760039 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:07:06.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:06.760131 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:07:06.766115 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:07:06.766228 systemd[1]: Stopped network-cleanup.service. Oct 2 19:07:06.779107 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:07:06.780736 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:07:06.789748 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:07:06.793729 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:07:06.826228 systemd[1]: Switching root. Oct 2 19:07:06.849842 systemd-journald[185]: Journal stopped Oct 2 19:07:14.424855 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Oct 2 19:07:14.425363 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:07:14.425398 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:07:14.425424 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:07:14.425444 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:07:14.425463 kernel: SELinux: policy capability open_perms=1 Oct 2 19:07:14.425483 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:07:14.425506 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:07:14.425524 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:07:14.425552 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:07:14.425568 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:07:14.425586 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:07:14.425707 systemd[1]: Successfully loaded SELinux policy in 148.016ms. Oct 2 19:07:14.425747 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.896ms. Oct 2 19:07:14.425771 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:07:14.425788 systemd[1]: Detected virtualization amazon. Oct 2 19:07:14.425805 systemd[1]: Detected architecture x86-64. Oct 2 19:07:14.425824 systemd[1]: Detected first boot. Oct 2 19:07:14.425850 systemd[1]: Initializing machine ID from VM UUID. Oct 2 19:07:14.425869 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:07:14.425889 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:07:14.425909 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:07:14.425929 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:07:14.425947 kernel: kauditd_printk_skb: 37 callbacks suppressed Oct 2 19:07:14.425965 kernel: audit: type=1334 audit(1696273633.978:84): prog-id=12 op=LOAD Oct 2 19:07:14.425985 kernel: audit: type=1334 audit(1696273633.978:85): prog-id=3 op=UNLOAD Oct 2 19:07:14.426168 kernel: audit: type=1334 audit(1696273633.979:86): prog-id=13 op=LOAD Oct 2 19:07:14.426188 kernel: audit: type=1334 audit(1696273633.980:87): prog-id=14 op=LOAD Oct 2 19:07:14.426205 kernel: audit: type=1334 audit(1696273633.980:88): prog-id=4 op=UNLOAD Oct 2 19:07:14.426222 kernel: audit: type=1334 audit(1696273633.980:89): prog-id=5 op=UNLOAD Oct 2 19:07:14.426244 kernel: audit: type=1334 audit(1696273633.983:90): prog-id=15 op=LOAD Oct 2 19:07:14.426262 kernel: audit: type=1334 audit(1696273633.983:91): prog-id=12 op=UNLOAD Oct 2 19:07:14.426280 kernel: audit: type=1334 audit(1696273633.985:92): prog-id=16 op=LOAD Oct 2 19:07:14.426297 kernel: audit: type=1334 audit(1696273633.988:93): prog-id=17 op=LOAD Oct 2 19:07:14.430354 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:07:14.430404 systemd[1]: Stopped iscsiuio.service. Oct 2 19:07:14.430425 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:07:14.430444 systemd[1]: Stopped iscsid.service. Oct 2 19:07:14.430464 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:07:14.430483 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:07:14.430504 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:07:14.430744 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:07:14.430774 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:07:14.430796 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:07:14.430816 systemd[1]: Created slice system-getty.slice. Oct 2 19:07:14.430838 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:07:14.430860 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:07:14.430883 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:07:14.430903 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:07:14.430925 systemd[1]: Created slice user.slice. Oct 2 19:07:14.430959 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:07:14.430981 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:07:14.431004 systemd[1]: Set up automount boot.automount. Oct 2 19:07:14.431025 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:07:14.431045 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:07:14.431065 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:07:14.431086 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:07:14.431107 systemd[1]: Reached target integritysetup.target. Oct 2 19:07:14.431129 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:07:14.431218 systemd[1]: Reached target remote-fs.target. Oct 2 19:07:14.431241 systemd[1]: Reached target slices.target. Oct 2 19:07:14.431262 systemd[1]: Reached target swap.target. Oct 2 19:07:14.431284 systemd[1]: Reached target torcx.target. Oct 2 19:07:14.431306 systemd[1]: Reached target veritysetup.target. Oct 2 19:07:14.431337 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:07:14.431359 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:07:14.431378 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:07:14.431398 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:07:14.431417 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:07:14.431444 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:07:14.431470 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:07:14.431491 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:07:14.431510 systemd[1]: Mounting media.mount... Oct 2 19:07:14.431530 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:07:14.431553 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:07:14.431575 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:07:14.431595 systemd[1]: Mounting tmp.mount... Oct 2 19:07:14.431618 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:07:14.431640 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:07:14.431834 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:07:14.431946 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:07:14.431973 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:07:14.431997 systemd[1]: Starting modprobe@drm.service... Oct 2 19:07:14.432023 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:07:14.432045 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:07:14.432066 systemd[1]: Starting modprobe@loop.service... Oct 2 19:07:14.432090 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:07:14.432112 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:07:14.432189 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:07:14.432216 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:07:14.432236 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:07:14.432343 systemd[1]: Stopped systemd-journald.service. Oct 2 19:07:14.432368 systemd[1]: Starting systemd-journald.service... Oct 2 19:07:14.432390 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:07:14.432412 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:07:14.432431 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:07:14.432450 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:07:14.432469 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:07:14.432487 systemd[1]: Stopped verity-setup.service. Oct 2 19:07:14.432507 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:07:14.432527 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:07:14.432550 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:07:14.432569 systemd[1]: Mounted media.mount. Oct 2 19:07:14.432588 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:07:14.432608 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:07:14.432628 systemd[1]: Mounted tmp.mount. Oct 2 19:07:14.432649 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:07:14.432669 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:07:14.432690 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:07:14.432710 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:07:14.432735 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:07:14.432755 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:07:14.432942 systemd[1]: Finished modprobe@drm.service. Oct 2 19:07:14.432968 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:07:14.432989 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:07:14.433012 kernel: fuse: init (API version 7.34) Oct 2 19:07:14.433034 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:07:14.433054 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:07:14.433075 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:07:14.433095 systemd[1]: Reached target network-pre.target. Oct 2 19:07:14.433118 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:07:14.433145 systemd-journald[1396]: Journal started Oct 2 19:07:14.433387 systemd-journald[1396]: Runtime Journal (/run/log/journal/ec2028b4ce9f92887cbbe0a3ac1a31bc) is 4.8M, max 38.7M, 33.9M free. Oct 2 19:07:07.693000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:07:07.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:07:07.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:07:07.862000 audit: BPF prog-id=10 op=LOAD Oct 2 19:07:07.862000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:07:07.862000 audit: BPF prog-id=11 op=LOAD Oct 2 19:07:07.863000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:07:13.978000 audit: BPF prog-id=12 op=LOAD Oct 2 19:07:13.978000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:07:13.979000 audit: BPF prog-id=13 op=LOAD Oct 2 19:07:13.980000 audit: BPF prog-id=14 op=LOAD Oct 2 19:07:13.980000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:07:13.980000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:07:13.983000 audit: BPF prog-id=15 op=LOAD Oct 2 19:07:13.983000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:07:13.985000 audit: BPF prog-id=16 op=LOAD Oct 2 19:07:13.988000 audit: BPF prog-id=17 op=LOAD Oct 2 19:07:13.988000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:07:13.988000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:07:13.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.461451 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:07:14.461502 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:07:14.461528 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:07:14.461561 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:07:14.461585 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:07:14.461608 kernel: loop: module loaded Oct 2 19:07:14.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.006000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:07:14.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.287000 audit: BPF prog-id=18 op=LOAD Oct 2 19:07:14.287000 audit: BPF prog-id=19 op=LOAD Oct 2 19:07:14.287000 audit: BPF prog-id=20 op=LOAD Oct 2 19:07:14.287000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:07:14.287000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:07:14.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.472523 systemd[1]: Started systemd-journald.service. Oct 2 19:07:14.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.404000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:07:14.404000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffec176fa40 a2=4000 a3=7ffec176fadc items=0 ppid=1 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:14.404000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:07:14.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:13.977566 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:07:08.150781 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:07:13.991579 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:07:08.152495 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:07:14.467559 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:07:08.152532 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:07:14.467704 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:07:08.152579 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:07:14.469370 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:07:08.152597 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:07:14.473031 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:07:08.152715 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:07:08.152736 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:07:08.153274 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:07:08.153539 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:07:08.153567 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:07:08.154767 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:07:08.154805 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:07:08.154825 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:07:08.154840 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:07:14.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.521618 systemd-journald[1396]: Time spent on flushing to /var/log/journal/ec2028b4ce9f92887cbbe0a3ac1a31bc is 136.802ms for 1189 entries. Oct 2 19:07:14.521618 systemd-journald[1396]: System Journal (/var/log/journal/ec2028b4ce9f92887cbbe0a3ac1a31bc) is 8.0M, max 195.6M, 187.6M free. Oct 2 19:07:14.699870 systemd-journald[1396]: Received client request to flush runtime journal. Oct 2 19:07:14.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:08.154859 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:07:14.482403 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:07:08.154873 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:08Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:07:14.492532 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:07:13.096161 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:13Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:07:14.492713 systemd[1]: Finished modprobe@loop.service. Oct 2 19:07:13.096469 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:13Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:07:14.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:14.494684 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:07:13.096582 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:13Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:07:14.497222 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:07:13.096769 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:13Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:07:14.526746 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:07:13.096821 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:13Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:07:14.528457 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:07:13.096878 /usr/lib/systemd/system-generators/torcx-generator[1325]: time="2023-10-02T19:07:13Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:07:14.545724 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:07:14.661034 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:07:14.662593 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:07:14.665815 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:07:14.712138 udevadm[1438]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:07:14.669142 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:07:14.701154 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:07:14.981046 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:07:14.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:15.523305 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:07:15.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:15.527000 audit: BPF prog-id=21 op=LOAD Oct 2 19:07:15.527000 audit: BPF prog-id=22 op=LOAD Oct 2 19:07:15.527000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:07:15.528000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:07:15.531175 systemd[1]: Starting systemd-udevd.service... Oct 2 19:07:15.561842 systemd-udevd[1441]: Using default interface naming scheme 'v252'. Oct 2 19:07:15.654081 systemd[1]: Started systemd-udevd.service. Oct 2 19:07:15.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:15.655000 audit: BPF prog-id=23 op=LOAD Oct 2 19:07:15.659889 systemd[1]: Starting systemd-networkd.service... Oct 2 19:07:15.699000 audit: BPF prog-id=24 op=LOAD Oct 2 19:07:15.699000 audit: BPF prog-id=25 op=LOAD Oct 2 19:07:15.699000 audit: BPF prog-id=26 op=LOAD Oct 2 19:07:15.703838 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:07:15.794712 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:07:15.796151 systemd[1]: Started systemd-userdbd.service. Oct 2 19:07:15.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:15.830108 (udev-worker)[1445]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:07:15.938357 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Oct 2 19:07:15.946340 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:07:15.961428 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Oct 2 19:07:15.960270 systemd-networkd[1447]: lo: Link UP Oct 2 19:07:15.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:15.960285 systemd-networkd[1447]: lo: Gained carrier Oct 2 19:07:15.960922 systemd-networkd[1447]: Enumeration completed Oct 2 19:07:15.961371 systemd[1]: Started systemd-networkd.service. Oct 2 19:07:15.961373 systemd-networkd[1447]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:07:15.964366 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:07:15.971342 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:07:15.971654 systemd-networkd[1447]: eth0: Link UP Oct 2 19:07:15.971959 systemd-networkd[1447]: eth0: Gained carrier Oct 2 19:07:15.983494 systemd-networkd[1447]: eth0: DHCPv4 address 172.31.27.110/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 19:07:15.992339 kernel: ACPI: button: Sleep Button [SLPF] Oct 2 19:07:15.975000 audit[1450]: AVC avc: denied { confidentiality } for pid=1450 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:07:15.975000 audit[1450]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f953b02660 a1=32194 a2=7fec78a72bc5 a3=5 items=106 ppid=1441 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:15.975000 audit: CWD cwd="/" Oct 2 19:07:15.975000 audit: PATH item=0 name=(null) inode=14594 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=1 name=(null) inode=14595 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=2 name=(null) inode=14594 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=3 name=(null) inode=14596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=4 name=(null) inode=14594 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=5 name=(null) inode=14597 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=6 name=(null) inode=14597 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=7 name=(null) inode=14598 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=8 name=(null) inode=14597 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=9 name=(null) inode=14599 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=10 name=(null) inode=14597 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=11 name=(null) inode=14600 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=12 name=(null) inode=14597 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=13 name=(null) inode=14601 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=14 name=(null) inode=14597 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=15 name=(null) inode=14602 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=16 name=(null) inode=14594 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=17 name=(null) inode=14603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=18 name=(null) inode=14603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=19 name=(null) inode=14604 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=20 name=(null) inode=14603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=21 name=(null) inode=14605 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=22 name=(null) inode=14603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=23 name=(null) inode=14606 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=24 name=(null) inode=14603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=25 name=(null) inode=14607 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=26 name=(null) inode=14603 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=27 name=(null) inode=14608 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=28 name=(null) inode=14594 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=29 name=(null) inode=14609 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=30 name=(null) inode=14609 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=31 name=(null) inode=14610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=32 name=(null) inode=14609 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=33 name=(null) inode=14611 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=34 name=(null) inode=14609 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=35 name=(null) inode=14612 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=36 name=(null) inode=14609 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=37 name=(null) inode=14613 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=38 name=(null) inode=14609 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=39 name=(null) inode=14614 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=40 name=(null) inode=14594 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=41 name=(null) inode=14615 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=42 name=(null) inode=14615 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=43 name=(null) inode=14616 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=44 name=(null) inode=14615 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=45 name=(null) inode=14617 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=46 name=(null) inode=14615 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=47 name=(null) inode=14618 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=48 name=(null) inode=14615 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=49 name=(null) inode=14619 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=50 name=(null) inode=14615 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=51 name=(null) inode=14620 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=52 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=53 name=(null) inode=14621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=54 name=(null) inode=14621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=55 name=(null) inode=14622 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=56 name=(null) inode=14621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=57 name=(null) inode=14623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=58 name=(null) inode=14621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=59 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=60 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=61 name=(null) inode=14625 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=62 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=63 name=(null) inode=14626 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=64 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=65 name=(null) inode=14627 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=66 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=67 name=(null) inode=14628 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=68 name=(null) inode=14624 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=69 name=(null) inode=14629 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=70 name=(null) inode=14621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=71 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=72 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=73 name=(null) inode=14631 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=74 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=75 name=(null) inode=14632 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=76 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=77 name=(null) inode=14633 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=78 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=79 name=(null) inode=14634 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=80 name=(null) inode=14630 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=81 name=(null) inode=14635 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=82 name=(null) inode=14621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=83 name=(null) inode=14636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=84 name=(null) inode=14636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=85 name=(null) inode=14637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=86 name=(null) inode=14636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=87 name=(null) inode=14638 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=88 name=(null) inode=14636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=89 name=(null) inode=14639 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=90 name=(null) inode=14636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=91 name=(null) inode=14640 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=92 name=(null) inode=14636 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=93 name=(null) inode=14641 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=94 name=(null) inode=14621 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=95 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=96 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=97 name=(null) inode=14643 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=98 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=99 name=(null) inode=14644 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=100 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=101 name=(null) inode=14645 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=102 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=103 name=(null) inode=14646 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=104 name=(null) inode=14642 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PATH item=105 name=(null) inode=14647 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:07:15.975000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:07:16.061342 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Oct 2 19:07:16.068332 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5 Oct 2 19:07:16.082355 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:07:16.099365 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1443) Oct 2 19:07:16.270898 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:07:16.386986 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:07:16.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:16.402642 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:07:16.473836 lvm[1555]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:07:16.515027 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:07:16.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:16.518029 systemd[1]: Reached target cryptsetup.target. Oct 2 19:07:16.522546 systemd[1]: Starting lvm2-activation.service... Oct 2 19:07:16.532341 lvm[1556]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:07:16.563893 systemd[1]: Finished lvm2-activation.service. Oct 2 19:07:16.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:16.566300 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:07:16.570383 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:07:16.570482 systemd[1]: Reached target local-fs.target. Oct 2 19:07:16.576523 systemd[1]: Reached target machines.target. Oct 2 19:07:16.587377 systemd[1]: Starting ldconfig.service... Oct 2 19:07:16.590331 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:07:16.590426 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:07:16.592207 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:07:16.595878 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:07:16.599339 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:07:16.602087 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:07:16.602197 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:07:16.604574 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:07:16.621913 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1558 (bootctl) Oct 2 19:07:16.624557 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:07:16.650419 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:07:16.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:16.688381 systemd-tmpfiles[1561]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:07:16.720612 systemd-tmpfiles[1561]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:07:16.731264 systemd-tmpfiles[1561]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:07:16.895077 systemd-fsck[1566]: fsck.fat 4.2 (2021-01-31) Oct 2 19:07:16.895077 systemd-fsck[1566]: /dev/nvme0n1p1: 789 files, 115069/258078 clusters Oct 2 19:07:16.906833 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:07:16.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:16.917359 systemd[1]: Mounting boot.mount... Oct 2 19:07:16.943336 systemd[1]: Mounted boot.mount. Oct 2 19:07:16.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:16.994383 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:07:17.133326 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:07:17.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:17.137629 systemd[1]: Starting audit-rules.service... Oct 2 19:07:17.141522 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:07:17.147419 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:07:17.149000 audit: BPF prog-id=27 op=LOAD Oct 2 19:07:17.154000 audit: BPF prog-id=28 op=LOAD Oct 2 19:07:17.153101 systemd[1]: Starting systemd-resolved.service... Oct 2 19:07:17.158175 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:07:17.162525 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:07:17.182423 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:07:17.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:17.182000 audit[1587]: SYSTEM_BOOT pid=1587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:07:17.186305 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:07:17.189259 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:07:17.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:17.299995 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:07:17.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:17.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:17.412976 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:07:17.414551 systemd[1]: Reached target time-set.target. Oct 2 19:07:17.447000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:07:17.447000 audit[1602]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc76eff910 a2=420 a3=0 items=0 ppid=1581 pid=1602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:17.447000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:07:17.448943 augenrules[1602]: No rules Oct 2 19:07:17.449529 systemd[1]: Finished audit-rules.service. Oct 2 19:07:17.457596 systemd-resolved[1584]: Positive Trust Anchors: Oct 2 19:07:17.457614 systemd-resolved[1584]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:07:17.457655 systemd-resolved[1584]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:07:17.658102 systemd-resolved[1584]: Defaulting to hostname 'linux'. Oct 2 19:07:17.662723 systemd[1]: Started systemd-resolved.service. Oct 2 19:07:17.664206 systemd[1]: Reached target network.target. Oct 2 19:07:17.666044 systemd[1]: Reached target nss-lookup.target. Oct 2 19:07:17.735307 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:07:17.738441 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:07:17.739009 systemd-networkd[1447]: eth0: Gained IPv6LL Oct 2 19:07:17.742806 systemd-timesyncd[1586]: Network configuration changed, trying to establish connection. Oct 2 19:07:17.744202 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:07:17.745701 systemd[1]: Reached target network-online.target. Oct 2 19:07:18.287298 ldconfig[1557]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:07:18.294012 systemd[1]: Finished ldconfig.service. Oct 2 19:07:18.296801 systemd[1]: Starting systemd-update-done.service... Oct 2 19:07:18.307113 systemd[1]: Finished systemd-update-done.service. Oct 2 19:07:18.308710 systemd[1]: Reached target sysinit.target. Oct 2 19:07:18.310398 systemd[1]: Started motdgen.path. Oct 2 19:07:18.311485 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:07:18.313304 systemd[1]: Started logrotate.timer. Oct 2 19:07:18.314737 systemd[1]: Started mdadm.timer. Oct 2 19:07:18.315806 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:07:18.317369 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:07:18.317420 systemd[1]: Reached target paths.target. Oct 2 19:07:18.318398 systemd[1]: Reached target timers.target. Oct 2 19:07:18.319908 systemd[1]: Listening on dbus.socket. Oct 2 19:07:18.322427 systemd[1]: Starting docker.socket... Oct 2 19:07:18.327691 systemd[1]: Listening on sshd.socket. Oct 2 19:07:18.329208 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:07:18.330056 systemd[1]: Listening on docker.socket. Oct 2 19:07:18.331217 systemd[1]: Reached target sockets.target. Oct 2 19:07:18.332352 systemd[1]: Reached target basic.target. Oct 2 19:07:18.333547 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:07:18.333576 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:07:18.334905 systemd[1]: Started amazon-ssm-agent.service. Oct 2 19:07:18.337984 systemd[1]: Starting containerd.service... Oct 2 19:07:18.342593 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:07:18.346447 systemd[1]: Starting dbus.service... Oct 2 19:07:18.349610 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:07:18.353091 systemd[1]: Starting extend-filesystems.service... Oct 2 19:07:18.354521 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:07:18.358329 systemd[1]: Starting motdgen.service... Oct 2 19:07:18.363526 systemd[1]: Started nvidia.service. Oct 2 19:07:18.366633 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:07:18.382297 systemd[1]: Starting prepare-critools.service... Oct 2 19:07:18.387208 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:07:18.390271 systemd[1]: Starting sshd-keygen.service... Oct 2 19:07:18.408806 systemd[1]: Starting systemd-logind.service... Oct 2 19:07:18.460005 jq[1614]: false Oct 2 19:07:18.409903 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:07:18.409980 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:07:18.555688 jq[1624]: true Oct 2 19:07:18.411701 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:07:18.415506 systemd[1]: Starting update-engine.service... Oct 2 19:07:18.581422 tar[1626]: ./ Oct 2 19:07:18.581422 tar[1626]: ./loopback Oct 2 19:07:18.420188 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:07:18.461652 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:07:18.462017 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:07:18.662697 jq[1630]: true Oct 2 19:07:18.668565 tar[1627]: crictl Oct 2 19:07:18.530656 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:07:18.531280 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:07:18.689468 extend-filesystems[1615]: Found nvme0n1 Oct 2 19:07:18.740870 extend-filesystems[1615]: Found nvme0n1p1 Oct 2 19:07:18.740870 extend-filesystems[1615]: Found nvme0n1p2 Oct 2 19:07:18.740870 extend-filesystems[1615]: Found nvme0n1p3 Oct 2 19:07:18.740870 extend-filesystems[1615]: Found usr Oct 2 19:07:18.740870 extend-filesystems[1615]: Found nvme0n1p4 Oct 2 19:07:18.740870 extend-filesystems[1615]: Found nvme0n1p6 Oct 2 19:07:18.740870 extend-filesystems[1615]: Found nvme0n1p7 Oct 2 19:07:18.740870 extend-filesystems[1615]: Found nvme0n1p9 Oct 2 19:07:18.740870 extend-filesystems[1615]: Checking size of /dev/nvme0n1p9 Oct 2 19:07:18.837177 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Oct 2 19:07:18.693817 dbus-daemon[1613]: [system] SELinux support is enabled Oct 2 19:07:18.694019 systemd[1]: Started dbus.service. Oct 2 19:07:18.839725 extend-filesystems[1615]: Resized partition /dev/nvme0n1p9 Oct 2 19:07:18.849492 amazon-ssm-agent[1610]: 2023/10/02 19:07:18 Failed to load instance info from vault. RegistrationKey does not exist. Oct 2 19:07:18.776361 dbus-daemon[1613]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1447 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 19:07:18.747297 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:07:18.850109 extend-filesystems[1666]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:07:18.806955 dbus-daemon[1613]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:07:18.747353 systemd[1]: Reached target system-config.target. Oct 2 19:07:18.749760 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:07:18.749786 systemd[1]: Reached target user-config.target. Oct 2 19:07:18.812413 systemd[1]: Starting systemd-hostnamed.service... Oct 2 19:07:18.837739 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:07:18.837944 systemd[1]: Finished motdgen.service. Oct 2 19:07:18.894625 amazon-ssm-agent[1610]: Initializing new seelog logger Oct 2 19:07:18.894781 amazon-ssm-agent[1610]: New Seelog Logger Creation Complete Oct 2 19:07:18.894878 amazon-ssm-agent[1610]: 2023/10/02 19:07:18 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:07:18.894878 amazon-ssm-agent[1610]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 19:07:18.895223 amazon-ssm-agent[1610]: 2023/10/02 19:07:18 processing appconfig overrides Oct 2 19:07:18.908360 env[1629]: time="2023-10-02T19:07:18.908293804Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:07:18.958797 update_engine[1623]: I1002 19:07:18.957629 1623 main.cc:92] Flatcar Update Engine starting Oct 2 19:07:18.986150 update_engine[1623]: I1002 19:07:18.973839 1623 update_check_scheduler.cc:74] Next update check in 9m57s Oct 2 19:07:18.973541 systemd[1]: Started update-engine.service. Oct 2 19:07:18.987684 systemd[1]: Started locksmithd.service. Oct 2 19:07:19.021361 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Oct 2 19:07:19.049621 systemd-logind[1622]: Watching system buttons on /dev/input/event1 (Power Button) Oct 2 19:07:19.049656 systemd-logind[1622]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 19:07:19.049681 systemd-logind[1622]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:07:19.055219 extend-filesystems[1666]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Oct 2 19:07:19.055219 extend-filesystems[1666]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 2 19:07:19.055219 extend-filesystems[1666]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Oct 2 19:07:19.064127 extend-filesystems[1615]: Resized filesystem in /dev/nvme0n1p9 Oct 2 19:07:19.056228 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:07:19.056465 systemd[1]: Finished extend-filesystems.service. Oct 2 19:07:19.056514 systemd-logind[1622]: New seat seat0. Oct 2 19:07:19.067289 systemd[1]: Started systemd-logind.service. Oct 2 19:07:19.069418 bash[1681]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:07:19.070378 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:07:19.097905 tar[1626]: ./bandwidth Oct 2 19:07:19.102584 env[1629]: time="2023-10-02T19:07:19.102532198Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:07:19.102888 env[1629]: time="2023-10-02T19:07:19.102865041Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:19.104957 env[1629]: time="2023-10-02T19:07:19.104903944Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:07:19.104957 env[1629]: time="2023-10-02T19:07:19.104951399Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:19.105354 env[1629]: time="2023-10-02T19:07:19.105284359Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:07:19.105354 env[1629]: time="2023-10-02T19:07:19.105334796Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:19.105868 env[1629]: time="2023-10-02T19:07:19.105355796Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:07:19.105868 env[1629]: time="2023-10-02T19:07:19.105371847Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:19.105868 env[1629]: time="2023-10-02T19:07:19.105855902Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:19.106234 env[1629]: time="2023-10-02T19:07:19.106205514Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:07:19.106459 env[1629]: time="2023-10-02T19:07:19.106430745Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:07:19.106519 env[1629]: time="2023-10-02T19:07:19.106461626Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:07:19.106741 env[1629]: time="2023-10-02T19:07:19.106534758Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:07:19.106741 env[1629]: time="2023-10-02T19:07:19.106692922Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:07:19.114512 env[1629]: time="2023-10-02T19:07:19.114465103Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:07:19.114707 env[1629]: time="2023-10-02T19:07:19.114521299Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:07:19.114707 env[1629]: time="2023-10-02T19:07:19.114540520Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:07:19.114707 env[1629]: time="2023-10-02T19:07:19.114585198Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:07:19.114707 env[1629]: time="2023-10-02T19:07:19.114677046Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:07:19.114707 env[1629]: time="2023-10-02T19:07:19.114697286Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:07:19.114898 env[1629]: time="2023-10-02T19:07:19.114715726Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:07:19.114898 env[1629]: time="2023-10-02T19:07:19.114735061Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:07:19.114898 env[1629]: time="2023-10-02T19:07:19.114755361Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:07:19.114898 env[1629]: time="2023-10-02T19:07:19.114778024Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:07:19.114898 env[1629]: time="2023-10-02T19:07:19.114799864Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:07:19.114898 env[1629]: time="2023-10-02T19:07:19.114820102Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:07:19.115126 env[1629]: time="2023-10-02T19:07:19.114984392Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:07:19.115126 env[1629]: time="2023-10-02T19:07:19.115090934Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:07:19.119236 env[1629]: time="2023-10-02T19:07:19.119186481Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:07:19.119381 env[1629]: time="2023-10-02T19:07:19.119255073Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:07:19.119381 env[1629]: time="2023-10-02T19:07:19.119277854Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:07:19.119381 env[1629]: time="2023-10-02T19:07:19.119353067Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:07:19.119381 env[1629]: time="2023-10-02T19:07:19.119372785Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:07:19.119536 env[1629]: time="2023-10-02T19:07:19.119390907Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:07:19.119536 env[1629]: time="2023-10-02T19:07:19.119410570Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:07:19.119536 env[1629]: time="2023-10-02T19:07:19.119430182Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:07:19.119536 env[1629]: time="2023-10-02T19:07:19.119448561Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:07:19.119536 env[1629]: time="2023-10-02T19:07:19.119466868Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:07:19.119536 env[1629]: time="2023-10-02T19:07:19.119484615Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:07:19.119536 env[1629]: time="2023-10-02T19:07:19.119513790Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:07:19.119832 env[1629]: time="2023-10-02T19:07:19.119705182Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:07:19.119832 env[1629]: time="2023-10-02T19:07:19.119729731Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:07:19.119832 env[1629]: time="2023-10-02T19:07:19.119749982Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:07:19.119832 env[1629]: time="2023-10-02T19:07:19.119768795Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:07:19.119832 env[1629]: time="2023-10-02T19:07:19.119790839Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:07:19.119832 env[1629]: time="2023-10-02T19:07:19.119807379Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:07:19.120056 env[1629]: time="2023-10-02T19:07:19.119835627Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:07:19.120056 env[1629]: time="2023-10-02T19:07:19.119890982Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:07:19.120244 env[1629]: time="2023-10-02T19:07:19.120174026Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:07:19.125582 env[1629]: time="2023-10-02T19:07:19.120260930Z" level=info msg="Connect containerd service" Oct 2 19:07:19.125582 env[1629]: time="2023-10-02T19:07:19.120337874Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:07:19.125582 env[1629]: time="2023-10-02T19:07:19.121263125Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:07:19.125582 env[1629]: time="2023-10-02T19:07:19.121622141Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:07:19.125582 env[1629]: time="2023-10-02T19:07:19.121672445Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:07:19.125582 env[1629]: time="2023-10-02T19:07:19.124258369Z" level=info msg="containerd successfully booted in 0.222300s" Oct 2 19:07:19.125582 env[1629]: time="2023-10-02T19:07:19.124753922Z" level=info msg="Start subscribing containerd event" Oct 2 19:07:19.125582 env[1629]: time="2023-10-02T19:07:19.124817787Z" level=info msg="Start recovering state" Oct 2 19:07:19.125582 env[1629]: time="2023-10-02T19:07:19.124908277Z" level=info msg="Start event monitor" Oct 2 19:07:19.125582 env[1629]: time="2023-10-02T19:07:19.124936282Z" level=info msg="Start snapshots syncer" Oct 2 19:07:19.125582 env[1629]: time="2023-10-02T19:07:19.124950870Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:07:19.125582 env[1629]: time="2023-10-02T19:07:19.124962085Z" level=info msg="Start streaming server" Oct 2 19:07:19.121828 systemd[1]: Started containerd.service. Oct 2 19:07:19.286395 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 19:07:19.366852 dbus-daemon[1613]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 19:07:19.367052 systemd[1]: Started systemd-hostnamed.service. Oct 2 19:07:19.367931 dbus-daemon[1613]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1668 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 19:07:19.373512 systemd[1]: Starting polkit.service... Oct 2 19:07:19.398119 polkitd[1734]: Started polkitd version 121 Oct 2 19:07:19.429689 polkitd[1734]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 19:07:19.429780 polkitd[1734]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 19:07:19.440150 polkitd[1734]: Finished loading, compiling and executing 2 rules Oct 2 19:07:19.440769 dbus-daemon[1613]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 19:07:19.441647 systemd[1]: Started polkit.service. Oct 2 19:07:19.444427 polkitd[1734]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 19:07:19.518169 systemd-hostnamed[1668]: Hostname set to (transient) Oct 2 19:07:19.518295 systemd-resolved[1584]: System hostname changed to 'ip-172-31-27-110'. Oct 2 19:07:19.567473 tar[1626]: ./ptp Oct 2 19:07:19.899043 tar[1626]: ./vlan Oct 2 19:07:19.940359 coreos-metadata[1612]: Oct 02 19:07:19.931 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Oct 2 19:07:19.946675 coreos-metadata[1612]: Oct 02 19:07:19.946 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Oct 2 19:07:19.947609 coreos-metadata[1612]: Oct 02 19:07:19.947 INFO Fetch successful Oct 2 19:07:19.947781 coreos-metadata[1612]: Oct 02 19:07:19.947 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 2 19:07:19.948732 coreos-metadata[1612]: Oct 02 19:07:19.948 INFO Fetch successful Oct 2 19:07:19.957437 unknown[1612]: wrote ssh authorized keys file for user: core Oct 2 19:07:19.993170 update-ssh-keys[1798]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:07:19.993505 amazon-ssm-agent[1610]: 2023-10-02 19:07:19 INFO Entering SSM Agent hibernate - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-01372ad815180da6e is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-01372ad815180da6e because no identity-based policy allows the ssm:UpdateInstanceInformation action Oct 2 19:07:19.993505 amazon-ssm-agent[1610]: status code: 400, request id: 8786e08c-ace2-4987-9150-c7ed152695b3 Oct 2 19:07:19.993505 amazon-ssm-agent[1610]: 2023-10-02 19:07:19 INFO Agent is in hibernate mode. Reducing logging. Logging will be reduced to one log per backoff period Oct 2 19:07:19.993409 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:07:20.039394 tar[1626]: ./host-device Oct 2 19:07:20.106340 tar[1626]: ./tuning Oct 2 19:07:20.191872 tar[1626]: ./vrf Oct 2 19:07:20.268818 tar[1626]: ./sbr Oct 2 19:07:20.321171 tar[1626]: ./tap Oct 2 19:07:20.383340 tar[1626]: ./dhcp Oct 2 19:07:20.509032 systemd[1]: Finished prepare-critools.service. Oct 2 19:07:20.586128 tar[1626]: ./static Oct 2 19:07:20.647643 tar[1626]: ./firewall Oct 2 19:07:20.714070 tar[1626]: ./macvlan Oct 2 19:07:20.773415 tar[1626]: ./dummy Oct 2 19:07:20.835496 tar[1626]: ./bridge Oct 2 19:07:20.894022 tar[1626]: ./ipvlan Oct 2 19:07:20.955664 tar[1626]: ./portmap Oct 2 19:07:21.032303 tar[1626]: ./host-local Oct 2 19:07:21.113035 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:07:21.171254 locksmithd[1692]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:07:21.985038 sshd_keygen[1661]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:07:22.011560 systemd[1]: Finished sshd-keygen.service. Oct 2 19:07:22.015720 systemd[1]: Starting issuegen.service... Oct 2 19:07:22.025639 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:07:22.025855 systemd[1]: Finished issuegen.service. Oct 2 19:07:22.029657 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:07:22.040144 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:07:22.045877 systemd[1]: Started getty@tty1.service. Oct 2 19:07:22.050680 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:07:22.053631 systemd[1]: Reached target getty.target. Oct 2 19:07:22.056569 systemd[1]: Reached target multi-user.target. Oct 2 19:07:22.060229 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:07:22.075126 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:07:22.075520 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:07:22.079143 systemd[1]: Startup finished in 860ms (kernel) + 13.640s (initrd) + 14.562s (userspace) = 29.063s. Oct 2 19:07:27.598616 systemd[1]: Created slice system-sshd.slice. Oct 2 19:07:27.600736 systemd[1]: Started sshd@0-172.31.27.110:22-139.178.89.65:50736.service. Oct 2 19:07:27.805492 sshd[1821]: Accepted publickey for core from 139.178.89.65 port 50736 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:27.808897 sshd[1821]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:27.823357 systemd[1]: Created slice user-500.slice. Oct 2 19:07:27.825167 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:07:27.830393 systemd-logind[1622]: New session 1 of user core. Oct 2 19:07:27.839159 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:07:27.841494 systemd[1]: Starting user@500.service... Oct 2 19:07:27.846219 (systemd)[1824]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:27.970721 systemd[1824]: Queued start job for default target default.target. Oct 2 19:07:27.971572 systemd[1824]: Reached target paths.target. Oct 2 19:07:27.971607 systemd[1824]: Reached target sockets.target. Oct 2 19:07:27.971625 systemd[1824]: Reached target timers.target. Oct 2 19:07:27.971642 systemd[1824]: Reached target basic.target. Oct 2 19:07:27.971701 systemd[1824]: Reached target default.target. Oct 2 19:07:27.971740 systemd[1824]: Startup finished in 117ms. Oct 2 19:07:27.972530 systemd[1]: Started user@500.service. Oct 2 19:07:27.973611 systemd[1]: Started session-1.scope. Oct 2 19:07:28.139499 systemd[1]: Started sshd@1-172.31.27.110:22-139.178.89.65:50746.service. Oct 2 19:07:28.323621 sshd[1833]: Accepted publickey for core from 139.178.89.65 port 50746 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:28.326188 sshd[1833]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:28.336379 systemd-logind[1622]: New session 2 of user core. Oct 2 19:07:28.338049 systemd[1]: Started session-2.scope. Oct 2 19:07:28.467569 sshd[1833]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:28.473284 systemd[1]: sshd@1-172.31.27.110:22-139.178.89.65:50746.service: Deactivated successfully. Oct 2 19:07:28.474755 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 19:07:28.475605 systemd-logind[1622]: Session 2 logged out. Waiting for processes to exit. Oct 2 19:07:28.477101 systemd-logind[1622]: Removed session 2. Oct 2 19:07:28.497044 systemd[1]: Started sshd@2-172.31.27.110:22-139.178.89.65:50758.service. Oct 2 19:07:28.660211 sshd[1839]: Accepted publickey for core from 139.178.89.65 port 50758 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:28.661547 sshd[1839]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:28.670945 systemd-logind[1622]: New session 3 of user core. Oct 2 19:07:28.671649 systemd[1]: Started session-3.scope. Oct 2 19:07:28.795617 sshd[1839]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:28.801629 systemd[1]: sshd@2-172.31.27.110:22-139.178.89.65:50758.service: Deactivated successfully. Oct 2 19:07:28.802530 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 19:07:28.803667 systemd-logind[1622]: Session 3 logged out. Waiting for processes to exit. Oct 2 19:07:28.805009 systemd-logind[1622]: Removed session 3. Oct 2 19:07:28.822561 systemd[1]: Started sshd@3-172.31.27.110:22-139.178.89.65:50766.service. Oct 2 19:07:28.994418 sshd[1845]: Accepted publickey for core from 139.178.89.65 port 50766 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:28.996944 sshd[1845]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:29.003057 systemd[1]: Started session-4.scope. Oct 2 19:07:29.003654 systemd-logind[1622]: New session 4 of user core. Oct 2 19:07:29.134108 sshd[1845]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:29.141392 systemd[1]: sshd@3-172.31.27.110:22-139.178.89.65:50766.service: Deactivated successfully. Oct 2 19:07:29.144789 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:07:29.146876 systemd-logind[1622]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:07:29.154121 systemd-logind[1622]: Removed session 4. Oct 2 19:07:29.161830 systemd[1]: Started sshd@4-172.31.27.110:22-139.178.89.65:50780.service. Oct 2 19:07:29.329999 sshd[1851]: Accepted publickey for core from 139.178.89.65 port 50780 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:29.331694 sshd[1851]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:29.338126 systemd[1]: Started session-5.scope. Oct 2 19:07:29.339248 systemd-logind[1622]: New session 5 of user core. Oct 2 19:07:29.482277 sudo[1854]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:07:29.482606 sudo[1854]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:07:29.493983 dbus-daemon[1613]: \xd0]I\xe1\u000dV: received setenforce notice (enforcing=1790355712) Oct 2 19:07:29.497750 sudo[1854]: pam_unix(sudo:session): session closed for user root Oct 2 19:07:29.522928 sshd[1851]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:29.527163 systemd[1]: sshd@4-172.31.27.110:22-139.178.89.65:50780.service: Deactivated successfully. Oct 2 19:07:29.528217 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:07:29.529129 systemd-logind[1622]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:07:29.530211 systemd-logind[1622]: Removed session 5. Oct 2 19:07:29.549813 systemd[1]: Started sshd@5-172.31.27.110:22-139.178.89.65:50796.service. Oct 2 19:07:29.732120 sshd[1858]: Accepted publickey for core from 139.178.89.65 port 50796 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:29.733598 sshd[1858]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:29.741206 systemd-logind[1622]: New session 6 of user core. Oct 2 19:07:29.741802 systemd[1]: Started session-6.scope. Oct 2 19:07:29.842834 sudo[1862]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:07:29.843262 sudo[1862]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:07:29.847236 sudo[1862]: pam_unix(sudo:session): session closed for user root Oct 2 19:07:29.854253 sudo[1861]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:07:29.854581 sudo[1861]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:07:29.868081 systemd[1]: Stopping audit-rules.service... Oct 2 19:07:29.868000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:07:29.871510 kernel: kauditd_printk_skb: 183 callbacks suppressed Oct 2 19:07:29.871576 kernel: audit: type=1305 audit(1696273649.868:164): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:07:29.868000 audit[1865]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc3611a0b0 a2=420 a3=0 items=0 ppid=1 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:29.875033 auditctl[1865]: No rules Oct 2 19:07:29.876204 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:07:29.876515 systemd[1]: Stopped audit-rules.service. Oct 2 19:07:29.885856 kernel: audit: type=1300 audit(1696273649.868:164): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc3611a0b0 a2=420 a3=0 items=0 ppid=1 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:29.887049 systemd[1]: Starting audit-rules.service... Oct 2 19:07:29.868000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:07:29.891351 kernel: audit: type=1327 audit(1696273649.868:164): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:07:29.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:29.897615 kernel: audit: type=1131 audit(1696273649.873:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:29.913836 augenrules[1882]: No rules Oct 2 19:07:29.914522 systemd[1]: Finished audit-rules.service. Oct 2 19:07:29.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:29.916000 sudo[1861]: pam_unix(sudo:session): session closed for user root Oct 2 19:07:29.914000 audit[1861]: USER_END pid=1861 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:29.936996 kernel: audit: type=1130 audit(1696273649.913:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:29.937209 kernel: audit: type=1106 audit(1696273649.914:167): pid=1861 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:29.937502 kernel: audit: type=1104 audit(1696273649.914:168): pid=1861 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:29.914000 audit[1861]: CRED_DISP pid=1861 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:29.943495 sshd[1858]: pam_unix(sshd:session): session closed for user core Oct 2 19:07:29.943000 audit[1858]: USER_END pid=1858 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:29.947580 systemd[1]: sshd@5-172.31.27.110:22-139.178.89.65:50796.service: Deactivated successfully. Oct 2 19:07:29.948951 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:07:29.951367 systemd-logind[1622]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:07:29.952732 systemd-logind[1622]: Removed session 6. Oct 2 19:07:29.943000 audit[1858]: CRED_DISP pid=1858 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:29.961676 kernel: audit: type=1106 audit(1696273649.943:169): pid=1858 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:29.961807 kernel: audit: type=1104 audit(1696273649.943:170): pid=1858 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:29.961841 kernel: audit: type=1131 audit(1696273649.946:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.110:22-139.178.89.65:50796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:29.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.27.110:22-139.178.89.65:50796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:29.969771 systemd[1]: Started sshd@6-172.31.27.110:22-139.178.89.65:50806.service. Oct 2 19:07:29.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.110:22-139.178.89.65:50806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:30.128000 audit[1888]: USER_ACCT pid=1888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:30.130445 sshd[1888]: Accepted publickey for core from 139.178.89.65 port 50806 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:07:30.130000 audit[1888]: CRED_ACQ pid=1888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:30.130000 audit[1888]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe25b5fae0 a2=3 a3=0 items=0 ppid=1 pid=1888 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:30.130000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:07:30.132639 sshd[1888]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:07:30.152577 systemd-logind[1622]: New session 7 of user core. Oct 2 19:07:30.153042 systemd[1]: Started session-7.scope. Oct 2 19:07:30.160000 audit[1888]: USER_START pid=1888 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:30.164000 audit[1890]: CRED_ACQ pid=1890 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:07:30.254000 audit[1891]: USER_ACCT pid=1891 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:30.255000 audit[1891]: CRED_REFR pid=1891 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:30.256415 sudo[1891]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:07:30.256632 sudo[1891]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:07:30.257000 audit[1891]: USER_START pid=1891 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:07:30.960549 systemd[1]: Starting docker.service... Oct 2 19:07:31.032467 env[1906]: time="2023-10-02T19:07:31.032417816Z" level=info msg="Starting up" Oct 2 19:07:31.034615 env[1906]: time="2023-10-02T19:07:31.034578176Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:07:31.034615 env[1906]: time="2023-10-02T19:07:31.034604605Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:07:31.034756 env[1906]: time="2023-10-02T19:07:31.034630370Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:07:31.034756 env[1906]: time="2023-10-02T19:07:31.034643473Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:07:31.037155 env[1906]: time="2023-10-02T19:07:31.037121433Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:07:31.037155 env[1906]: time="2023-10-02T19:07:31.037144245Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:07:31.037454 env[1906]: time="2023-10-02T19:07:31.037165503Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:07:31.037454 env[1906]: time="2023-10-02T19:07:31.037179256Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:07:31.047756 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport478475103-merged.mount: Deactivated successfully. Oct 2 19:07:31.124169 env[1906]: time="2023-10-02T19:07:31.124067073Z" level=info msg="Loading containers: start." Oct 2 19:07:31.249000 audit[1936]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:31.249000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc89381090 a2=0 a3=7ffc8938107c items=0 ppid=1906 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.249000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:07:31.254000 audit[1938]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:31.254000 audit[1938]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe5ba8a0f0 a2=0 a3=7ffe5ba8a0dc items=0 ppid=1906 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.254000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:07:31.256000 audit[1940]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:31.256000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc6d154130 a2=0 a3=7ffc6d15411c items=0 ppid=1906 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.256000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:07:31.259000 audit[1942]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:31.259000 audit[1942]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc4c005ee0 a2=0 a3=7ffc4c005ecc items=0 ppid=1906 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.259000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:07:31.262000 audit[1944]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1944 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:31.262000 audit[1944]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff425f2aa0 a2=0 a3=7fff425f2a8c items=0 ppid=1906 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.262000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:07:31.279000 audit[1949]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1949 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:31.279000 audit[1949]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda01da2a0 a2=0 a3=7ffda01da28c items=0 ppid=1906 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.279000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:07:31.293000 audit[1951]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1951 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:31.293000 audit[1951]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe5c918f90 a2=0 a3=7ffe5c918f7c items=0 ppid=1906 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.293000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:07:31.296000 audit[1953]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1953 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:31.296000 audit[1953]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff8f2e74e0 a2=0 a3=7fff8f2e74cc items=0 ppid=1906 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.296000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:07:31.300000 audit[1955]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1955 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:31.300000 audit[1955]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffeabf3f220 a2=0 a3=7ffeabf3f20c items=0 ppid=1906 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.300000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:07:31.315000 audit[1959]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:31.315000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcfc60c520 a2=0 a3=7ffcfc60c50c items=0 ppid=1906 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.315000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:07:31.318000 audit[1960]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1960 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:31.318000 audit[1960]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff2ac657b0 a2=0 a3=7fff2ac6579c items=0 ppid=1906 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.318000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:07:31.335342 kernel: Initializing XFRM netlink socket Oct 2 19:07:31.408057 env[1906]: time="2023-10-02T19:07:31.408011896Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:07:31.409164 (udev-worker)[1915]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:07:31.409533 systemd-timesyncd[1586]: Network configuration changed, trying to establish connection. Oct 2 19:07:32.438549 systemd-timesyncd[1586]: Contacted time server 104.167.241.253:123 (2.flatcar.pool.ntp.org). Oct 2 19:07:32.438643 systemd-timesyncd[1586]: Initial clock synchronization to Mon 2023-10-02 19:07:32.437200 UTC. Oct 2 19:07:32.439341 systemd-resolved[1584]: Clock change detected. Flushing caches. Oct 2 19:07:31.507000 audit[1968]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1968 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:31.507000 audit[1968]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffcfb45a60 a2=0 a3=7fffcfb45a4c items=0 ppid=1906 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:31.507000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:07:32.461000 audit[1972]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1972 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:32.461000 audit[1972]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe4c3f0980 a2=0 a3=7ffe4c3f096c items=0 ppid=1906 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:32.461000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:07:32.467000 audit[1975]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1975 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:32.467000 audit[1975]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdac6efe00 a2=0 a3=7ffdac6efdec items=0 ppid=1906 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:32.467000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:07:32.471000 audit[1977]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1977 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:32.471000 audit[1977]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc182ac2d0 a2=0 a3=7ffc182ac2bc items=0 ppid=1906 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:32.471000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:07:32.474000 audit[1979]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:32.474000 audit[1979]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe86332c70 a2=0 a3=7ffe86332c5c items=0 ppid=1906 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:32.474000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:07:32.477000 audit[1981]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:32.477000 audit[1981]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd8b5a0ba0 a2=0 a3=7ffd8b5a0b8c items=0 ppid=1906 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:32.477000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:07:32.490000 audit[1983]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1983 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:32.490000 audit[1983]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd16519df0 a2=0 a3=7ffd16519ddc items=0 ppid=1906 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:32.490000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:07:32.505000 audit[1986]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1986 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:32.505000 audit[1986]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd70219cf0 a2=0 a3=7ffd70219cdc items=0 ppid=1906 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:32.505000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:07:32.509000 audit[1988]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:32.509000 audit[1988]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff714fc580 a2=0 a3=7fff714fc56c items=0 ppid=1906 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:32.509000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:07:32.512000 audit[1990]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:32.512000 audit[1990]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffda498d640 a2=0 a3=7ffda498d62c items=0 ppid=1906 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:32.512000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:07:32.516000 audit[1992]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:32.516000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb14f6d40 a2=0 a3=7ffdb14f6d2c items=0 ppid=1906 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:32.516000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:07:32.517207 systemd-networkd[1447]: docker0: Link UP Oct 2 19:07:32.535000 audit[1996]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1996 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:32.535000 audit[1996]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffba6bb1e0 a2=0 a3=7fffba6bb1cc items=0 ppid=1906 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:32.535000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:07:32.536000 audit[1997]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:32.536000 audit[1997]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff8e7ceb40 a2=0 a3=7fff8e7ceb2c items=0 ppid=1906 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:32.536000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:07:32.537739 env[1906]: time="2023-10-02T19:07:32.537706388Z" level=info msg="Loading containers: done." Oct 2 19:07:32.567685 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1505985874-merged.mount: Deactivated successfully. Oct 2 19:07:32.601182 env[1906]: time="2023-10-02T19:07:32.601129746Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:07:32.601467 env[1906]: time="2023-10-02T19:07:32.601365795Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:07:32.601535 env[1906]: time="2023-10-02T19:07:32.601510225Z" level=info msg="Daemon has completed initialization" Oct 2 19:07:32.628289 systemd[1]: Started docker.service. Oct 2 19:07:32.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:32.643087 env[1906]: time="2023-10-02T19:07:32.643018154Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:07:32.675804 systemd[1]: Reloading. Oct 2 19:07:32.895260 /usr/lib/systemd/system-generators/torcx-generator[2047]: time="2023-10-02T19:07:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:07:32.895301 /usr/lib/systemd/system-generators/torcx-generator[2047]: time="2023-10-02T19:07:32Z" level=info msg="torcx already run" Oct 2 19:07:33.062242 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:07:33.062297 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:07:33.121248 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit: BPF prog-id=37 op=LOAD Oct 2 19:07:33.249000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit: BPF prog-id=38 op=LOAD Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.249000 audit: BPF prog-id=39 op=LOAD Oct 2 19:07:33.249000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:07:33.249000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:07:33.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.251000 audit: BPF prog-id=40 op=LOAD Oct 2 19:07:33.251000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:07:33.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit: BPF prog-id=41 op=LOAD Oct 2 19:07:33.256000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit: BPF prog-id=42 op=LOAD Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.256000 audit: BPF prog-id=43 op=LOAD Oct 2 19:07:33.256000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:07:33.256000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:07:33.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.259000 audit: BPF prog-id=44 op=LOAD Oct 2 19:07:33.259000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.260000 audit: BPF prog-id=45 op=LOAD Oct 2 19:07:33.260000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.260000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.261000 audit: BPF prog-id=46 op=LOAD Oct 2 19:07:33.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.261000 audit: BPF prog-id=47 op=LOAD Oct 2 19:07:33.261000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:07:33.261000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit: BPF prog-id=48 op=LOAD Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.264000 audit: BPF prog-id=49 op=LOAD Oct 2 19:07:33.264000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:07:33.264000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:07:33.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.268000 audit: BPF prog-id=50 op=LOAD Oct 2 19:07:33.268000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:07:33.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.269000 audit: BPF prog-id=51 op=LOAD Oct 2 19:07:33.269000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:07:33.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit: BPF prog-id=52 op=LOAD Oct 2 19:07:33.270000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit: BPF prog-id=53 op=LOAD Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:33.270000 audit: BPF prog-id=54 op=LOAD Oct 2 19:07:33.271000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:07:33.271000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:07:33.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:33.293027 systemd[1]: Started kubelet.service. Oct 2 19:07:33.429153 kubelet[2097]: E1002 19:07:33.429091 2097 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:07:33.431519 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:07:33.431684 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:07:33.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:07:33.890972 env[1629]: time="2023-10-02T19:07:33.890902885Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\"" Oct 2 19:07:34.494300 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount968306857.mount: Deactivated successfully. Oct 2 19:07:37.258407 env[1629]: time="2023-10-02T19:07:37.258247458Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:37.262720 env[1629]: time="2023-10-02T19:07:37.262674573Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcab12b2dd16cce4efc5dd43c082469364f19ad978e922d110b74a42eff7cce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:37.265960 env[1629]: time="2023-10-02T19:07:37.265869120Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:37.269585 env[1629]: time="2023-10-02T19:07:37.269541938Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6beea2e5531a0606613594fd3ed92d71bbdcef99dd3237522049a0b32cad736c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:37.270798 env[1629]: time="2023-10-02T19:07:37.270760241Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\" returns image reference \"sha256:cdcab12b2dd16cce4efc5dd43c082469364f19ad978e922d110b74a42eff7cce\"" Oct 2 19:07:37.286268 env[1629]: time="2023-10-02T19:07:37.286225621Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\"" Oct 2 19:07:39.939272 env[1629]: time="2023-10-02T19:07:39.939219715Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:39.951975 env[1629]: time="2023-10-02T19:07:39.951575128Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:55f13c92defb1eb854040a76e366da866bdcb1cc31fd97b2cde94433c8bf3f57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:39.958889 env[1629]: time="2023-10-02T19:07:39.958845040Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:39.962144 env[1629]: time="2023-10-02T19:07:39.962098508Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6a42ce14d716205a99763f3c732c0a8f0ea041bdbbea7d2dfffcc53dafd7cac4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:39.963111 env[1629]: time="2023-10-02T19:07:39.963032307Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\" returns image reference \"sha256:55f13c92defb1eb854040a76e366da866bdcb1cc31fd97b2cde94433c8bf3f57\"" Oct 2 19:07:39.994854 env[1629]: time="2023-10-02T19:07:39.994360359Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\"" Oct 2 19:07:41.618668 env[1629]: time="2023-10-02T19:07:41.618619104Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:41.626705 env[1629]: time="2023-10-02T19:07:41.626655587Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7a5d9d67a13f6ae031989bc2969ec55b06437725f397e6eb75b1dccac465a7b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:41.630782 env[1629]: time="2023-10-02T19:07:41.630735774Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:41.633656 env[1629]: time="2023-10-02T19:07:41.633613195Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6511193f8114a2f011790619698efe12a8119ed9a17e2e36f4c1c759ccf173ab,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:41.634618 env[1629]: time="2023-10-02T19:07:41.634575600Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\" returns image reference \"sha256:7a5d9d67a13f6ae031989bc2969ec55b06437725f397e6eb75b1dccac465a7b8\"" Oct 2 19:07:41.647688 env[1629]: time="2023-10-02T19:07:41.647645414Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\"" Oct 2 19:07:42.922055 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2889698734.mount: Deactivated successfully. Oct 2 19:07:43.667739 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:07:43.668052 systemd[1]: Stopped kubelet.service. Oct 2 19:07:43.690493 kernel: kauditd_printk_skb: 292 callbacks suppressed Oct 2 19:07:43.690596 kernel: audit: type=1130 audit(1696273663.667:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:43.690634 kernel: audit: type=1131 audit(1696273663.667:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:43.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:43.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:43.670348 systemd[1]: Started kubelet.service. Oct 2 19:07:43.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:43.706572 kernel: audit: type=1130 audit(1696273663.669:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:43.817984 kubelet[2131]: E1002 19:07:43.817833 2131 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:07:43.824607 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:07:43.824909 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:07:43.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:07:43.832489 kernel: audit: type=1131 audit(1696273663.825:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:07:43.888675 env[1629]: time="2023-10-02T19:07:43.888582197Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:43.892108 env[1629]: time="2023-10-02T19:07:43.892059380Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:43.894761 env[1629]: time="2023-10-02T19:07:43.894714838Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:43.897051 env[1629]: time="2023-10-02T19:07:43.897012223Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:41c8f92d1cd571e0e36af431f35c78379f84f5daf5b85d43014a9940d697afcf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:43.897437 env[1629]: time="2023-10-02T19:07:43.897403644Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\" returns image reference \"sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0\"" Oct 2 19:07:43.915888 env[1629]: time="2023-10-02T19:07:43.915849345Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:07:44.448857 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount306580251.mount: Deactivated successfully. Oct 2 19:07:44.458896 env[1629]: time="2023-10-02T19:07:44.458838117Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:44.462957 env[1629]: time="2023-10-02T19:07:44.462906292Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:44.468668 env[1629]: time="2023-10-02T19:07:44.468624290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:44.472066 env[1629]: time="2023-10-02T19:07:44.471847437Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:44.472728 env[1629]: time="2023-10-02T19:07:44.472686463Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 19:07:44.485616 env[1629]: time="2023-10-02T19:07:44.485573899Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Oct 2 19:07:50.416628 kernel: audit: type=1131 audit(1696273670.410:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:50.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:50.411040 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 19:07:50.440526 kernel: audit: type=1334 audit(1696273670.435:419): prog-id=39 op=UNLOAD Oct 2 19:07:50.440661 kernel: audit: type=1334 audit(1696273670.435:420): prog-id=38 op=UNLOAD Oct 2 19:07:50.440695 kernel: audit: type=1334 audit(1696273670.435:421): prog-id=37 op=UNLOAD Oct 2 19:07:50.435000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:07:50.435000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:07:50.435000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:07:52.588006 env[1629]: time="2023-10-02T19:07:52.587956104Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:52.609087 env[1629]: time="2023-10-02T19:07:52.609037976Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:52.612150 env[1629]: time="2023-10-02T19:07:52.612101994Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:52.614778 env[1629]: time="2023-10-02T19:07:52.614737652Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:52.615628 env[1629]: time="2023-10-02T19:07:52.615591745Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Oct 2 19:07:52.632841 env[1629]: time="2023-10-02T19:07:52.632796921Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:07:53.237162 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1386666809.mount: Deactivated successfully. Oct 2 19:07:53.917839 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 19:07:53.918109 systemd[1]: Stopped kubelet.service. Oct 2 19:07:53.929290 kernel: audit: type=1130 audit(1696273673.917:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:53.929396 kernel: audit: type=1131 audit(1696273673.917:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:53.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:53.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:53.920036 systemd[1]: Started kubelet.service. Oct 2 19:07:53.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:53.940401 kernel: audit: type=1130 audit(1696273673.917:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:54.035568 kubelet[2155]: E1002 19:07:54.035519 2155 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 2 19:07:54.038060 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:07:54.038306 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:07:54.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:07:54.044413 kernel: audit: type=1131 audit(1696273674.038:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:07:54.213275 env[1629]: time="2023-10-02T19:07:54.213164072Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:54.217792 env[1629]: time="2023-10-02T19:07:54.217726670Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:54.221265 env[1629]: time="2023-10-02T19:07:54.221228559Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:54.224744 env[1629]: time="2023-10-02T19:07:54.224648893Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:54.227203 env[1629]: time="2023-10-02T19:07:54.227141678Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Oct 2 19:07:56.899441 systemd[1]: Stopped kubelet.service. Oct 2 19:07:56.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:56.917955 kernel: audit: type=1130 audit(1696273676.899:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:56.918101 kernel: audit: type=1131 audit(1696273676.899:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:56.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:56.936005 systemd[1]: Reloading. Oct 2 19:07:57.094279 /usr/lib/systemd/system-generators/torcx-generator[2243]: time="2023-10-02T19:07:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:07:57.109063 /usr/lib/systemd/system-generators/torcx-generator[2243]: time="2023-10-02T19:07:57Z" level=info msg="torcx already run" Oct 2 19:07:57.217606 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:07:57.217632 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:07:57.240885 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:07:57.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.369486 kernel: audit: type=1400 audit(1696273677.362:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.375399 kernel: audit: type=1400 audit(1696273677.362:429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.388165 kernel: audit: type=1400 audit(1696273677.362:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.388305 kernel: audit: type=1400 audit(1696273677.362:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.398684 kernel: audit: type=1400 audit(1696273677.362:432): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.398812 kernel: audit: type=1400 audit(1696273677.362:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.398923 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:07:57.398965 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:07:57.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.368000 audit: BPF prog-id=55 op=LOAD Oct 2 19:07:57.368000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:07:57.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit: BPF prog-id=56 op=LOAD Oct 2 19:07:57.377000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.382000 audit: BPF prog-id=57 op=LOAD Oct 2 19:07:57.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.382000 audit: BPF prog-id=58 op=LOAD Oct 2 19:07:57.382000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:07:57.382000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:07:57.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.384000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.387000 audit: BPF prog-id=59 op=LOAD Oct 2 19:07:57.387000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:07:57.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.393000 audit: BPF prog-id=60 op=LOAD Oct 2 19:07:57.393000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:07:57.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.401000 audit: BPF prog-id=61 op=LOAD Oct 2 19:07:57.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.402000 audit: BPF prog-id=62 op=LOAD Oct 2 19:07:57.402000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:07:57.402000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit: BPF prog-id=63 op=LOAD Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.405000 audit: BPF prog-id=64 op=LOAD Oct 2 19:07:57.405000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:07:57.405000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:07:57.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.407000 audit: BPF prog-id=65 op=LOAD Oct 2 19:07:57.407000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit: BPF prog-id=66 op=LOAD Oct 2 19:07:57.408000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit: BPF prog-id=67 op=LOAD Oct 2 19:07:57.409000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit: BPF prog-id=68 op=LOAD Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:57.409000 audit: BPF prog-id=69 op=LOAD Oct 2 19:07:57.409000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:07:57.409000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:07:57.452288 systemd[1]: Started kubelet.service. Oct 2 19:07:57.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:07:57.543612 kubelet[2295]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:07:57.543612 kubelet[2295]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:07:57.543612 kubelet[2295]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:07:57.544855 kubelet[2295]: I1002 19:07:57.543920 2295 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:07:58.024320 kubelet[2295]: I1002 19:07:58.024278 2295 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:07:58.024320 kubelet[2295]: I1002 19:07:58.024310 2295 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:07:58.024655 kubelet[2295]: I1002 19:07:58.024634 2295 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:07:58.031315 kubelet[2295]: I1002 19:07:58.031284 2295 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:07:58.032051 kubelet[2295]: E1002 19:07:58.032033 2295 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.27.110:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:58.041083 kubelet[2295]: I1002 19:07:58.040947 2295 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:07:58.041540 kubelet[2295]: I1002 19:07:58.041517 2295 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:07:58.043393 kubelet[2295]: I1002 19:07:58.041808 2295 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:07:58.043830 kubelet[2295]: I1002 19:07:58.043414 2295 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:07:58.043830 kubelet[2295]: I1002 19:07:58.043430 2295 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:07:58.043830 kubelet[2295]: I1002 19:07:58.043793 2295 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:07:58.044142 kubelet[2295]: I1002 19:07:58.044098 2295 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:07:58.044527 kubelet[2295]: I1002 19:07:58.044509 2295 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:07:58.044691 kubelet[2295]: I1002 19:07:58.044551 2295 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:07:58.044691 kubelet[2295]: I1002 19:07:58.044575 2295 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:07:58.044930 kubelet[2295]: W1002 19:07:58.044881 2295 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.27.110:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-110&limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:58.045041 kubelet[2295]: E1002 19:07:58.045028 2295 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.27.110:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-110&limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:58.045993 kubelet[2295]: W1002 19:07:58.045968 2295 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.27.110:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:58.046106 kubelet[2295]: E1002 19:07:58.046096 2295 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.27.110:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:58.046288 kubelet[2295]: I1002 19:07:58.046274 2295 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:07:58.046720 kubelet[2295]: W1002 19:07:58.046708 2295 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:07:58.047715 kubelet[2295]: I1002 19:07:58.047698 2295 server.go:1232] "Started kubelet" Oct 2 19:07:58.049000 audit[2295]: AVC avc: denied { mac_admin } for pid=2295 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:58.049000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:07:58.049000 audit[2295]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d41980 a1=c000383d88 a2=c000d41950 a3=25 items=0 ppid=1 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:58.049000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:07:58.049000 audit[2295]: AVC avc: denied { mac_admin } for pid=2295 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:58.049000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:07:58.049000 audit[2295]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000508d80 a1=c000383da0 a2=c000d41a10 a3=25 items=0 ppid=1 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:58.049000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:07:58.051196 kubelet[2295]: I1002 19:07:58.050322 2295 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:07:58.051196 kubelet[2295]: I1002 19:07:58.050502 2295 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:07:58.051196 kubelet[2295]: I1002 19:07:58.050588 2295 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:07:58.055775 kubelet[2295]: E1002 19:07:58.055501 2295 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-110.178a5fec45dfe4a6", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-110", UID:"ip-172-31-27-110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-110"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 58, 47634598, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 58, 47634598, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ip-172-31-27-110"}': 'Post "https://172.31.27.110:6443/api/v1/namespaces/default/events": dial tcp 172.31.27.110:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:07:58.056700 kubelet[2295]: E1002 19:07:58.056355 2295 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:07:58.056700 kubelet[2295]: E1002 19:07:58.056410 2295 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:07:58.058082 kubelet[2295]: I1002 19:07:58.058057 2295 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:07:58.058898 kubelet[2295]: I1002 19:07:58.058869 2295 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:07:58.060332 kubelet[2295]: I1002 19:07:58.060310 2295 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:07:58.060619 kubelet[2295]: I1002 19:07:58.060599 2295 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:07:58.062652 kubelet[2295]: I1002 19:07:58.061237 2295 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:07:58.062652 kubelet[2295]: I1002 19:07:58.061333 2295 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:07:58.062652 kubelet[2295]: I1002 19:07:58.061509 2295 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:07:58.062652 kubelet[2295]: W1002 19:07:58.062195 2295 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.27.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:58.062652 kubelet[2295]: E1002 19:07:58.062254 2295 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.27.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:58.062652 kubelet[2295]: E1002 19:07:58.062568 2295 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.110:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-110?timeout=10s\": dial tcp 172.31.27.110:6443: connect: connection refused" interval="200ms" Oct 2 19:07:58.067000 audit[2305]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:58.067000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe23af4430 a2=0 a3=7ffe23af441c items=0 ppid=2295 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:58.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:07:58.070000 audit[2306]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:58.070000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc10c4cb0 a2=0 a3=7ffdc10c4c9c items=0 ppid=2295 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:58.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:07:58.077000 audit[2308]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:58.077000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffce4048d50 a2=0 a3=7ffce4048d3c items=0 ppid=2295 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:58.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:07:58.084000 audit[2310]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:58.084000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe85ecb380 a2=0 a3=7ffe85ecb36c items=0 ppid=2295 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:58.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:07:58.117182 kubelet[2295]: I1002 19:07:58.117155 2295 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:07:58.117182 kubelet[2295]: I1002 19:07:58.117180 2295 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:07:58.119916 kubelet[2295]: I1002 19:07:58.117204 2295 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:07:58.121000 audit[2315]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:58.121000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe53f6c8b0 a2=0 a3=7ffe53f6c89c items=0 ppid=2295 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:58.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:07:58.122478 kubelet[2295]: I1002 19:07:58.122455 2295 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:07:58.128000 audit[2318]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:58.128000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc7bb6be20 a2=0 a3=7ffc7bb6be0c items=0 ppid=2295 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:58.128000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:07:58.135000 audit[2319]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:58.135000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff95dfad20 a2=0 a3=7fff95dfad0c items=0 ppid=2295 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:58.135000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:07:58.136000 audit[2320]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:58.136000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7c521d20 a2=0 a3=7ffe7c521d0c items=0 ppid=2295 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:58.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:07:58.137000 audit[2322]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:58.137000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc14821cb0 a2=0 a3=7ffc14821c9c items=0 ppid=2295 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:58.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:07:58.139000 audit[2323]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:58.139000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd0f4d0fb0 a2=0 a3=7ffd0f4d0f9c items=0 ppid=2295 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:58.139000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:07:58.139000 audit[2324]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:07:58.139000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9e086780 a2=0 a3=7ffc9e08676c items=0 ppid=2295 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:58.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:07:58.140000 audit[2325]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:07:58.140000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffcea257f0 a2=0 a3=7fffcea257dc items=0 ppid=2295 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:58.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:07:58.154653 kubelet[2295]: I1002 19:07:58.129590 2295 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:07:58.154653 kubelet[2295]: I1002 19:07:58.129672 2295 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:07:58.154653 kubelet[2295]: I1002 19:07:58.129788 2295 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:07:58.154653 kubelet[2295]: E1002 19:07:58.129869 2295 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:07:58.154653 kubelet[2295]: W1002 19:07:58.131113 2295 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.27.110:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:58.154653 kubelet[2295]: E1002 19:07:58.131151 2295 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.27.110:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:58.155152 kubelet[2295]: I1002 19:07:58.154676 2295 policy_none.go:49] "None policy: Start" Oct 2 19:07:58.156693 kubelet[2295]: I1002 19:07:58.156669 2295 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:07:58.156801 kubelet[2295]: I1002 19:07:58.156708 2295 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:07:58.163565 kubelet[2295]: I1002 19:07:58.163500 2295 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-110" Oct 2 19:07:58.193195 kubelet[2295]: E1002 19:07:58.169651 2295 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.110:6443/api/v1/nodes\": dial tcp 172.31.27.110:6443: connect: connection refused" node="ip-172-31-27-110" Oct 2 19:07:58.202543 systemd[1]: Created slice kubepods.slice. Oct 2 19:07:58.209135 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:07:58.214877 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:07:58.222414 kubelet[2295]: I1002 19:07:58.222389 2295 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:07:58.222000 audit[2295]: AVC avc: denied { mac_admin } for pid=2295 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:58.222000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:07:58.222000 audit[2295]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010092c0 a1=c00101ae28 a2=c001009290 a3=25 items=0 ppid=1 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:58.222000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:07:58.223215 kubelet[2295]: I1002 19:07:58.223188 2295 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:07:58.224444 kubelet[2295]: I1002 19:07:58.223722 2295 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:07:58.225977 kubelet[2295]: E1002 19:07:58.225959 2295 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-27-110\" not found" Oct 2 19:07:58.231645 kubelet[2295]: I1002 19:07:58.231575 2295 topology_manager.go:215] "Topology Admit Handler" podUID="90a12d55729f068d7198224f6c5dda46" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-27-110" Oct 2 19:07:58.233752 kubelet[2295]: I1002 19:07:58.233726 2295 topology_manager.go:215] "Topology Admit Handler" podUID="b191c505018ac6fc8e0f8a9cc6d70a20" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-27-110" Oct 2 19:07:58.235111 kubelet[2295]: I1002 19:07:58.235076 2295 topology_manager.go:215] "Topology Admit Handler" podUID="a20f2d64ebe6c4460318cd28f92f565a" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-27-110" Oct 2 19:07:58.243902 systemd[1]: Created slice kubepods-burstable-pod90a12d55729f068d7198224f6c5dda46.slice. Oct 2 19:07:58.255441 systemd[1]: Created slice kubepods-burstable-poda20f2d64ebe6c4460318cd28f92f565a.slice. Oct 2 19:07:58.263612 kubelet[2295]: I1002 19:07:58.263125 2295 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b191c505018ac6fc8e0f8a9cc6d70a20-kubeconfig\") pod \"kube-controller-manager-ip-172-31-27-110\" (UID: \"b191c505018ac6fc8e0f8a9cc6d70a20\") " pod="kube-system/kube-controller-manager-ip-172-31-27-110" Oct 2 19:07:58.263612 kubelet[2295]: I1002 19:07:58.263179 2295 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b191c505018ac6fc8e0f8a9cc6d70a20-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-27-110\" (UID: \"b191c505018ac6fc8e0f8a9cc6d70a20\") " pod="kube-system/kube-controller-manager-ip-172-31-27-110" Oct 2 19:07:58.263227 systemd[1]: Created slice kubepods-burstable-podb191c505018ac6fc8e0f8a9cc6d70a20.slice. Oct 2 19:07:58.264092 kubelet[2295]: I1002 19:07:58.263716 2295 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b191c505018ac6fc8e0f8a9cc6d70a20-ca-certs\") pod \"kube-controller-manager-ip-172-31-27-110\" (UID: \"b191c505018ac6fc8e0f8a9cc6d70a20\") " pod="kube-system/kube-controller-manager-ip-172-31-27-110" Oct 2 19:07:58.264092 kubelet[2295]: I1002 19:07:58.263764 2295 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/90a12d55729f068d7198224f6c5dda46-k8s-certs\") pod \"kube-apiserver-ip-172-31-27-110\" (UID: \"90a12d55729f068d7198224f6c5dda46\") " pod="kube-system/kube-apiserver-ip-172-31-27-110" Oct 2 19:07:58.264092 kubelet[2295]: I1002 19:07:58.263821 2295 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/90a12d55729f068d7198224f6c5dda46-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-27-110\" (UID: \"90a12d55729f068d7198224f6c5dda46\") " pod="kube-system/kube-apiserver-ip-172-31-27-110" Oct 2 19:07:58.264092 kubelet[2295]: I1002 19:07:58.263932 2295 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b191c505018ac6fc8e0f8a9cc6d70a20-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-27-110\" (UID: \"b191c505018ac6fc8e0f8a9cc6d70a20\") " pod="kube-system/kube-controller-manager-ip-172-31-27-110" Oct 2 19:07:58.264092 kubelet[2295]: I1002 19:07:58.264023 2295 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b191c505018ac6fc8e0f8a9cc6d70a20-k8s-certs\") pod \"kube-controller-manager-ip-172-31-27-110\" (UID: \"b191c505018ac6fc8e0f8a9cc6d70a20\") " pod="kube-system/kube-controller-manager-ip-172-31-27-110" Oct 2 19:07:58.268231 kubelet[2295]: I1002 19:07:58.264055 2295 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a20f2d64ebe6c4460318cd28f92f565a-kubeconfig\") pod \"kube-scheduler-ip-172-31-27-110\" (UID: \"a20f2d64ebe6c4460318cd28f92f565a\") " pod="kube-system/kube-scheduler-ip-172-31-27-110" Oct 2 19:07:58.268231 kubelet[2295]: I1002 19:07:58.264087 2295 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/90a12d55729f068d7198224f6c5dda46-ca-certs\") pod \"kube-apiserver-ip-172-31-27-110\" (UID: \"90a12d55729f068d7198224f6c5dda46\") " pod="kube-system/kube-apiserver-ip-172-31-27-110" Oct 2 19:07:58.268231 kubelet[2295]: E1002 19:07:58.264347 2295 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.110:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-110?timeout=10s\": dial tcp 172.31.27.110:6443: connect: connection refused" interval="400ms" Oct 2 19:07:58.373219 kubelet[2295]: I1002 19:07:58.373110 2295 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-110" Oct 2 19:07:58.374838 kubelet[2295]: E1002 19:07:58.374818 2295 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.110:6443/api/v1/nodes\": dial tcp 172.31.27.110:6443: connect: connection refused" node="ip-172-31-27-110" Oct 2 19:07:58.554217 env[1629]: time="2023-10-02T19:07:58.554094934Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-27-110,Uid:90a12d55729f068d7198224f6c5dda46,Namespace:kube-system,Attempt:0,}" Oct 2 19:07:58.563029 env[1629]: time="2023-10-02T19:07:58.562980536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-27-110,Uid:a20f2d64ebe6c4460318cd28f92f565a,Namespace:kube-system,Attempt:0,}" Oct 2 19:07:58.569841 env[1629]: time="2023-10-02T19:07:58.569790763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-27-110,Uid:b191c505018ac6fc8e0f8a9cc6d70a20,Namespace:kube-system,Attempt:0,}" Oct 2 19:07:58.665536 kubelet[2295]: E1002 19:07:58.665432 2295 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.110:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-110?timeout=10s\": dial tcp 172.31.27.110:6443: connect: connection refused" interval="800ms" Oct 2 19:07:58.778078 kubelet[2295]: I1002 19:07:58.777508 2295 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-110" Oct 2 19:07:58.778339 kubelet[2295]: E1002 19:07:58.778182 2295 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.110:6443/api/v1/nodes\": dial tcp 172.31.27.110:6443: connect: connection refused" node="ip-172-31-27-110" Oct 2 19:07:59.040666 kubelet[2295]: W1002 19:07:59.040541 2295 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.31.27.110:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:59.040666 kubelet[2295]: E1002 19:07:59.040631 2295 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.27.110:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:59.070946 kubelet[2295]: W1002 19:07:59.069897 2295 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.27.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:59.070946 kubelet[2295]: E1002 19:07:59.070892 2295 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.27.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:59.107035 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3527795067.mount: Deactivated successfully. Oct 2 19:07:59.123674 env[1629]: time="2023-10-02T19:07:59.123623643Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:59.125485 env[1629]: time="2023-10-02T19:07:59.125441870Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:59.131953 env[1629]: time="2023-10-02T19:07:59.131905671Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:59.134763 env[1629]: time="2023-10-02T19:07:59.134569096Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:59.135936 env[1629]: time="2023-10-02T19:07:59.135901786Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:59.140265 env[1629]: time="2023-10-02T19:07:59.140125228Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:59.141874 env[1629]: time="2023-10-02T19:07:59.141797358Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:59.143904 env[1629]: time="2023-10-02T19:07:59.143867519Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:59.145526 env[1629]: time="2023-10-02T19:07:59.145491615Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:59.148070 env[1629]: time="2023-10-02T19:07:59.148031059Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:59.150923 env[1629]: time="2023-10-02T19:07:59.150874414Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:59.152465 env[1629]: time="2023-10-02T19:07:59.152369374Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:07:59.198849 env[1629]: time="2023-10-02T19:07:59.198766189Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:59.198849 env[1629]: time="2023-10-02T19:07:59.198810056Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:59.199149 env[1629]: time="2023-10-02T19:07:59.198835819Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:59.199484 env[1629]: time="2023-10-02T19:07:59.199435684Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/18df78a053a75d965ea0b4c507e33c5ae3ed99e97dbc9bd255fef3d47c7ad9c2 pid=2333 runtime=io.containerd.runc.v2 Oct 2 19:07:59.244416 env[1629]: time="2023-10-02T19:07:59.244296472Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:59.244416 env[1629]: time="2023-10-02T19:07:59.244357223Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:59.244753 env[1629]: time="2023-10-02T19:07:59.244393388Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:59.244753 env[1629]: time="2023-10-02T19:07:59.244692803Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/38c2fc92efc5ebbcaee3a86c35a8b0802fcdf3a4740cf75259a1e939f0f303a2 pid=2350 runtime=io.containerd.runc.v2 Oct 2 19:07:59.283169 systemd[1]: Started cri-containerd-18df78a053a75d965ea0b4c507e33c5ae3ed99e97dbc9bd255fef3d47c7ad9c2.scope. Oct 2 19:07:59.308424 env[1629]: time="2023-10-02T19:07:59.280130016Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:07:59.308702 env[1629]: time="2023-10-02T19:07:59.308632421Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:07:59.308879 env[1629]: time="2023-10-02T19:07:59.308838335Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:07:59.309656 systemd[1]: Started cri-containerd-38c2fc92efc5ebbcaee3a86c35a8b0802fcdf3a4740cf75259a1e939f0f303a2.scope. Oct 2 19:07:59.312183 env[1629]: time="2023-10-02T19:07:59.309500491Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ad9922d98d5a5641e67801d8fcab22c284ec9e22216739cfd195af05706dee46 pid=2379 runtime=io.containerd.runc.v2 Oct 2 19:07:59.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.323000 audit: BPF prog-id=70 op=LOAD Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2333 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138646637386130353361373564393635656130623463353037653333 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2333 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138646637386130353361373564393635656130623463353037653333 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit: BPF prog-id=71 op=LOAD Oct 2 19:07:59.331000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d3600 items=0 ppid=2333 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138646637386130353361373564393635656130623463353037653333 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.331000 audit: BPF prog-id=72 op=LOAD Oct 2 19:07:59.331000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d3648 items=0 ppid=2333 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138646637386130353361373564393635656130623463353037653333 Oct 2 19:07:59.332000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:07:59.332000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:07:59.332000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.332000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.332000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.332000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.332000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.332000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.332000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.332000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.332000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.332000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.332000 audit: BPF prog-id=73 op=LOAD Oct 2 19:07:59.332000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d3a58 items=0 ppid=2333 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138646637386130353361373564393635656130623463353037653333 Oct 2 19:07:59.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.365000 audit: BPF prog-id=74 op=LOAD Oct 2 19:07:59.367000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.367000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2350 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633266633932656663356562626361656533613836633335613862 Oct 2 19:07:59.368285 systemd[1]: Started cri-containerd-ad9922d98d5a5641e67801d8fcab22c284ec9e22216739cfd195af05706dee46.scope. Oct 2 19:07:59.370000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.370000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2350 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633266633932656663356562626361656533613836633335613862 Oct 2 19:07:59.375000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.375000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.375000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.375000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.375000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.375000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.375000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.375000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.375000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.375000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.375000 audit: BPF prog-id=75 op=LOAD Oct 2 19:07:59.375000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000096340 items=0 ppid=2350 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633266633932656663356562626361656533613836633335613862 Oct 2 19:07:59.376000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.376000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.376000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.376000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.376000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.376000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.376000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.376000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.376000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.376000 audit: BPF prog-id=76 op=LOAD Oct 2 19:07:59.376000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000096388 items=0 ppid=2350 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633266633932656663356562626361656533613836633335613862 Oct 2 19:07:59.378000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:07:59.378000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:07:59.378000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.378000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.378000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.378000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.378000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.378000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.378000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.378000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.378000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.378000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.378000 audit: BPF prog-id=77 op=LOAD Oct 2 19:07:59.378000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000096798 items=0 ppid=2350 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633266633932656663356562626361656533613836633335613862 Oct 2 19:07:59.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.451000 audit: BPF prog-id=78 op=LOAD Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2379 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164393932326439386435613536343165363738303164386663616232 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2379 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164393932326439386435613536343165363738303164386663616232 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit: BPF prog-id=79 op=LOAD Oct 2 19:07:59.452000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d6cd0 items=0 ppid=2379 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164393932326439386435613536343165363738303164386663616232 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.452000 audit: BPF prog-id=80 op=LOAD Oct 2 19:07:59.452000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d6d18 items=0 ppid=2379 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164393932326439386435613536343165363738303164386663616232 Oct 2 19:07:59.452000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:07:59.452000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:07:59.453000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.453000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.453000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.453000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.453000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.453000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.453000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.453000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.453000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.453000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.453000 audit: BPF prog-id=81 op=LOAD Oct 2 19:07:59.453000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d7128 items=0 ppid=2379 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164393932326439386435613536343165363738303164386663616232 Oct 2 19:07:59.466621 kubelet[2295]: E1002 19:07:59.466570 2295 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.110:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-110?timeout=10s\": dial tcp 172.31.27.110:6443: connect: connection refused" interval="1.6s" Oct 2 19:07:59.481161 kubelet[2295]: W1002 19:07:59.481033 2295 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.27.110:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:59.481161 kubelet[2295]: E1002 19:07:59.481118 2295 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.27.110:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:59.495067 env[1629]: time="2023-10-02T19:07:59.493630100Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-27-110,Uid:90a12d55729f068d7198224f6c5dda46,Namespace:kube-system,Attempt:0,} returns sandbox id \"18df78a053a75d965ea0b4c507e33c5ae3ed99e97dbc9bd255fef3d47c7ad9c2\"" Oct 2 19:07:59.506108 env[1629]: time="2023-10-02T19:07:59.506049872Z" level=info msg="CreateContainer within sandbox \"18df78a053a75d965ea0b4c507e33c5ae3ed99e97dbc9bd255fef3d47c7ad9c2\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:07:59.531040 env[1629]: time="2023-10-02T19:07:59.530987235Z" level=info msg="CreateContainer within sandbox \"18df78a053a75d965ea0b4c507e33c5ae3ed99e97dbc9bd255fef3d47c7ad9c2\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"b7329b9e76079b926a150dd9e37533f422f71b9d10237631a0b853af56f44ebb\"" Oct 2 19:07:59.533023 env[1629]: time="2023-10-02T19:07:59.532983114Z" level=info msg="StartContainer for \"b7329b9e76079b926a150dd9e37533f422f71b9d10237631a0b853af56f44ebb\"" Oct 2 19:07:59.536412 env[1629]: time="2023-10-02T19:07:59.536350199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-27-110,Uid:a20f2d64ebe6c4460318cd28f92f565a,Namespace:kube-system,Attempt:0,} returns sandbox id \"38c2fc92efc5ebbcaee3a86c35a8b0802fcdf3a4740cf75259a1e939f0f303a2\"" Oct 2 19:07:59.540924 env[1629]: time="2023-10-02T19:07:59.540885961Z" level=info msg="CreateContainer within sandbox \"38c2fc92efc5ebbcaee3a86c35a8b0802fcdf3a4740cf75259a1e939f0f303a2\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:07:59.544668 env[1629]: time="2023-10-02T19:07:59.544619840Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-27-110,Uid:b191c505018ac6fc8e0f8a9cc6d70a20,Namespace:kube-system,Attempt:0,} returns sandbox id \"ad9922d98d5a5641e67801d8fcab22c284ec9e22216739cfd195af05706dee46\"" Oct 2 19:07:59.548673 env[1629]: time="2023-10-02T19:07:59.548626254Z" level=info msg="CreateContainer within sandbox \"ad9922d98d5a5641e67801d8fcab22c284ec9e22216739cfd195af05706dee46\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:07:59.563654 systemd[1]: Started cri-containerd-b7329b9e76079b926a150dd9e37533f422f71b9d10237631a0b853af56f44ebb.scope. Oct 2 19:07:59.583592 kubelet[2295]: I1002 19:07:59.583282 2295 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-110" Oct 2 19:07:59.584089 kubelet[2295]: E1002 19:07:59.584070 2295 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.110:6443/api/v1/nodes\": dial tcp 172.31.27.110:6443: connect: connection refused" node="ip-172-31-27-110" Oct 2 19:07:59.597904 env[1629]: time="2023-10-02T19:07:59.597850913Z" level=info msg="CreateContainer within sandbox \"ad9922d98d5a5641e67801d8fcab22c284ec9e22216739cfd195af05706dee46\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"da68e550f1a13f78a09701f90e1180da97760c5f47010df70ef7a7cbe613821b\"" Oct 2 19:07:59.599912 env[1629]: time="2023-10-02T19:07:59.599750819Z" level=info msg="StartContainer for \"da68e550f1a13f78a09701f90e1180da97760c5f47010df70ef7a7cbe613821b\"" Oct 2 19:07:59.600729 env[1629]: time="2023-10-02T19:07:59.600697004Z" level=info msg="CreateContainer within sandbox \"38c2fc92efc5ebbcaee3a86c35a8b0802fcdf3a4740cf75259a1e939f0f303a2\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"60c8cfe88ed2f77e32b70b169ebf23155fc3ab8690097ed8aeda48a800df2a96\"" Oct 2 19:07:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.605000 audit: BPF prog-id=82 op=LOAD Oct 2 19:07:59.606361 env[1629]: time="2023-10-02T19:07:59.606326452Z" level=info msg="StartContainer for \"60c8cfe88ed2f77e32b70b169ebf23155fc3ab8690097ed8aeda48a800df2a96\"" Oct 2 19:07:59.606994 kubelet[2295]: W1002 19:07:59.606915 2295 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.31.27.110:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-110&limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:59.607089 kubelet[2295]: E1002 19:07:59.607011 2295 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.27.110:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-27-110&limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2333 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237333239623965373630373962393236613135306464396533373533 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2333 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237333239623965373630373962393236613135306464396533373533 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit: BPF prog-id=83 op=LOAD Oct 2 19:07:59.607000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000212ff0 items=0 ppid=2333 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237333239623965373630373962393236613135306464396533373533 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit: BPF prog-id=84 op=LOAD Oct 2 19:07:59.607000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000213038 items=0 ppid=2333 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237333239623965373630373962393236613135306464396533373533 Oct 2 19:07:59.607000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:07:59.607000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.607000 audit: BPF prog-id=85 op=LOAD Oct 2 19:07:59.607000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000213448 items=0 ppid=2333 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237333239623965373630373962393236613135306464396533373533 Oct 2 19:07:59.652873 systemd[1]: Started cri-containerd-60c8cfe88ed2f77e32b70b169ebf23155fc3ab8690097ed8aeda48a800df2a96.scope. Oct 2 19:07:59.655396 systemd[1]: Started cri-containerd-da68e550f1a13f78a09701f90e1180da97760c5f47010df70ef7a7cbe613821b.scope. Oct 2 19:07:59.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.711000 audit: BPF prog-id=86 op=LOAD Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2379 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461363865353530663161313366373861303937303166393065313138 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2379 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461363865353530663161313366373861303937303166393065313138 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit: BPF prog-id=87 op=LOAD Oct 2 19:07:59.713000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003a7550 items=0 ppid=2379 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461363865353530663161313366373861303937303166393065313138 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.713000 audit: BPF prog-id=88 op=LOAD Oct 2 19:07:59.713000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003a7598 items=0 ppid=2379 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461363865353530663161313366373861303937303166393065313138 Oct 2 19:07:59.713000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:07:59.714000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:07:59.714000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.714000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.714000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.714000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.714000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.714000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.714000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.714000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.714000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.714000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.714000 audit: BPF prog-id=89 op=LOAD Oct 2 19:07:59.714000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003a79a8 items=0 ppid=2379 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461363865353530663161313366373861303937303166393065313138 Oct 2 19:07:59.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.754000 audit: BPF prog-id=90 op=LOAD Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2350 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630633863666538386564326637376533326237306231363965626632 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2350 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630633863666538386564326637376533326237306231363965626632 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit: BPF prog-id=91 op=LOAD Oct 2 19:07:59.760000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002186d0 items=0 ppid=2350 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630633863666538386564326637376533326237306231363965626632 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.760000 audit: BPF prog-id=92 op=LOAD Oct 2 19:07:59.760000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000218718 items=0 ppid=2350 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630633863666538386564326637376533326237306231363965626632 Oct 2 19:07:59.761000 audit: BPF prog-id=92 op=UNLOAD Oct 2 19:07:59.761000 audit: BPF prog-id=91 op=UNLOAD Oct 2 19:07:59.761000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.761000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.761000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.761000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.761000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.761000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.761000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.761000 audit[2491]: AVC avc: denied { perfmon } for pid=2491 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.761000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.761000 audit[2491]: AVC avc: denied { bpf } for pid=2491 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:07:59.761000 audit: BPF prog-id=93 op=LOAD Oct 2 19:07:59.761000 audit[2491]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000218b28 items=0 ppid=2350 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:07:59.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630633863666538386564326637376533326237306231363965626632 Oct 2 19:07:59.771647 env[1629]: time="2023-10-02T19:07:59.771578048Z" level=info msg="StartContainer for \"b7329b9e76079b926a150dd9e37533f422f71b9d10237631a0b853af56f44ebb\" returns successfully" Oct 2 19:07:59.826463 env[1629]: time="2023-10-02T19:07:59.824012231Z" level=info msg="StartContainer for \"da68e550f1a13f78a09701f90e1180da97760c5f47010df70ef7a7cbe613821b\" returns successfully" Oct 2 19:07:59.832477 env[1629]: time="2023-10-02T19:07:59.832423048Z" level=info msg="StartContainer for \"60c8cfe88ed2f77e32b70b169ebf23155fc3ab8690097ed8aeda48a800df2a96\" returns successfully" Oct 2 19:08:00.196754 kubelet[2295]: E1002 19:08:00.196716 2295 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.27.110:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:08:00.390782 kubelet[2295]: E1002 19:08:00.390667 2295 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-27-110.178a5fec45dfe4a6", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-27-110", UID:"ip-172-31-27-110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-27-110"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 7, 58, 47634598, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 7, 58, 47634598, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ip-172-31-27-110"}': 'Post "https://172.31.27.110:6443/api/v1/namespaces/default/events": dial tcp 172.31.27.110:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:08:00.806673 kubelet[2295]: W1002 19:08:00.806631 2295 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.31.27.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:08:00.807355 kubelet[2295]: E1002 19:08:00.807337 2295 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.27.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:08:01.068473 kubelet[2295]: E1002 19:08:01.068262 2295 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.27.110:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-110?timeout=10s\": dial tcp 172.31.27.110:6443: connect: connection refused" interval="3.2s" Oct 2 19:08:01.186371 kubelet[2295]: I1002 19:08:01.186347 2295 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-110" Oct 2 19:08:01.187013 kubelet[2295]: E1002 19:08:01.186983 2295 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.27.110:6443/api/v1/nodes\": dial tcp 172.31.27.110:6443: connect: connection refused" node="ip-172-31-27-110" Oct 2 19:08:01.246170 kubelet[2295]: W1002 19:08:01.245890 2295 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.31.27.110:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:08:01.247032 kubelet[2295]: E1002 19:08:01.247015 2295 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.27.110:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.27.110:6443: connect: connection refused Oct 2 19:08:02.823000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.825003 kernel: kauditd_printk_skb: 557 callbacks suppressed Oct 2 19:08:02.825115 kernel: audit: type=1400 audit(1696273682.823:723): avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.823000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000812060 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:08:02.842413 kernel: audit: type=1300 audit(1696273682.823:723): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000812060 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:08:02.823000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:02.856403 kernel: audit: type=1327 audit(1696273682.823:723): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:02.824000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.866403 kernel: audit: type=1400 audit(1696273682.824:724): avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:02.866680 kernel: audit: type=1300 audit(1696273682.824:724): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003b48c0 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:08:02.824000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003b48c0 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:08:02.824000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:02.881722 kernel: audit: type=1327 audit(1696273682.824:724): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:04.389391 kubelet[2295]: I1002 19:08:04.389350 2295 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-110" Oct 2 19:08:04.401000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:04.417152 kernel: audit: type=1400 audit(1696273684.401:725): avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:04.417317 kernel: audit: type=1300 audit(1696273684.401:725): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00496f920 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:08:04.401000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00496f920 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:08:04.401000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:04.431114 kernel: audit: type=1327 audit(1696273684.401:725): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:04.431277 kernel: audit: type=1400 audit(1696273684.401:726): avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:04.401000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:04.401000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0031401e0 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:08:04.401000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:04.403000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:04.403000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00496fa40 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:08:04.403000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:04.425000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:04.425000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c0035bc390 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:08:04.425000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:04.445000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:04.445000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c007a99580 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:08:04.445000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:04.446000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:04.446000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c006a19920 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:08:04.446000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:08:04.616428 kubelet[2295]: E1002 19:08:04.616395 2295 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-27-110\" not found" node="ip-172-31-27-110" Oct 2 19:08:04.704909 kubelet[2295]: I1002 19:08:04.704875 2295 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-27-110" Oct 2 19:08:04.901316 update_engine[1623]: I1002 19:08:04.901199 1623 update_attempter.cc:505] Updating boot flags... Oct 2 19:08:05.052228 kubelet[2295]: I1002 19:08:05.051583 2295 apiserver.go:52] "Watching apiserver" Oct 2 19:08:05.061767 kubelet[2295]: I1002 19:08:05.061682 2295 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:08:05.256650 kubelet[2295]: E1002 19:08:05.256623 2295 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ip-172-31-27-110\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ip-172-31-27-110" Oct 2 19:08:06.829000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521038 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:08:06.829000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00085e300 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:08:06.829000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:06.904000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:06.904000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007a1360 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:08:06.904000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:06.907000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:06.907000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007a15e0 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:08:06.907000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:06.909000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:06.909000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007a18c0 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:08:06.909000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:06.911000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:08:06.911000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0001e11a0 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:08:06.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:08:07.637389 systemd[1]: Reloading. Oct 2 19:08:07.779045 /usr/lib/systemd/system-generators/torcx-generator[2850]: time="2023-10-02T19:08:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:08:07.780477 /usr/lib/systemd/system-generators/torcx-generator[2850]: time="2023-10-02T19:08:07Z" level=info msg="torcx already run" Oct 2 19:08:08.018539 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:08:08.018563 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:08:08.069742 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:08:08.292961 kernel: kauditd_printk_skb: 29 callbacks suppressed Oct 2 19:08:08.293080 kernel: audit: type=1400 audit(1696273688.252:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.293142 kernel: audit: type=1400 audit(1696273688.252:737): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.309435 kernel: audit: type=1400 audit(1696273688.252:738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.309505 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:08:08.314445 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:08:08.314557 kernel: audit: backlog limit exceeded Oct 2 19:08:08.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.322391 kernel: audit: type=1400 audit(1696273688.252:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.322467 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:08:08.325191 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:08:08.325297 kernel: audit: backlog limit exceeded Oct 2 19:08:08.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.271000 audit: BPF prog-id=94 op=LOAD Oct 2 19:08:08.271000 audit: BPF prog-id=74 op=UNLOAD Oct 2 19:08:08.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.287000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.287000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.289000 audit: BPF prog-id=95 op=LOAD Oct 2 19:08:08.289000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:08:08.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.294000 audit: BPF prog-id=96 op=LOAD Oct 2 19:08:08.294000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:08:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.299000 audit: BPF prog-id=97 op=LOAD Oct 2 19:08:08.299000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:08:08.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.307000 audit: BPF prog-id=98 op=LOAD Oct 2 19:08:08.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.307000 audit: BPF prog-id=99 op=LOAD Oct 2 19:08:08.307000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:08:08.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.330000 audit: BPF prog-id=105 op=LOAD Oct 2 19:08:08.330000 audit: BPF prog-id=90 op=UNLOAD Oct 2 19:08:08.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.330000 audit: BPF prog-id=106 op=LOAD Oct 2 19:08:08.330000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit: BPF prog-id=107 op=LOAD Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.331000 audit: BPF prog-id=108 op=LOAD Oct 2 19:08:08.331000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:08:08.331000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:08:08.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.333000 audit: BPF prog-id=109 op=LOAD Oct 2 19:08:08.333000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:08:08.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.336000 audit: BPF prog-id=110 op=LOAD Oct 2 19:08:08.336000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:08:08.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.336000 audit: BPF prog-id=111 op=LOAD Oct 2 19:08:08.336000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:08:08.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.337000 audit: BPF prog-id=112 op=LOAD Oct 2 19:08:08.337000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit: BPF prog-id=113 op=LOAD Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.338000 audit: BPF prog-id=114 op=LOAD Oct 2 19:08:08.338000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:08:08.338000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:08:08.384550 systemd[1]: Stopping kubelet.service... Oct 2 19:08:08.385914 kubelet[2295]: I1002 19:08:08.385723 2295 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:08:08.409919 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:08:08.410315 systemd[1]: Stopped kubelet.service. Oct 2 19:08:08.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:08.413465 systemd[1]: Started kubelet.service. Oct 2 19:08:08.583009 kubelet[2903]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:08:08.583009 kubelet[2903]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:08:08.583009 kubelet[2903]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:08:08.583487 kubelet[2903]: I1002 19:08:08.583027 2903 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:08:08.596890 kubelet[2903]: I1002 19:08:08.596851 2903 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Oct 2 19:08:08.596890 kubelet[2903]: I1002 19:08:08.596878 2903 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:08:08.597177 kubelet[2903]: I1002 19:08:08.597150 2903 server.go:895] "Client rotation is on, will bootstrap in background" Oct 2 19:08:08.599917 kubelet[2903]: I1002 19:08:08.599883 2903 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:08:08.601794 kubelet[2903]: I1002 19:08:08.601749 2903 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:08:08.609364 kubelet[2903]: I1002 19:08:08.609336 2903 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:08:08.609728 kubelet[2903]: I1002 19:08:08.609705 2903 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:08:08.610123 kubelet[2903]: I1002 19:08:08.610097 2903 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Oct 2 19:08:08.610269 kubelet[2903]: I1002 19:08:08.610148 2903 topology_manager.go:138] "Creating topology manager with none policy" Oct 2 19:08:08.610269 kubelet[2903]: I1002 19:08:08.610162 2903 container_manager_linux.go:301] "Creating device plugin manager" Oct 2 19:08:08.610269 kubelet[2903]: I1002 19:08:08.610209 2903 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:08:08.610462 kubelet[2903]: I1002 19:08:08.610306 2903 kubelet.go:393] "Attempting to sync node with API server" Oct 2 19:08:08.610462 kubelet[2903]: I1002 19:08:08.610328 2903 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:08:08.610462 kubelet[2903]: I1002 19:08:08.610434 2903 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:08:08.610592 kubelet[2903]: I1002 19:08:08.610482 2903 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:08:08.612396 kubelet[2903]: I1002 19:08:08.612347 2903 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:08:08.613121 kubelet[2903]: I1002 19:08:08.613099 2903 server.go:1232] "Started kubelet" Oct 2 19:08:08.620000 audit[2903]: AVC avc: denied { mac_admin } for pid=2903 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.620000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:08:08.620000 audit[2903]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c2b170 a1=c000c206c0 a2=c000c2b140 a3=25 items=0 ppid=1 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:08.620000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:08:08.621000 audit[2903]: AVC avc: denied { mac_admin } for pid=2903 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.621000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:08:08.621000 audit[2903]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c68140 a1=c000c206d8 a2=c000c2b200 a3=25 items=0 ppid=1 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:08.621000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:08:08.623117 kubelet[2903]: I1002 19:08:08.622436 2903 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:08:08.623117 kubelet[2903]: I1002 19:08:08.622538 2903 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:08:08.623117 kubelet[2903]: I1002 19:08:08.622699 2903 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:08:08.632174 kubelet[2903]: I1002 19:08:08.632142 2903 volume_manager.go:291] "Starting Kubelet Volume Manager" Oct 2 19:08:08.634134 kubelet[2903]: I1002 19:08:08.634107 2903 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:08:08.648680 kubelet[2903]: I1002 19:08:08.648647 2903 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:08:08.650774 kubelet[2903]: I1002 19:08:08.650748 2903 server.go:462] "Adding debug handlers to kubelet server" Oct 2 19:08:08.653305 kubelet[2903]: I1002 19:08:08.653280 2903 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:08:08.653710 kubelet[2903]: I1002 19:08:08.653696 2903 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 2 19:08:08.663304 kubelet[2903]: I1002 19:08:08.663269 2903 reconciler_new.go:29] "Reconciler: start to sync state" Oct 2 19:08:08.684472 kubelet[2903]: I1002 19:08:08.684445 2903 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 2 19:08:08.686780 kubelet[2903]: I1002 19:08:08.686755 2903 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 2 19:08:08.687146 kubelet[2903]: I1002 19:08:08.687129 2903 status_manager.go:217] "Starting to sync pod status with apiserver" Oct 2 19:08:08.687410 kubelet[2903]: I1002 19:08:08.687396 2903 kubelet.go:2303] "Starting kubelet main sync loop" Oct 2 19:08:08.687597 kubelet[2903]: E1002 19:08:08.687560 2903 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:08:08.690860 kubelet[2903]: E1002 19:08:08.690835 2903 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:08:08.690975 kubelet[2903]: E1002 19:08:08.690886 2903 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:08:08.745815 kubelet[2903]: I1002 19:08:08.745791 2903 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-27-110" Oct 2 19:08:08.788229 kubelet[2903]: E1002 19:08:08.788197 2903 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 2 19:08:08.807594 kubelet[2903]: I1002 19:08:08.807550 2903 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-27-110" Oct 2 19:08:08.807919 kubelet[2903]: I1002 19:08:08.807754 2903 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-27-110" Oct 2 19:08:08.845850 kubelet[2903]: I1002 19:08:08.845750 2903 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:08:08.845850 kubelet[2903]: I1002 19:08:08.845778 2903 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:08:08.845850 kubelet[2903]: I1002 19:08:08.845803 2903 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:08:08.846478 kubelet[2903]: I1002 19:08:08.846457 2903 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:08:08.856517 kubelet[2903]: I1002 19:08:08.856474 2903 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 2 19:08:08.856694 kubelet[2903]: I1002 19:08:08.856533 2903 policy_none.go:49] "None policy: Start" Oct 2 19:08:08.858048 kubelet[2903]: I1002 19:08:08.858022 2903 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:08:08.858169 kubelet[2903]: I1002 19:08:08.858062 2903 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:08:08.859697 kubelet[2903]: I1002 19:08:08.859671 2903 state_mem.go:75] "Updated machine memory state" Oct 2 19:08:08.878533 kubelet[2903]: I1002 19:08:08.878502 2903 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:08:08.877000 audit[2903]: AVC avc: denied { mac_admin } for pid=2903 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:08.877000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:08:08.877000 audit[2903]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001161b00 a1=c001388e28 a2=c001161ad0 a3=25 items=0 ppid=1 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:08.877000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:08:08.878964 kubelet[2903]: I1002 19:08:08.878598 2903 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:08:08.881970 kubelet[2903]: I1002 19:08:08.881942 2903 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:08:08.988437 kubelet[2903]: I1002 19:08:08.988369 2903 topology_manager.go:215] "Topology Admit Handler" podUID="b191c505018ac6fc8e0f8a9cc6d70a20" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-27-110" Oct 2 19:08:08.988617 kubelet[2903]: I1002 19:08:08.988550 2903 topology_manager.go:215] "Topology Admit Handler" podUID="a20f2d64ebe6c4460318cd28f92f565a" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-27-110" Oct 2 19:08:08.988617 kubelet[2903]: I1002 19:08:08.988599 2903 topology_manager.go:215] "Topology Admit Handler" podUID="90a12d55729f068d7198224f6c5dda46" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-27-110" Oct 2 19:08:09.069210 kubelet[2903]: I1002 19:08:09.069171 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b191c505018ac6fc8e0f8a9cc6d70a20-ca-certs\") pod \"kube-controller-manager-ip-172-31-27-110\" (UID: \"b191c505018ac6fc8e0f8a9cc6d70a20\") " pod="kube-system/kube-controller-manager-ip-172-31-27-110" Oct 2 19:08:09.069388 kubelet[2903]: I1002 19:08:09.069240 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b191c505018ac6fc8e0f8a9cc6d70a20-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-27-110\" (UID: \"b191c505018ac6fc8e0f8a9cc6d70a20\") " pod="kube-system/kube-controller-manager-ip-172-31-27-110" Oct 2 19:08:09.069388 kubelet[2903]: I1002 19:08:09.069270 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/90a12d55729f068d7198224f6c5dda46-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-27-110\" (UID: \"90a12d55729f068d7198224f6c5dda46\") " pod="kube-system/kube-apiserver-ip-172-31-27-110" Oct 2 19:08:09.069388 kubelet[2903]: I1002 19:08:09.069294 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/90a12d55729f068d7198224f6c5dda46-ca-certs\") pod \"kube-apiserver-ip-172-31-27-110\" (UID: \"90a12d55729f068d7198224f6c5dda46\") " pod="kube-system/kube-apiserver-ip-172-31-27-110" Oct 2 19:08:09.069388 kubelet[2903]: I1002 19:08:09.069333 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/90a12d55729f068d7198224f6c5dda46-k8s-certs\") pod \"kube-apiserver-ip-172-31-27-110\" (UID: \"90a12d55729f068d7198224f6c5dda46\") " pod="kube-system/kube-apiserver-ip-172-31-27-110" Oct 2 19:08:09.069388 kubelet[2903]: I1002 19:08:09.069361 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b191c505018ac6fc8e0f8a9cc6d70a20-k8s-certs\") pod \"kube-controller-manager-ip-172-31-27-110\" (UID: \"b191c505018ac6fc8e0f8a9cc6d70a20\") " pod="kube-system/kube-controller-manager-ip-172-31-27-110" Oct 2 19:08:09.069639 kubelet[2903]: I1002 19:08:09.069485 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b191c505018ac6fc8e0f8a9cc6d70a20-kubeconfig\") pod \"kube-controller-manager-ip-172-31-27-110\" (UID: \"b191c505018ac6fc8e0f8a9cc6d70a20\") " pod="kube-system/kube-controller-manager-ip-172-31-27-110" Oct 2 19:08:09.069639 kubelet[2903]: I1002 19:08:09.069589 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b191c505018ac6fc8e0f8a9cc6d70a20-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-27-110\" (UID: \"b191c505018ac6fc8e0f8a9cc6d70a20\") " pod="kube-system/kube-controller-manager-ip-172-31-27-110" Oct 2 19:08:09.069787 kubelet[2903]: I1002 19:08:09.069658 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a20f2d64ebe6c4460318cd28f92f565a-kubeconfig\") pod \"kube-scheduler-ip-172-31-27-110\" (UID: \"a20f2d64ebe6c4460318cd28f92f565a\") " pod="kube-system/kube-scheduler-ip-172-31-27-110" Oct 2 19:08:09.633396 kubelet[2903]: I1002 19:08:09.629655 2903 apiserver.go:52] "Watching apiserver" Oct 2 19:08:09.735455 kubelet[2903]: I1002 19:08:09.735415 2903 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:08:09.818404 kubelet[2903]: I1002 19:08:09.818361 2903 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-27-110" podStartSLOduration=1.818304297 podCreationTimestamp="2023-10-02 19:08:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:08:09.806511937 +0000 UTC m=+1.367641735" watchObservedRunningTime="2023-10-02 19:08:09.818304297 +0000 UTC m=+1.379434263" Oct 2 19:08:09.818690 kubelet[2903]: I1002 19:08:09.818663 2903 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-27-110" podStartSLOduration=0.818634978 podCreationTimestamp="2023-10-02 19:08:09 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:08:09.816994243 +0000 UTC m=+1.378124041" watchObservedRunningTime="2023-10-02 19:08:09.818634978 +0000 UTC m=+1.379764773" Oct 2 19:08:09.828766 kubelet[2903]: I1002 19:08:09.828656 2903 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-27-110" podStartSLOduration=1.828613715 podCreationTimestamp="2023-10-02 19:08:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:08:09.828284257 +0000 UTC m=+1.389414054" watchObservedRunningTime="2023-10-02 19:08:09.828613715 +0000 UTC m=+1.389743509" Oct 2 19:08:13.369528 sudo[1891]: pam_unix(sudo:session): session closed for user root Oct 2 19:08:13.368000 audit[1891]: USER_END pid=1891 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:13.371367 kernel: kauditd_printk_skb: 364 callbacks suppressed Oct 2 19:08:13.371508 kernel: audit: type=1106 audit(1696273693.368:927): pid=1891 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:13.368000 audit[1891]: CRED_DISP pid=1891 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:13.382396 kernel: audit: type=1104 audit(1696273693.368:928): pid=1891 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:08:13.407236 sshd[1888]: pam_unix(sshd:session): session closed for user core Oct 2 19:08:13.409000 audit[1888]: USER_END pid=1888 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:13.419399 kernel: audit: type=1106 audit(1696273693.409:929): pid=1888 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:13.409000 audit[1888]: CRED_DISP pid=1888 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:13.426416 kernel: audit: type=1104 audit(1696273693.409:930): pid=1888 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:08:13.427573 systemd-logind[1622]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:08:13.427854 systemd[1]: sshd@6-172.31.27.110:22-139.178.89.65:50806.service: Deactivated successfully. Oct 2 19:08:13.429118 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:08:13.429328 systemd[1]: session-7.scope: Consumed 4.220s CPU time. Oct 2 19:08:13.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.110:22-139.178.89.65:50806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:13.437107 kernel: audit: type=1131 audit(1696273693.426:931): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.27.110:22-139.178.89.65:50806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:08:13.437777 systemd-logind[1622]: Removed session 7. Oct 2 19:08:19.806276 kubelet[2903]: I1002 19:08:19.806245 2903 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:08:19.807991 env[1629]: time="2023-10-02T19:08:19.807951120Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:08:19.808587 kubelet[2903]: I1002 19:08:19.808208 2903 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:08:20.416283 kubelet[2903]: I1002 19:08:20.416243 2903 topology_manager.go:215] "Topology Admit Handler" podUID="18a4f123-4f19-4648-972e-23cfcc1ca7df" podNamespace="kube-system" podName="kube-proxy-gqpd8" Oct 2 19:08:20.424218 systemd[1]: Created slice kubepods-besteffort-pod18a4f123_4f19_4648_972e_23cfcc1ca7df.slice. Oct 2 19:08:20.573836 kubelet[2903]: I1002 19:08:20.573800 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/18a4f123-4f19-4648-972e-23cfcc1ca7df-kube-proxy\") pod \"kube-proxy-gqpd8\" (UID: \"18a4f123-4f19-4648-972e-23cfcc1ca7df\") " pod="kube-system/kube-proxy-gqpd8" Oct 2 19:08:20.574031 kubelet[2903]: I1002 19:08:20.573855 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nd46n\" (UniqueName: \"kubernetes.io/projected/18a4f123-4f19-4648-972e-23cfcc1ca7df-kube-api-access-nd46n\") pod \"kube-proxy-gqpd8\" (UID: \"18a4f123-4f19-4648-972e-23cfcc1ca7df\") " pod="kube-system/kube-proxy-gqpd8" Oct 2 19:08:20.574031 kubelet[2903]: I1002 19:08:20.573888 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/18a4f123-4f19-4648-972e-23cfcc1ca7df-xtables-lock\") pod \"kube-proxy-gqpd8\" (UID: \"18a4f123-4f19-4648-972e-23cfcc1ca7df\") " pod="kube-system/kube-proxy-gqpd8" Oct 2 19:08:20.574031 kubelet[2903]: I1002 19:08:20.573913 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/18a4f123-4f19-4648-972e-23cfcc1ca7df-lib-modules\") pod \"kube-proxy-gqpd8\" (UID: \"18a4f123-4f19-4648-972e-23cfcc1ca7df\") " pod="kube-system/kube-proxy-gqpd8" Oct 2 19:08:20.698695 kubelet[2903]: I1002 19:08:20.698660 2903 topology_manager.go:215] "Topology Admit Handler" podUID="691c0cff-dfdd-4b08-90a3-0de37a10294d" podNamespace="tigera-operator" podName="tigera-operator-8547bd6cc6-52svw" Oct 2 19:08:20.705385 systemd[1]: Created slice kubepods-besteffort-pod691c0cff_dfdd_4b08_90a3_0de37a10294d.slice. Oct 2 19:08:20.738694 env[1629]: time="2023-10-02T19:08:20.738220624Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gqpd8,Uid:18a4f123-4f19-4648-972e-23cfcc1ca7df,Namespace:kube-system,Attempt:0,}" Oct 2 19:08:20.781151 kubelet[2903]: I1002 19:08:20.776165 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/691c0cff-dfdd-4b08-90a3-0de37a10294d-var-lib-calico\") pod \"tigera-operator-8547bd6cc6-52svw\" (UID: \"691c0cff-dfdd-4b08-90a3-0de37a10294d\") " pod="tigera-operator/tigera-operator-8547bd6cc6-52svw" Oct 2 19:08:20.781151 kubelet[2903]: I1002 19:08:20.776249 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gpkw5\" (UniqueName: \"kubernetes.io/projected/691c0cff-dfdd-4b08-90a3-0de37a10294d-kube-api-access-gpkw5\") pod \"tigera-operator-8547bd6cc6-52svw\" (UID: \"691c0cff-dfdd-4b08-90a3-0de37a10294d\") " pod="tigera-operator/tigera-operator-8547bd6cc6-52svw" Oct 2 19:08:20.791501 env[1629]: time="2023-10-02T19:08:20.791288744Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:20.791743 env[1629]: time="2023-10-02T19:08:20.791456071Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:20.791743 env[1629]: time="2023-10-02T19:08:20.791473592Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:20.791743 env[1629]: time="2023-10-02T19:08:20.791642963Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8d1387a8426a82ab9896fd658ea89cc6afe4a1c063f68ef6342c3516124d1aa3 pid=2989 runtime=io.containerd.runc.v2 Oct 2 19:08:20.825682 systemd[1]: Started cri-containerd-8d1387a8426a82ab9896fd658ea89cc6afe4a1c063f68ef6342c3516124d1aa3.scope. Oct 2 19:08:20.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.848949 kernel: audit: type=1400 audit(1696273700.842:932): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.861259 kernel: audit: type=1400 audit(1696273700.842:933): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.861563 kernel: audit: type=1400 audit(1696273700.842:934): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.871645 kernel: audit: type=1400 audit(1696273700.842:935): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.871827 kernel: audit: type=1400 audit(1696273700.842:936): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.871860 kernel: audit: type=1400 audit(1696273700.842:937): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.885571 kernel: audit: type=1400 audit(1696273700.842:938): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.898861 kernel: audit: type=1400 audit(1696273700.842:939): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.899001 kernel: audit: type=1400 audit(1696273700.842:940): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.899036 kernel: audit: type=1400 audit(1696273700.846:941): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.847000 audit: BPF prog-id=115 op=LOAD Oct 2 19:08:20.848000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.848000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2989 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313338376138343236613832616239383936666436353865613839 Oct 2 19:08:20.848000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.848000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2989 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313338376138343236613832616239383936666436353865613839 Oct 2 19:08:20.848000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.848000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.848000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.848000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.848000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.848000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.848000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.848000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.848000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.848000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.848000 audit: BPF prog-id=116 op=LOAD Oct 2 19:08:20.848000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185900 items=0 ppid=2989 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313338376138343236613832616239383936666436353865613839 Oct 2 19:08:20.866000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.866000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.866000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.866000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.866000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.866000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.866000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.866000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.866000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.866000 audit: BPF prog-id=117 op=LOAD Oct 2 19:08:20.866000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185948 items=0 ppid=2989 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313338376138343236613832616239383936666436353865613839 Oct 2 19:08:20.876000 audit: BPF prog-id=117 op=UNLOAD Oct 2 19:08:20.876000 audit: BPF prog-id=116 op=UNLOAD Oct 2 19:08:20.876000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.876000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.876000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.876000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.876000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.876000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.876000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.876000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.876000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.876000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:20.876000 audit: BPF prog-id=118 op=LOAD Oct 2 19:08:20.876000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185d58 items=0 ppid=2989 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:20.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313338376138343236613832616239383936666436353865613839 Oct 2 19:08:20.927568 env[1629]: time="2023-10-02T19:08:20.927520897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gqpd8,Uid:18a4f123-4f19-4648-972e-23cfcc1ca7df,Namespace:kube-system,Attempt:0,} returns sandbox id \"8d1387a8426a82ab9896fd658ea89cc6afe4a1c063f68ef6342c3516124d1aa3\"" Oct 2 19:08:20.931837 env[1629]: time="2023-10-02T19:08:20.931634049Z" level=info msg="CreateContainer within sandbox \"8d1387a8426a82ab9896fd658ea89cc6afe4a1c063f68ef6342c3516124d1aa3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:08:20.959455 env[1629]: time="2023-10-02T19:08:20.955340786Z" level=info msg="CreateContainer within sandbox \"8d1387a8426a82ab9896fd658ea89cc6afe4a1c063f68ef6342c3516124d1aa3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"59e524f70f0361d26f0cc549a2dc179a04aa86737e6a06c8cb65fd5c304cd619\"" Oct 2 19:08:20.960074 env[1629]: time="2023-10-02T19:08:20.960035262Z" level=info msg="StartContainer for \"59e524f70f0361d26f0cc549a2dc179a04aa86737e6a06c8cb65fd5c304cd619\"" Oct 2 19:08:20.993233 systemd[1]: Started cri-containerd-59e524f70f0361d26f0cc549a2dc179a04aa86737e6a06c8cb65fd5c304cd619.scope. Oct 2 19:08:21.010745 env[1629]: time="2023-10-02T19:08:21.010693202Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-52svw,Uid:691c0cff-dfdd-4b08-90a3-0de37a10294d,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:08:21.031000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.031000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2989 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539653532346637306630333631643236663063633534396132646331 Oct 2 19:08:21.031000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.031000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.031000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.031000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.031000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.031000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.031000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.031000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.031000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.031000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.031000 audit: BPF prog-id=119 op=LOAD Oct 2 19:08:21.031000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00020a690 items=0 ppid=2989 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539653532346637306630333631643236663063633534396132646331 Oct 2 19:08:21.032000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.032000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.032000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.032000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.032000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.032000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.032000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.032000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.032000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.032000 audit: BPF prog-id=120 op=LOAD Oct 2 19:08:21.032000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00020a6d8 items=0 ppid=2989 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539653532346637306630333631643236663063633534396132646331 Oct 2 19:08:21.034000 audit: BPF prog-id=120 op=UNLOAD Oct 2 19:08:21.034000 audit: BPF prog-id=119 op=UNLOAD Oct 2 19:08:21.034000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.034000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.034000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.034000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.034000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.034000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.034000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.034000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.034000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.034000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.034000 audit: BPF prog-id=121 op=LOAD Oct 2 19:08:21.034000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00020a768 items=0 ppid=2989 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539653532346637306630333631643236663063633534396132646331 Oct 2 19:08:21.045979 env[1629]: time="2023-10-02T19:08:21.045360590Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:21.045979 env[1629]: time="2023-10-02T19:08:21.045523287Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:21.045979 env[1629]: time="2023-10-02T19:08:21.045596217Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:21.048741 env[1629]: time="2023-10-02T19:08:21.046776342Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/651fca2806a3148e3dd2a471d75b03e648ea1e4bc20bbf7af3b6e0a649d5709d pid=3058 runtime=io.containerd.runc.v2 Oct 2 19:08:21.076292 env[1629]: time="2023-10-02T19:08:21.076237777Z" level=info msg="StartContainer for \"59e524f70f0361d26f0cc549a2dc179a04aa86737e6a06c8cb65fd5c304cd619\" returns successfully" Oct 2 19:08:21.091722 systemd[1]: Started cri-containerd-651fca2806a3148e3dd2a471d75b03e648ea1e4bc20bbf7af3b6e0a649d5709d.scope. Oct 2 19:08:21.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.111000 audit: BPF prog-id=122 op=LOAD Oct 2 19:08:21.112000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.112000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3058 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635316663613238303661333134386533646432613437316437356230 Oct 2 19:08:21.112000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.112000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3058 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635316663613238303661333134386533646432613437316437356230 Oct 2 19:08:21.112000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.112000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.112000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.112000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.112000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.112000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.112000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.112000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.112000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.112000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.112000 audit: BPF prog-id=123 op=LOAD Oct 2 19:08:21.112000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003d2830 items=0 ppid=3058 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635316663613238303661333134386533646432613437316437356230 Oct 2 19:08:21.113000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.113000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.113000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.113000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.113000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.113000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.113000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.113000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.113000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.113000 audit: BPF prog-id=124 op=LOAD Oct 2 19:08:21.113000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003d2878 items=0 ppid=3058 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635316663613238303661333134386533646432613437316437356230 Oct 2 19:08:21.114000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:08:21.114000 audit: BPF prog-id=123 op=UNLOAD Oct 2 19:08:21.114000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.114000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.114000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.114000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.114000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.114000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.114000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.114000 audit[3070]: AVC avc: denied { perfmon } for pid=3070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.114000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.114000 audit[3070]: AVC avc: denied { bpf } for pid=3070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:21.114000 audit: BPF prog-id=125 op=LOAD Oct 2 19:08:21.114000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d2c88 items=0 ppid=3058 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635316663613238303661333134386533646432613437316437356230 Oct 2 19:08:21.164137 env[1629]: time="2023-10-02T19:08:21.164092515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-52svw,Uid:691c0cff-dfdd-4b08-90a3-0de37a10294d,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"651fca2806a3148e3dd2a471d75b03e648ea1e4bc20bbf7af3b6e0a649d5709d\"" Oct 2 19:08:21.168781 env[1629]: time="2023-10-02T19:08:21.167940371Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:08:21.649000 audit[3130]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=3130 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:21.649000 audit[3130]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef24faef0 a2=0 a3=7ffef24faedc items=0 ppid=3044 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:08:21.650000 audit[3131]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=3131 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:21.650000 audit[3131]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd060e3e40 a2=0 a3=7ffd060e3e2c items=0 ppid=3044 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:08:21.652000 audit[3132]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=3132 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:21.652000 audit[3132]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff57758de0 a2=0 a3=7fff57758dcc items=0 ppid=3044 pid=3132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.652000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:08:21.656000 audit[3133]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=3133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.656000 audit[3133]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd41c8490 a2=0 a3=7ffcd41c847c items=0 ppid=3044 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:08:21.666000 audit[3134]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=3134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.666000 audit[3134]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4552cf60 a2=0 a3=7ffd4552cf4c items=0 ppid=3044 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.666000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:08:21.671000 audit[3135]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=3135 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.671000 audit[3135]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffddf34c410 a2=0 a3=7ffddf34c3fc items=0 ppid=3044 pid=3135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.671000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:08:21.762000 audit[3136]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.762000 audit[3136]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd09c749e0 a2=0 a3=7ffd09c749cc items=0 ppid=3044 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:08:21.768000 audit[3138]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3138 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.768000 audit[3138]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdd7b6a080 a2=0 a3=7ffdd7b6a06c items=0 ppid=3044 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:08:21.783000 audit[3141]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3141 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.783000 audit[3141]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc50af2c60 a2=0 a3=7ffc50af2c4c items=0 ppid=3044 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.783000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:08:21.800000 audit[3142]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.800000 audit[3142]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb00b09a0 a2=0 a3=7fffb00b098c items=0 ppid=3044 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.800000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:08:21.815000 audit[3144]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.815000 audit[3144]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff20458750 a2=0 a3=7fff2045873c items=0 ppid=3044 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.815000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:08:21.818000 audit[3145]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3145 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.818000 audit[3145]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd10737ef0 a2=0 a3=7ffd10737edc items=0 ppid=3044 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.818000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:08:21.823000 audit[3147]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3147 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.823000 audit[3147]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdec718fc0 a2=0 a3=7ffdec718fac items=0 ppid=3044 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.823000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:08:21.834000 audit[3150]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.834000 audit[3150]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffb82014b0 a2=0 a3=7fffb820149c items=0 ppid=3044 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.834000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:08:21.836000 audit[3151]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3151 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.836000 audit[3151]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebda4bca0 a2=0 a3=7ffebda4bc8c items=0 ppid=3044 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:08:21.841000 audit[3153]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3153 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.841000 audit[3153]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd46205080 a2=0 a3=7ffd4620506c items=0 ppid=3044 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.841000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:08:21.843000 audit[3154]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3154 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.843000 audit[3154]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7446b5d0 a2=0 a3=7ffe7446b5bc items=0 ppid=3044 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.843000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:08:21.848000 audit[3156]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3156 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.848000 audit[3156]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd76401d80 a2=0 a3=7ffd76401d6c items=0 ppid=3044 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.848000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:08:21.857000 audit[3159]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.857000 audit[3159]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff3ca075f0 a2=0 a3=7fff3ca075dc items=0 ppid=3044 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:08:21.863000 audit[3162]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.863000 audit[3162]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb6849890 a2=0 a3=7ffcb684987c items=0 ppid=3044 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.863000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:08:21.864000 audit[3163]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.864000 audit[3163]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd0460e1b0 a2=0 a3=7ffd0460e19c items=0 ppid=3044 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.864000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:08:21.879000 audit[3165]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3165 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.879000 audit[3165]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff96717d20 a2=0 a3=7fff96717d0c items=0 ppid=3044 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.879000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:08:21.884000 audit[3168]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3168 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.884000 audit[3168]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd57a43f30 a2=0 a3=7ffd57a43f1c items=0 ppid=3044 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:08:21.888000 audit[3169]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.888000 audit[3169]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1c6bd630 a2=0 a3=7ffd1c6bd61c items=0 ppid=3044 pid=3169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:08:21.892000 audit[3171]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3171 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:08:21.892000 audit[3171]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd8f68bda0 a2=0 a3=7ffd8f68bd8c items=0 ppid=3044 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:08:21.930000 audit[3177]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:21.930000 audit[3177]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffde58078f0 a2=0 a3=7ffde58078dc items=0 ppid=3044 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.930000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:21.939000 audit[3177]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:21.939000 audit[3177]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffde58078f0 a2=0 a3=7ffde58078dc items=0 ppid=3044 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.939000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:21.943000 audit[3182]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:21.943000 audit[3182]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcc2a337c0 a2=0 a3=7ffcc2a337ac items=0 ppid=3044 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.943000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:08:21.947000 audit[3184]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:21.947000 audit[3184]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff761f9cb0 a2=0 a3=7fff761f9c9c items=0 ppid=3044 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.947000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:08:21.953000 audit[3187]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:21.953000 audit[3187]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffec66648c0 a2=0 a3=7ffec66648ac items=0 ppid=3044 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.953000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:08:21.954000 audit[3188]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3188 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:21.954000 audit[3188]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc081a19c0 a2=0 a3=7ffc081a19ac items=0 ppid=3044 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.954000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:08:21.958000 audit[3190]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3190 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:21.958000 audit[3190]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb6b011b0 a2=0 a3=7ffeb6b0119c items=0 ppid=3044 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.958000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:08:21.960000 audit[3191]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:21.960000 audit[3191]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0c4cc470 a2=0 a3=7ffe0c4cc45c items=0 ppid=3044 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.960000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:08:21.964000 audit[3193]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3193 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:21.964000 audit[3193]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcd2fd7e30 a2=0 a3=7ffcd2fd7e1c items=0 ppid=3044 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:08:21.977000 audit[3196]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:21.977000 audit[3196]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffff4a31d60 a2=0 a3=7ffff4a31d4c items=0 ppid=3044 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.977000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:08:21.978000 audit[3197]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:21.978000 audit[3197]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd324452f0 a2=0 a3=7ffd324452dc items=0 ppid=3044 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.978000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:08:21.987000 audit[3199]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:21.987000 audit[3199]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda53b54e0 a2=0 a3=7ffda53b54cc items=0 ppid=3044 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.987000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:08:21.991000 audit[3200]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:21.991000 audit[3200]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd43259200 a2=0 a3=7ffd432591ec items=0 ppid=3044 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:21.991000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:08:22.011000 audit[3202]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:22.011000 audit[3202]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd47b31080 a2=0 a3=7ffd47b3106c items=0 ppid=3044 pid=3202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:08:22.017000 audit[3205]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:22.017000 audit[3205]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3ed94ba0 a2=0 a3=7ffe3ed94b8c items=0 ppid=3044 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.017000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:08:22.023000 audit[3208]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:22.023000 audit[3208]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd5165360 a2=0 a3=7ffdd516534c items=0 ppid=3044 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:08:22.025000 audit[3209]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:22.025000 audit[3209]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff469bea30 a2=0 a3=7fff469bea1c items=0 ppid=3044 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.025000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:08:22.030000 audit[3211]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:22.030000 audit[3211]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd959c2230 a2=0 a3=7ffd959c221c items=0 ppid=3044 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.030000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:08:22.034000 audit[3214]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:22.034000 audit[3214]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe0f993070 a2=0 a3=7ffe0f99305c items=0 ppid=3044 pid=3214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:08:22.036000 audit[3215]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:22.036000 audit[3215]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffceee2fb10 a2=0 a3=7ffceee2fafc items=0 ppid=3044 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.036000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:08:22.039000 audit[3217]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:22.039000 audit[3217]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffed3130930 a2=0 a3=7ffed313091c items=0 ppid=3044 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.039000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:08:22.040000 audit[3218]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:22.040000 audit[3218]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff949e7460 a2=0 a3=7fff949e744c items=0 ppid=3044 pid=3218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.040000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:08:22.044000 audit[3220]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:22.044000 audit[3220]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc76670680 a2=0 a3=7ffc7667066c items=0 ppid=3044 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:08:22.050000 audit[3223]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:08:22.050000 audit[3223]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff81450050 a2=0 a3=7fff8145003c items=0 ppid=3044 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:08:22.057000 audit[3225]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:08:22.057000 audit[3225]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffeffa70190 a2=0 a3=7ffeffa7017c items=0 ppid=3044 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.057000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:22.057000 audit[3225]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:08:22.057000 audit[3225]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffeffa70190 a2=0 a3=7ffeffa7017c items=0 ppid=3044 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:22.057000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:24.047238 env[1629]: time="2023-10-02T19:08:24.047190455Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:24.050713 env[1629]: time="2023-10-02T19:08:24.050640437Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:24.053168 env[1629]: time="2023-10-02T19:08:24.053124653Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:24.055876 env[1629]: time="2023-10-02T19:08:24.055842438Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:24.056432 env[1629]: time="2023-10-02T19:08:24.056398210Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:08:24.061465 env[1629]: time="2023-10-02T19:08:24.061424408Z" level=info msg="CreateContainer within sandbox \"651fca2806a3148e3dd2a471d75b03e648ea1e4bc20bbf7af3b6e0a649d5709d\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:08:24.080241 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount867460560.mount: Deactivated successfully. Oct 2 19:08:24.090355 env[1629]: time="2023-10-02T19:08:24.090291612Z" level=info msg="CreateContainer within sandbox \"651fca2806a3148e3dd2a471d75b03e648ea1e4bc20bbf7af3b6e0a649d5709d\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"436c694b82bc1c1646682f7098e1fb484ade6642f1d69a1c6fe461c27a3c7cc2\"" Oct 2 19:08:24.093417 env[1629]: time="2023-10-02T19:08:24.091233503Z" level=info msg="StartContainer for \"436c694b82bc1c1646682f7098e1fb484ade6642f1d69a1c6fe461c27a3c7cc2\"" Oct 2 19:08:24.143267 systemd[1]: Started cri-containerd-436c694b82bc1c1646682f7098e1fb484ade6642f1d69a1c6fe461c27a3c7cc2.scope. Oct 2 19:08:24.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.159000 audit: BPF prog-id=126 op=LOAD Oct 2 19:08:24.160000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.160000 audit[3233]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001a1c48 a2=10 a3=1c items=0 ppid=3058 pid=3233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:24.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433366336393462383262633163313634363638326637303938653166 Oct 2 19:08:24.160000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.160000 audit[3233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001a16b0 a2=3c a3=8 items=0 ppid=3058 pid=3233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:24.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433366336393462383262633163313634363638326637303938653166 Oct 2 19:08:24.160000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.160000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.160000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.160000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.160000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.160000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.160000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.160000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.160000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.160000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.160000 audit: BPF prog-id=127 op=LOAD Oct 2 19:08:24.160000 audit[3233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001a19d8 a2=78 a3=c000384af0 items=0 ppid=3058 pid=3233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:24.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433366336393462383262633163313634363638326637303938653166 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit: BPF prog-id=128 op=LOAD Oct 2 19:08:24.161000 audit[3233]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001a1770 a2=78 a3=c000384b38 items=0 ppid=3058 pid=3233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:24.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433366336393462383262633163313634363638326637303938653166 Oct 2 19:08:24.161000 audit: BPF prog-id=128 op=UNLOAD Oct 2 19:08:24.161000 audit: BPF prog-id=127 op=UNLOAD Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { perfmon } for pid=3233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit[3233]: AVC avc: denied { bpf } for pid=3233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:24.161000 audit: BPF prog-id=129 op=LOAD Oct 2 19:08:24.161000 audit[3233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001a1c30 a2=78 a3=c000384f48 items=0 ppid=3058 pid=3233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:24.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433366336393462383262633163313634363638326637303938653166 Oct 2 19:08:24.191349 env[1629]: time="2023-10-02T19:08:24.191220858Z" level=info msg="StartContainer for \"436c694b82bc1c1646682f7098e1fb484ade6642f1d69a1c6fe461c27a3c7cc2\" returns successfully" Oct 2 19:08:24.867665 kubelet[2903]: I1002 19:08:24.867632 2903 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-gqpd8" podStartSLOduration=4.8675812579999995 podCreationTimestamp="2023-10-02 19:08:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:08:21.85003423 +0000 UTC m=+13.411164025" watchObservedRunningTime="2023-10-02 19:08:24.867581258 +0000 UTC m=+16.428711054" Oct 2 19:08:25.075220 systemd[1]: run-containerd-runc-k8s.io-436c694b82bc1c1646682f7098e1fb484ade6642f1d69a1c6fe461c27a3c7cc2-runc.mfELOX.mount: Deactivated successfully. Oct 2 19:08:26.820418 kernel: kauditd_printk_skb: 357 callbacks suppressed Oct 2 19:08:26.820585 kernel: audit: type=1325 audit(1696273706.815:1043): table=filter:89 family=2 entries=14 op=nft_register_rule pid=3262 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:26.815000 audit[3262]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=3262 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:26.815000 audit[3262]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc6fd94bc0 a2=0 a3=7ffc6fd94bac items=0 ppid=3044 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:26.830399 kernel: audit: type=1300 audit(1696273706.815:1043): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc6fd94bc0 a2=0 a3=7ffc6fd94bac items=0 ppid=3044 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:26.815000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:26.816000 audit[3262]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3262 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:26.838650 kernel: audit: type=1327 audit(1696273706.815:1043): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:26.838781 kernel: audit: type=1325 audit(1696273706.816:1044): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3262 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:26.816000 audit[3262]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc6fd94bc0 a2=0 a3=31030 items=0 ppid=3044 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:26.846210 kernel: audit: type=1300 audit(1696273706.816:1044): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc6fd94bc0 a2=0 a3=31030 items=0 ppid=3044 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:26.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:26.855022 kernel: audit: type=1327 audit(1696273706.816:1044): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:26.858000 audit[3264]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=3264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:26.858000 audit[3264]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd509dcc60 a2=0 a3=7ffd509dcc4c items=0 ppid=3044 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:26.870397 kernel: audit: type=1325 audit(1696273706.858:1045): table=filter:91 family=2 entries=15 op=nft_register_rule pid=3264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:26.870535 kernel: audit: type=1300 audit(1696273706.858:1045): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd509dcc60 a2=0 a3=7ffd509dcc4c items=0 ppid=3044 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:26.870574 kernel: audit: type=1327 audit(1696273706.858:1045): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:26.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:26.858000 audit[3264]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:26.858000 audit[3264]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd509dcc60 a2=0 a3=31030 items=0 ppid=3044 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:26.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:26.887462 kernel: audit: type=1325 audit(1696273706.858:1046): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:27.091751 kubelet[2903]: I1002 19:08:27.091499 2903 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-8547bd6cc6-52svw" podStartSLOduration=4.2009347439999996 podCreationTimestamp="2023-10-02 19:08:20 +0000 UTC" firstStartedPulling="2023-10-02 19:08:21.166307483 +0000 UTC m=+12.727437257" lastFinishedPulling="2023-10-02 19:08:24.056816488 +0000 UTC m=+15.617946279" observedRunningTime="2023-10-02 19:08:24.870175164 +0000 UTC m=+16.431304957" watchObservedRunningTime="2023-10-02 19:08:27.091443766 +0000 UTC m=+18.652573562" Oct 2 19:08:27.093313 kubelet[2903]: I1002 19:08:27.093289 2903 topology_manager.go:215] "Topology Admit Handler" podUID="91b725ca-d397-46cb-bd90-07b638d3850b" podNamespace="calico-system" podName="calico-typha-84bb7cc994-pkzk4" Oct 2 19:08:27.101160 systemd[1]: Created slice kubepods-besteffort-pod91b725ca_d397_46cb_bd90_07b638d3850b.slice. Oct 2 19:08:27.236898 kubelet[2903]: I1002 19:08:27.236866 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/91b725ca-d397-46cb-bd90-07b638d3850b-tigera-ca-bundle\") pod \"calico-typha-84bb7cc994-pkzk4\" (UID: \"91b725ca-d397-46cb-bd90-07b638d3850b\") " pod="calico-system/calico-typha-84bb7cc994-pkzk4" Oct 2 19:08:27.237112 kubelet[2903]: I1002 19:08:27.237100 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mkzv5\" (UniqueName: \"kubernetes.io/projected/91b725ca-d397-46cb-bd90-07b638d3850b-kube-api-access-mkzv5\") pod \"calico-typha-84bb7cc994-pkzk4\" (UID: \"91b725ca-d397-46cb-bd90-07b638d3850b\") " pod="calico-system/calico-typha-84bb7cc994-pkzk4" Oct 2 19:08:27.237237 kubelet[2903]: I1002 19:08:27.237228 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/91b725ca-d397-46cb-bd90-07b638d3850b-typha-certs\") pod \"calico-typha-84bb7cc994-pkzk4\" (UID: \"91b725ca-d397-46cb-bd90-07b638d3850b\") " pod="calico-system/calico-typha-84bb7cc994-pkzk4" Oct 2 19:08:27.269224 kubelet[2903]: I1002 19:08:27.269189 2903 topology_manager.go:215] "Topology Admit Handler" podUID="04b0c57e-2d33-4aa3-8e9e-5a80580612e6" podNamespace="calico-system" podName="calico-node-jttfg" Oct 2 19:08:27.277080 systemd[1]: Created slice kubepods-besteffort-pod04b0c57e_2d33_4aa3_8e9e_5a80580612e6.slice. Oct 2 19:08:27.339217 kubelet[2903]: I1002 19:08:27.339178 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/04b0c57e-2d33-4aa3-8e9e-5a80580612e6-lib-modules\") pod \"calico-node-jttfg\" (UID: \"04b0c57e-2d33-4aa3-8e9e-5a80580612e6\") " pod="calico-system/calico-node-jttfg" Oct 2 19:08:27.339393 kubelet[2903]: I1002 19:08:27.339325 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/04b0c57e-2d33-4aa3-8e9e-5a80580612e6-var-lib-calico\") pod \"calico-node-jttfg\" (UID: \"04b0c57e-2d33-4aa3-8e9e-5a80580612e6\") " pod="calico-system/calico-node-jttfg" Oct 2 19:08:27.339393 kubelet[2903]: I1002 19:08:27.339372 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/04b0c57e-2d33-4aa3-8e9e-5a80580612e6-cni-log-dir\") pod \"calico-node-jttfg\" (UID: \"04b0c57e-2d33-4aa3-8e9e-5a80580612e6\") " pod="calico-system/calico-node-jttfg" Oct 2 19:08:27.339526 kubelet[2903]: I1002 19:08:27.339434 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/04b0c57e-2d33-4aa3-8e9e-5a80580612e6-tigera-ca-bundle\") pod \"calico-node-jttfg\" (UID: \"04b0c57e-2d33-4aa3-8e9e-5a80580612e6\") " pod="calico-system/calico-node-jttfg" Oct 2 19:08:27.339526 kubelet[2903]: I1002 19:08:27.339482 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/04b0c57e-2d33-4aa3-8e9e-5a80580612e6-node-certs\") pod \"calico-node-jttfg\" (UID: \"04b0c57e-2d33-4aa3-8e9e-5a80580612e6\") " pod="calico-system/calico-node-jttfg" Oct 2 19:08:27.339621 kubelet[2903]: I1002 19:08:27.339537 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/04b0c57e-2d33-4aa3-8e9e-5a80580612e6-var-run-calico\") pod \"calico-node-jttfg\" (UID: \"04b0c57e-2d33-4aa3-8e9e-5a80580612e6\") " pod="calico-system/calico-node-jttfg" Oct 2 19:08:27.339621 kubelet[2903]: I1002 19:08:27.339572 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/04b0c57e-2d33-4aa3-8e9e-5a80580612e6-cni-net-dir\") pod \"calico-node-jttfg\" (UID: \"04b0c57e-2d33-4aa3-8e9e-5a80580612e6\") " pod="calico-system/calico-node-jttfg" Oct 2 19:08:27.339621 kubelet[2903]: I1002 19:08:27.339617 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/04b0c57e-2d33-4aa3-8e9e-5a80580612e6-policysync\") pod \"calico-node-jttfg\" (UID: \"04b0c57e-2d33-4aa3-8e9e-5a80580612e6\") " pod="calico-system/calico-node-jttfg" Oct 2 19:08:27.340996 kubelet[2903]: I1002 19:08:27.339649 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/04b0c57e-2d33-4aa3-8e9e-5a80580612e6-xtables-lock\") pod \"calico-node-jttfg\" (UID: \"04b0c57e-2d33-4aa3-8e9e-5a80580612e6\") " pod="calico-system/calico-node-jttfg" Oct 2 19:08:27.340996 kubelet[2903]: I1002 19:08:27.339695 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/04b0c57e-2d33-4aa3-8e9e-5a80580612e6-cni-bin-dir\") pod \"calico-node-jttfg\" (UID: \"04b0c57e-2d33-4aa3-8e9e-5a80580612e6\") " pod="calico-system/calico-node-jttfg" Oct 2 19:08:27.340996 kubelet[2903]: I1002 19:08:27.340966 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/04b0c57e-2d33-4aa3-8e9e-5a80580612e6-flexvol-driver-host\") pod \"calico-node-jttfg\" (UID: \"04b0c57e-2d33-4aa3-8e9e-5a80580612e6\") " pod="calico-system/calico-node-jttfg" Oct 2 19:08:27.341160 kubelet[2903]: I1002 19:08:27.341070 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7lmk9\" (UniqueName: \"kubernetes.io/projected/04b0c57e-2d33-4aa3-8e9e-5a80580612e6-kube-api-access-7lmk9\") pod \"calico-node-jttfg\" (UID: \"04b0c57e-2d33-4aa3-8e9e-5a80580612e6\") " pod="calico-system/calico-node-jttfg" Oct 2 19:08:27.410839 env[1629]: time="2023-10-02T19:08:27.408096254Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-84bb7cc994-pkzk4,Uid:91b725ca-d397-46cb-bd90-07b638d3850b,Namespace:calico-system,Attempt:0,}" Oct 2 19:08:27.440428 env[1629]: time="2023-10-02T19:08:27.440311335Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:27.440428 env[1629]: time="2023-10-02T19:08:27.440356124Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:27.440428 env[1629]: time="2023-10-02T19:08:27.440387739Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:27.441066 env[1629]: time="2023-10-02T19:08:27.441011638Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f5ca78e87fa80d33d53ae863e46c14b3404c0e89a1b15bb2e721f31669c5aa2 pid=3273 runtime=io.containerd.runc.v2 Oct 2 19:08:27.453305 kubelet[2903]: E1002 19:08:27.453275 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:27.453521 kubelet[2903]: W1002 19:08:27.453499 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:27.453630 kubelet[2903]: E1002 19:08:27.453618 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:27.480582 kubelet[2903]: E1002 19:08:27.480418 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:27.480582 kubelet[2903]: W1002 19:08:27.480440 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:27.480582 kubelet[2903]: E1002 19:08:27.480507 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:27.502266 systemd[1]: Started cri-containerd-6f5ca78e87fa80d33d53ae863e46c14b3404c0e89a1b15bb2e721f31669c5aa2.scope. Oct 2 19:08:27.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.564000 audit: BPF prog-id=130 op=LOAD Oct 2 19:08:27.565000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.565000 audit[3286]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3273 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:27.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666356361373865383766613830643333643533616538363365343663 Oct 2 19:08:27.565000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.565000 audit[3286]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3273 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:27.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666356361373865383766613830643333643533616538363365343663 Oct 2 19:08:27.566000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.566000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.566000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.566000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.566000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.566000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.566000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.566000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.566000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.566000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.566000 audit: BPF prog-id=131 op=LOAD Oct 2 19:08:27.566000 audit[3286]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00036c780 items=0 ppid=3273 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:27.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666356361373865383766613830643333643533616538363365343663 Oct 2 19:08:27.567000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.567000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.567000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.567000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.567000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.567000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.567000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.567000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.567000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.567000 audit: BPF prog-id=132 op=LOAD Oct 2 19:08:27.567000 audit[3286]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00036c7c8 items=0 ppid=3273 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:27.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666356361373865383766613830643333643533616538363365343663 Oct 2 19:08:27.567000 audit: BPF prog-id=132 op=UNLOAD Oct 2 19:08:27.567000 audit: BPF prog-id=131 op=UNLOAD Oct 2 19:08:27.568000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.568000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.568000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.568000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.568000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.568000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.568000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.568000 audit[3286]: AVC avc: denied { perfmon } for pid=3286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.568000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.568000 audit[3286]: AVC avc: denied { bpf } for pid=3286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.568000 audit: BPF prog-id=133 op=LOAD Oct 2 19:08:27.568000 audit[3286]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00036cbd8 items=0 ppid=3273 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:27.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666356361373865383766613830643333643533616538363365343663 Oct 2 19:08:27.585813 env[1629]: time="2023-10-02T19:08:27.585764572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jttfg,Uid:04b0c57e-2d33-4aa3-8e9e-5a80580612e6,Namespace:calico-system,Attempt:0,}" Oct 2 19:08:27.634136 env[1629]: time="2023-10-02T19:08:27.634066699Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:27.634499 env[1629]: time="2023-10-02T19:08:27.634466134Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:27.634633 env[1629]: time="2023-10-02T19:08:27.634608852Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:27.634916 env[1629]: time="2023-10-02T19:08:27.634868912Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1c075417b88ad3890308a53ad81b0044baee74760858fc37a600e40ae68ff4be pid=3312 runtime=io.containerd.runc.v2 Oct 2 19:08:27.665938 systemd[1]: Started cri-containerd-1c075417b88ad3890308a53ad81b0044baee74760858fc37a600e40ae68ff4be.scope. Oct 2 19:08:27.683565 env[1629]: time="2023-10-02T19:08:27.683488136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-84bb7cc994-pkzk4,Uid:91b725ca-d397-46cb-bd90-07b638d3850b,Namespace:calico-system,Attempt:0,} returns sandbox id \"6f5ca78e87fa80d33d53ae863e46c14b3404c0e89a1b15bb2e721f31669c5aa2\"" Oct 2 19:08:27.698116 env[1629]: time="2023-10-02T19:08:27.698057841Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 19:08:27.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.709000 audit: BPF prog-id=134 op=LOAD Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3312 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:27.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163303735343137623838616433383930333038613533616438316230 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3312 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:27.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163303735343137623838616433383930333038613533616438316230 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit: BPF prog-id=135 op=LOAD Oct 2 19:08:27.710000 audit[3321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003b26e0 items=0 ppid=3312 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:27.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163303735343137623838616433383930333038613533616438316230 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit: BPF prog-id=136 op=LOAD Oct 2 19:08:27.710000 audit[3321]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003b2728 items=0 ppid=3312 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:27.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163303735343137623838616433383930333038613533616438316230 Oct 2 19:08:27.710000 audit: BPF prog-id=136 op=UNLOAD Oct 2 19:08:27.710000 audit: BPF prog-id=135 op=UNLOAD Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { perfmon } for pid=3321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit[3321]: AVC avc: denied { bpf } for pid=3321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:27.710000 audit: BPF prog-id=137 op=LOAD Oct 2 19:08:27.710000 audit[3321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003b2b38 items=0 ppid=3312 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:27.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163303735343137623838616433383930333038613533616438316230 Oct 2 19:08:27.745768 env[1629]: time="2023-10-02T19:08:27.745721213Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jttfg,Uid:04b0c57e-2d33-4aa3-8e9e-5a80580612e6,Namespace:calico-system,Attempt:0,} returns sandbox id \"1c075417b88ad3890308a53ad81b0044baee74760858fc37a600e40ae68ff4be\"" Oct 2 19:08:27.899000 audit[3354]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:27.899000 audit[3354]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe49ef99c0 a2=0 a3=7ffe49ef99ac items=0 ppid=3044 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:27.899000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:27.900000 audit[3354]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:27.900000 audit[3354]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe49ef99c0 a2=0 a3=31030 items=0 ppid=3044 pid=3354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:27.900000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:29.075709 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1075129504.mount: Deactivated successfully. Oct 2 19:08:31.433496 env[1629]: time="2023-10-02T19:08:31.433449354Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:31.439663 env[1629]: time="2023-10-02T19:08:31.439622453Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:31.444918 env[1629]: time="2023-10-02T19:08:31.444877536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:31.452081 env[1629]: time="2023-10-02T19:08:31.452034565Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:31.459175 env[1629]: time="2023-10-02T19:08:31.454210241Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\"" Oct 2 19:08:31.461101 env[1629]: time="2023-10-02T19:08:31.461061138Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:08:31.462657 env[1629]: time="2023-10-02T19:08:31.462623213Z" level=info msg="CreateContainer within sandbox \"6f5ca78e87fa80d33d53ae863e46c14b3404c0e89a1b15bb2e721f31669c5aa2\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 19:08:31.494632 env[1629]: time="2023-10-02T19:08:31.494584258Z" level=info msg="CreateContainer within sandbox \"6f5ca78e87fa80d33d53ae863e46c14b3404c0e89a1b15bb2e721f31669c5aa2\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"641c69dde165452b9772af83e03422b622ad937c58a413c924d5b421d735da70\"" Oct 2 19:08:31.495804 env[1629]: time="2023-10-02T19:08:31.495773885Z" level=info msg="StartContainer for \"641c69dde165452b9772af83e03422b622ad937c58a413c924d5b421d735da70\"" Oct 2 19:08:31.550355 systemd[1]: Started cri-containerd-641c69dde165452b9772af83e03422b622ad937c58a413c924d5b421d735da70.scope. Oct 2 19:08:31.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.641000 audit: BPF prog-id=138 op=LOAD Oct 2 19:08:31.643000 audit[3362]: AVC avc: denied { bpf } for pid=3362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.643000 audit[3362]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3273 pid=3362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:31.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634316336396464653136353435326239373732616638336530333432 Oct 2 19:08:31.644000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.644000 audit[3362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3273 pid=3362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:31.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634316336396464653136353435326239373732616638336530333432 Oct 2 19:08:31.644000 audit[3362]: AVC avc: denied { bpf } for pid=3362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.644000 audit[3362]: AVC avc: denied { bpf } for pid=3362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.644000 audit[3362]: AVC avc: denied { bpf } for pid=3362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.644000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.644000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.644000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.644000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.644000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.644000 audit[3362]: AVC avc: denied { bpf } for pid=3362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.644000 audit[3362]: AVC avc: denied { bpf } for pid=3362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.644000 audit: BPF prog-id=139 op=LOAD Oct 2 19:08:31.644000 audit[3362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003ace00 items=0 ppid=3273 pid=3362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:31.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634316336396464653136353435326239373732616638336530333432 Oct 2 19:08:31.646000 audit[3362]: AVC avc: denied { bpf } for pid=3362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.646000 audit[3362]: AVC avc: denied { bpf } for pid=3362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.646000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.646000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.646000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.646000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.646000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.646000 audit[3362]: AVC avc: denied { bpf } for pid=3362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.646000 audit[3362]: AVC avc: denied { bpf } for pid=3362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.646000 audit: BPF prog-id=140 op=LOAD Oct 2 19:08:31.646000 audit[3362]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003ace48 items=0 ppid=3273 pid=3362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:31.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634316336396464653136353435326239373732616638336530333432 Oct 2 19:08:31.647000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:08:31.647000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:08:31.648000 audit[3362]: AVC avc: denied { bpf } for pid=3362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.648000 audit[3362]: AVC avc: denied { bpf } for pid=3362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.648000 audit[3362]: AVC avc: denied { bpf } for pid=3362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.648000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.648000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.648000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.648000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.648000 audit[3362]: AVC avc: denied { perfmon } for pid=3362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.648000 audit[3362]: AVC avc: denied { bpf } for pid=3362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.648000 audit[3362]: AVC avc: denied { bpf } for pid=3362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:31.648000 audit: BPF prog-id=141 op=LOAD Oct 2 19:08:31.648000 audit[3362]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003ad258 items=0 ppid=3273 pid=3362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:31.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634316336396464653136353435326239373732616638336530333432 Oct 2 19:08:31.707793 env[1629]: time="2023-10-02T19:08:31.704524197Z" level=info msg="StartContainer for \"641c69dde165452b9772af83e03422b622ad937c58a413c924d5b421d735da70\" returns successfully" Oct 2 19:08:31.919430 kubelet[2903]: E1002 19:08:31.919401 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:31.920071 kubelet[2903]: W1002 19:08:31.919910 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:31.920071 kubelet[2903]: E1002 19:08:31.919952 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:31.920266 kubelet[2903]: E1002 19:08:31.920255 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:31.920344 kubelet[2903]: W1002 19:08:31.920331 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:31.920447 kubelet[2903]: E1002 19:08:31.920437 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:31.920740 kubelet[2903]: E1002 19:08:31.920726 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:31.920844 kubelet[2903]: W1002 19:08:31.920832 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:31.920922 kubelet[2903]: E1002 19:08:31.920912 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:31.921698 kubelet[2903]: E1002 19:08:31.921682 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:31.921805 kubelet[2903]: W1002 19:08:31.921791 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:31.921908 kubelet[2903]: E1002 19:08:31.921898 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:31.922360 kubelet[2903]: E1002 19:08:31.922347 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:31.924504 kubelet[2903]: W1002 19:08:31.924486 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:31.924599 kubelet[2903]: E1002 19:08:31.924589 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:31.924974 kubelet[2903]: E1002 19:08:31.924961 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:31.925071 kubelet[2903]: W1002 19:08:31.925058 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:31.925156 kubelet[2903]: E1002 19:08:31.925148 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:31.925499 kubelet[2903]: E1002 19:08:31.925489 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:31.925593 kubelet[2903]: W1002 19:08:31.925583 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:31.925666 kubelet[2903]: E1002 19:08:31.925658 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:31.925924 kubelet[2903]: E1002 19:08:31.925913 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:31.926009 kubelet[2903]: W1002 19:08:31.925999 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:31.926285 kubelet[2903]: E1002 19:08:31.926272 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:31.928659 kubelet[2903]: E1002 19:08:31.928644 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:31.928789 kubelet[2903]: W1002 19:08:31.928773 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:31.928878 kubelet[2903]: E1002 19:08:31.928868 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:31.929155 kubelet[2903]: E1002 19:08:31.929142 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:31.929251 kubelet[2903]: W1002 19:08:31.929239 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:31.929336 kubelet[2903]: E1002 19:08:31.929327 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:31.932770 kubelet[2903]: E1002 19:08:31.932751 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:31.932917 kubelet[2903]: W1002 19:08:31.932901 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:31.933015 kubelet[2903]: E1002 19:08:31.933004 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:31.933313 kubelet[2903]: E1002 19:08:31.933301 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:31.937569 kubelet[2903]: W1002 19:08:31.937463 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:31.937749 kubelet[2903]: E1002 19:08:31.937735 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:31.938128 kubelet[2903]: E1002 19:08:31.938114 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:31.938226 kubelet[2903]: W1002 19:08:31.938214 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:31.938308 kubelet[2903]: E1002 19:08:31.938300 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:31.938766 kubelet[2903]: E1002 19:08:31.938752 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:31.938873 kubelet[2903]: W1002 19:08:31.938861 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:31.938965 kubelet[2903]: E1002 19:08:31.938956 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:31.939227 kubelet[2903]: E1002 19:08:31.939216 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:31.939312 kubelet[2903]: W1002 19:08:31.939302 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:31.943448 kubelet[2903]: E1002 19:08:31.943418 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.003942 kubelet[2903]: E1002 19:08:32.003813 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.003942 kubelet[2903]: W1002 19:08:32.003848 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.003942 kubelet[2903]: E1002 19:08:32.003874 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.006184 kubelet[2903]: E1002 19:08:32.006154 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.006184 kubelet[2903]: W1002 19:08:32.006182 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.006530 kubelet[2903]: E1002 19:08:32.006212 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.006670 kubelet[2903]: E1002 19:08:32.006653 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.006743 kubelet[2903]: W1002 19:08:32.006672 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.006743 kubelet[2903]: E1002 19:08:32.006696 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.007014 kubelet[2903]: E1002 19:08:32.006997 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.007014 kubelet[2903]: W1002 19:08:32.007011 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.007154 kubelet[2903]: E1002 19:08:32.007034 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.007355 kubelet[2903]: E1002 19:08:32.007337 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.007355 kubelet[2903]: W1002 19:08:32.007351 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.007509 kubelet[2903]: E1002 19:08:32.007469 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.007707 kubelet[2903]: E1002 19:08:32.007691 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.007707 kubelet[2903]: W1002 19:08:32.007704 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.007823 kubelet[2903]: E1002 19:08:32.007816 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.008008 kubelet[2903]: E1002 19:08:32.007993 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.008008 kubelet[2903]: W1002 19:08:32.008005 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.008125 kubelet[2903]: E1002 19:08:32.008112 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.008301 kubelet[2903]: E1002 19:08:32.008286 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.008301 kubelet[2903]: W1002 19:08:32.008298 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.008611 kubelet[2903]: E1002 19:08:32.008319 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.008797 kubelet[2903]: E1002 19:08:32.008779 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.008797 kubelet[2903]: W1002 19:08:32.008793 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.008920 kubelet[2903]: E1002 19:08:32.008814 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.009319 kubelet[2903]: E1002 19:08:32.009302 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.009319 kubelet[2903]: W1002 19:08:32.009316 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.009467 kubelet[2903]: E1002 19:08:32.009435 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.009669 kubelet[2903]: E1002 19:08:32.009652 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.009669 kubelet[2903]: W1002 19:08:32.009665 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.009797 kubelet[2903]: E1002 19:08:32.009764 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.009959 kubelet[2903]: E1002 19:08:32.009944 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.009959 kubelet[2903]: W1002 19:08:32.009957 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.010179 kubelet[2903]: E1002 19:08:32.009977 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.010320 kubelet[2903]: E1002 19:08:32.010308 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.010466 kubelet[2903]: W1002 19:08:32.010448 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.010580 kubelet[2903]: E1002 19:08:32.010533 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.011238 kubelet[2903]: E1002 19:08:32.011032 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.011238 kubelet[2903]: W1002 19:08:32.011081 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.011633 kubelet[2903]: E1002 19:08:32.011332 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.011974 kubelet[2903]: E1002 19:08:32.011957 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.011974 kubelet[2903]: W1002 19:08:32.011971 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.012149 kubelet[2903]: E1002 19:08:32.012031 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.012570 kubelet[2903]: E1002 19:08:32.012551 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.012570 kubelet[2903]: W1002 19:08:32.012565 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.012699 kubelet[2903]: E1002 19:08:32.012586 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.013237 kubelet[2903]: E1002 19:08:32.013220 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.013237 kubelet[2903]: W1002 19:08:32.013236 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.013369 kubelet[2903]: E1002 19:08:32.013347 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.013727 kubelet[2903]: E1002 19:08:32.013712 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.013727 kubelet[2903]: W1002 19:08:32.013724 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.013868 kubelet[2903]: E1002 19:08:32.013742 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.478152 systemd[1]: run-containerd-runc-k8s.io-641c69dde165452b9772af83e03422b622ad937c58a413c924d5b421d735da70-runc.Uvt05w.mount: Deactivated successfully. Oct 2 19:08:32.640444 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3548332373.mount: Deactivated successfully. Oct 2 19:08:32.911203 kubelet[2903]: I1002 19:08:32.910763 2903 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-84bb7cc994-pkzk4" podStartSLOduration=2.142207048 podCreationTimestamp="2023-10-02 19:08:27 +0000 UTC" firstStartedPulling="2023-10-02 19:08:27.691576237 +0000 UTC m=+19.252706026" lastFinishedPulling="2023-10-02 19:08:31.460068441 +0000 UTC m=+23.021198217" observedRunningTime="2023-10-02 19:08:31.958389327 +0000 UTC m=+23.519519120" watchObservedRunningTime="2023-10-02 19:08:32.910699239 +0000 UTC m=+24.471829033" Oct 2 19:08:32.941000 audit[3429]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:32.946425 kernel: kauditd_printk_skb: 179 callbacks suppressed Oct 2 19:08:32.946744 kernel: audit: type=1325 audit(1696273712.941:1103): table=filter:95 family=2 entries=15 op=nft_register_rule pid=3429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:32.941000 audit[3429]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffca8e27990 a2=0 a3=7ffca8e2797c items=0 ppid=3044 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:32.956201 kubelet[2903]: E1002 19:08:32.956167 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.956772 kernel: audit: type=1300 audit(1696273712.941:1103): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffca8e27990 a2=0 a3=7ffca8e2797c items=0 ppid=3044 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:32.956831 kubelet[2903]: W1002 19:08:32.956201 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.956831 kubelet[2903]: E1002 19:08:32.956229 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.956831 kubelet[2903]: E1002 19:08:32.956706 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.956831 kubelet[2903]: W1002 19:08:32.956721 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.956831 kubelet[2903]: E1002 19:08:32.956740 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.957086 kubelet[2903]: E1002 19:08:32.956942 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.957086 kubelet[2903]: W1002 19:08:32.956951 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.957086 kubelet[2903]: E1002 19:08:32.956967 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.957222 kubelet[2903]: E1002 19:08:32.957148 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.957222 kubelet[2903]: W1002 19:08:32.957156 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.957222 kubelet[2903]: E1002 19:08:32.957171 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.957514 kubelet[2903]: E1002 19:08:32.957361 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.957514 kubelet[2903]: W1002 19:08:32.957387 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.957514 kubelet[2903]: E1002 19:08:32.957402 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.957789 kubelet[2903]: E1002 19:08:32.957596 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.957789 kubelet[2903]: W1002 19:08:32.957605 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.957789 kubelet[2903]: E1002 19:08:32.957619 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.957945 kubelet[2903]: E1002 19:08:32.957883 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.957945 kubelet[2903]: W1002 19:08:32.957892 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.957945 kubelet[2903]: E1002 19:08:32.957907 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.958102 kubelet[2903]: E1002 19:08:32.958083 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.958102 kubelet[2903]: W1002 19:08:32.958099 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.958228 kubelet[2903]: E1002 19:08:32.958113 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.958322 kubelet[2903]: E1002 19:08:32.958307 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.958322 kubelet[2903]: W1002 19:08:32.958321 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.958534 kubelet[2903]: E1002 19:08:32.958337 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.958588 kubelet[2903]: E1002 19:08:32.958534 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.958588 kubelet[2903]: W1002 19:08:32.958543 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.958588 kubelet[2903]: E1002 19:08:32.958559 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.958758 kubelet[2903]: E1002 19:08:32.958745 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.958928 kubelet[2903]: W1002 19:08:32.958758 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.958928 kubelet[2903]: E1002 19:08:32.958890 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.959139 kubelet[2903]: E1002 19:08:32.959113 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.959139 kubelet[2903]: W1002 19:08:32.959123 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.959139 kubelet[2903]: E1002 19:08:32.959138 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.959340 kubelet[2903]: E1002 19:08:32.959327 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.959340 kubelet[2903]: W1002 19:08:32.959341 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.959531 kubelet[2903]: E1002 19:08:32.959356 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.959579 kubelet[2903]: E1002 19:08:32.959555 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.959579 kubelet[2903]: W1002 19:08:32.959566 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.959680 kubelet[2903]: E1002 19:08:32.959582 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.959770 kubelet[2903]: E1002 19:08:32.959757 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:32.959908 kubelet[2903]: W1002 19:08:32.959771 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:32.959908 kubelet[2903]: E1002 19:08:32.959785 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:32.941000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:32.947000 audit[3429]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:32.967569 kernel: audit: type=1327 audit(1696273712.941:1103): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:32.967613 kernel: audit: type=1325 audit(1696273712.947:1104): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:08:32.967646 kernel: audit: type=1300 audit(1696273712.947:1104): arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffca8e27990 a2=0 a3=7ffca8e2797c items=0 ppid=3044 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:32.947000 audit[3429]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffca8e27990 a2=0 a3=7ffca8e2797c items=0 ppid=3044 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:32.978211 kernel: audit: type=1327 audit(1696273712.947:1104): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:32.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:08:33.019021 kubelet[2903]: E1002 19:08:33.018904 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.019021 kubelet[2903]: W1002 19:08:33.019016 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.019250 kubelet[2903]: E1002 19:08:33.019044 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.019616 kubelet[2903]: E1002 19:08:33.019424 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.019616 kubelet[2903]: W1002 19:08:33.019439 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.019616 kubelet[2903]: E1002 19:08:33.019469 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.019869 kubelet[2903]: E1002 19:08:33.019766 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.019869 kubelet[2903]: W1002 19:08:33.019778 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.019869 kubelet[2903]: E1002 19:08:33.019812 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.020205 kubelet[2903]: E1002 19:08:33.020187 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.020302 kubelet[2903]: W1002 19:08:33.020202 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.020302 kubelet[2903]: E1002 19:08:33.020231 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.020509 kubelet[2903]: E1002 19:08:33.020493 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.020509 kubelet[2903]: W1002 19:08:33.020505 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.020645 kubelet[2903]: E1002 19:08:33.020600 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.020754 kubelet[2903]: E1002 19:08:33.020739 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.020754 kubelet[2903]: W1002 19:08:33.020751 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.020910 kubelet[2903]: E1002 19:08:33.020839 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.021199 kubelet[2903]: E1002 19:08:33.021082 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.021199 kubelet[2903]: W1002 19:08:33.021096 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.021347 kubelet[2903]: E1002 19:08:33.021297 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.021485 kubelet[2903]: E1002 19:08:33.021471 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.021543 kubelet[2903]: W1002 19:08:33.021497 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.021543 kubelet[2903]: E1002 19:08:33.021519 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.022193 kubelet[2903]: E1002 19:08:33.021928 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.022193 kubelet[2903]: W1002 19:08:33.021940 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.022193 kubelet[2903]: E1002 19:08:33.021966 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.022422 kubelet[2903]: E1002 19:08:33.022221 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.022422 kubelet[2903]: W1002 19:08:33.022231 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.022422 kubelet[2903]: E1002 19:08:33.022252 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.022560 kubelet[2903]: E1002 19:08:33.022470 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.022560 kubelet[2903]: W1002 19:08:33.022479 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.022560 kubelet[2903]: E1002 19:08:33.022495 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.022712 kubelet[2903]: E1002 19:08:33.022693 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.022712 kubelet[2903]: W1002 19:08:33.022701 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.022794 kubelet[2903]: E1002 19:08:33.022715 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.023403 kubelet[2903]: E1002 19:08:33.023356 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.023403 kubelet[2903]: W1002 19:08:33.023370 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.023557 kubelet[2903]: E1002 19:08:33.023491 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.023667 kubelet[2903]: E1002 19:08:33.023650 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.023667 kubelet[2903]: W1002 19:08:33.023663 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.023787 kubelet[2903]: E1002 19:08:33.023751 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.023904 kubelet[2903]: E1002 19:08:33.023887 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.023904 kubelet[2903]: W1002 19:08:33.023900 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.024118 kubelet[2903]: E1002 19:08:33.023920 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.024225 kubelet[2903]: E1002 19:08:33.024152 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.024225 kubelet[2903]: W1002 19:08:33.024170 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.024225 kubelet[2903]: E1002 19:08:33.024186 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.024555 kubelet[2903]: E1002 19:08:33.024541 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.024555 kubelet[2903]: W1002 19:08:33.024553 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.024818 kubelet[2903]: E1002 19:08:33.024573 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.026982 kubelet[2903]: E1002 19:08:33.026960 2903 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:08:33.026982 kubelet[2903]: W1002 19:08:33.026982 2903 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:08:33.027140 kubelet[2903]: E1002 19:08:33.027003 2903 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:08:33.783264 env[1629]: time="2023-10-02T19:08:33.783216205Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:33.787306 env[1629]: time="2023-10-02T19:08:33.787259455Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:33.790488 env[1629]: time="2023-10-02T19:08:33.790446952Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:33.793792 env[1629]: time="2023-10-02T19:08:33.793748876Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:33.795197 env[1629]: time="2023-10-02T19:08:33.795083665Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:08:33.797958 env[1629]: time="2023-10-02T19:08:33.797922083Z" level=info msg="CreateContainer within sandbox \"1c075417b88ad3890308a53ad81b0044baee74760858fc37a600e40ae68ff4be\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:08:33.821765 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4290458283.mount: Deactivated successfully. Oct 2 19:08:33.835118 env[1629]: time="2023-10-02T19:08:33.835064998Z" level=info msg="CreateContainer within sandbox \"1c075417b88ad3890308a53ad81b0044baee74760858fc37a600e40ae68ff4be\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2d920cb5a2d6095031cb475b6a1c7f33b03937a8b650a385bc16a519bf9b193b\"" Oct 2 19:08:33.836109 env[1629]: time="2023-10-02T19:08:33.836076358Z" level=info msg="StartContainer for \"2d920cb5a2d6095031cb475b6a1c7f33b03937a8b650a385bc16a519bf9b193b\"" Oct 2 19:08:33.869880 systemd[1]: Started cri-containerd-2d920cb5a2d6095031cb475b6a1c7f33b03937a8b650a385bc16a519bf9b193b.scope. Oct 2 19:08:33.912917 kernel: audit: type=1400 audit(1696273713.900:1105): avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.913120 kernel: audit: type=1300 audit(1696273713.900:1105): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3312 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:33.900000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.900000 audit[3470]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3312 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:33.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264393230636235613264363039353033316362343735623661316337 Oct 2 19:08:33.921426 kernel: audit: type=1327 audit(1696273713.900:1105): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264393230636235613264363039353033316362343735623661316337 Oct 2 19:08:33.900000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.900000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.900000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.900000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.900000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.900000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.900000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.900000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.900000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.900000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.900000 audit: BPF prog-id=142 op=LOAD Oct 2 19:08:33.900000 audit[3470]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002fe730 items=0 ppid=3312 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:33.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264393230636235613264363039353033316362343735623661316337 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.930448 kernel: audit: type=1400 audit(1696273713.900:1106): avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit: BPF prog-id=143 op=LOAD Oct 2 19:08:33.912000 audit[3470]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0002fe778 items=0 ppid=3312 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:33.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264393230636235613264363039353033316362343735623661316337 Oct 2 19:08:33.912000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:08:33.912000 audit: BPF prog-id=142 op=UNLOAD Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { perfmon } for pid=3470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit[3470]: AVC avc: denied { bpf } for pid=3470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:33.912000 audit: BPF prog-id=144 op=LOAD Oct 2 19:08:33.912000 audit[3470]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002fe808 items=0 ppid=3312 pid=3470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:33.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264393230636235613264363039353033316362343735623661316337 Oct 2 19:08:33.950310 env[1629]: time="2023-10-02T19:08:33.950259850Z" level=info msg="StartContainer for \"2d920cb5a2d6095031cb475b6a1c7f33b03937a8b650a385bc16a519bf9b193b\" returns successfully" Oct 2 19:08:33.958834 systemd[1]: cri-containerd-2d920cb5a2d6095031cb475b6a1c7f33b03937a8b650a385bc16a519bf9b193b.scope: Deactivated successfully. Oct 2 19:08:33.963000 audit: BPF prog-id=144 op=UNLOAD Oct 2 19:08:34.019013 env[1629]: time="2023-10-02T19:08:34.018960344Z" level=info msg="shim disconnected" id=2d920cb5a2d6095031cb475b6a1c7f33b03937a8b650a385bc16a519bf9b193b Oct 2 19:08:34.019013 env[1629]: time="2023-10-02T19:08:34.019009931Z" level=warning msg="cleaning up after shim disconnected" id=2d920cb5a2d6095031cb475b6a1c7f33b03937a8b650a385bc16a519bf9b193b namespace=k8s.io Oct 2 19:08:34.019499 env[1629]: time="2023-10-02T19:08:34.019021962Z" level=info msg="cleaning up dead shim" Oct 2 19:08:34.031579 env[1629]: time="2023-10-02T19:08:34.031538043Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:08:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3514 runtime=io.containerd.runc.v2\n" Oct 2 19:08:34.818463 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2d920cb5a2d6095031cb475b6a1c7f33b03937a8b650a385bc16a519bf9b193b-rootfs.mount: Deactivated successfully. Oct 2 19:08:34.905404 env[1629]: time="2023-10-02T19:08:34.905349696Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:08:36.078339 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1619085987.mount: Deactivated successfully. Oct 2 19:08:40.104484 env[1629]: time="2023-10-02T19:08:40.104429993Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:40.108869 env[1629]: time="2023-10-02T19:08:40.108778471Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:40.113457 env[1629]: time="2023-10-02T19:08:40.113418071Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:40.115971 env[1629]: time="2023-10-02T19:08:40.115928134Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:40.116989 env[1629]: time="2023-10-02T19:08:40.116946138Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:08:40.123285 env[1629]: time="2023-10-02T19:08:40.123244783Z" level=info msg="CreateContainer within sandbox \"1c075417b88ad3890308a53ad81b0044baee74760858fc37a600e40ae68ff4be\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:08:40.146715 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3546419551.mount: Deactivated successfully. Oct 2 19:08:40.170351 env[1629]: time="2023-10-02T19:08:40.170231999Z" level=info msg="CreateContainer within sandbox \"1c075417b88ad3890308a53ad81b0044baee74760858fc37a600e40ae68ff4be\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"37312ba1558a80a4e72af4f5a4ca27d5a9721e469ddedabadb1ee67938416c9f\"" Oct 2 19:08:40.170802 env[1629]: time="2023-10-02T19:08:40.170773909Z" level=info msg="StartContainer for \"37312ba1558a80a4e72af4f5a4ca27d5a9721e469ddedabadb1ee67938416c9f\"" Oct 2 19:08:40.212114 systemd[1]: Started cri-containerd-37312ba1558a80a4e72af4f5a4ca27d5a9721e469ddedabadb1ee67938416c9f.scope. Oct 2 19:08:40.275912 kernel: kauditd_printk_skb: 40 callbacks suppressed Oct 2 19:08:40.276082 kernel: audit: type=1400 audit(1696273720.257:1112): avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.276230 kernel: audit: type=1300 audit(1696273720.257:1112): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3312 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:40.257000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.257000 audit[3536]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3312 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:40.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337333132626131353538613830613465373261663466356134636132 Oct 2 19:08:40.286412 kernel: audit: type=1327 audit(1696273720.257:1112): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337333132626131353538613830613465373261663466356134636132 Oct 2 19:08:40.258000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.294407 kernel: audit: type=1400 audit(1696273720.258:1113): avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.258000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.301406 kernel: audit: type=1400 audit(1696273720.258:1113): avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.258000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.314890 kernel: audit: type=1400 audit(1696273720.258:1113): avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.315021 kernel: audit: type=1400 audit(1696273720.258:1113): avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.258000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.258000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.258000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.326450 env[1629]: time="2023-10-02T19:08:40.326402572Z" level=info msg="StartContainer for \"37312ba1558a80a4e72af4f5a4ca27d5a9721e469ddedabadb1ee67938416c9f\" returns successfully" Oct 2 19:08:40.329910 kernel: audit: type=1400 audit(1696273720.258:1113): avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.330128 kernel: audit: type=1400 audit(1696273720.258:1113): avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.258000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.258000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.258000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.258000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.258000 audit: BPF prog-id=145 op=LOAD Oct 2 19:08:40.258000 audit[3536]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0001fe330 items=0 ppid=3312 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:40.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337333132626131353538613830613465373261663466356134636132 Oct 2 19:08:40.349411 kernel: audit: type=1400 audit(1696273720.258:1113): avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit: BPF prog-id=146 op=LOAD Oct 2 19:08:40.275000 audit[3536]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0001fe378 items=0 ppid=3312 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:40.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337333132626131353538613830613465373261663466356134636132 Oct 2 19:08:40.275000 audit: BPF prog-id=146 op=UNLOAD Oct 2 19:08:40.275000 audit: BPF prog-id=145 op=UNLOAD Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { perfmon } for pid=3536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit[3536]: AVC avc: denied { bpf } for pid=3536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:40.275000 audit: BPF prog-id=147 op=LOAD Oct 2 19:08:40.275000 audit[3536]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0001fe408 items=0 ppid=3312 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:40.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337333132626131353538613830613465373261663466356134636132 Oct 2 19:08:41.490537 env[1629]: time="2023-10-02T19:08:41.490467686Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:08:41.494247 systemd[1]: cri-containerd-37312ba1558a80a4e72af4f5a4ca27d5a9721e469ddedabadb1ee67938416c9f.scope: Deactivated successfully. Oct 2 19:08:41.497000 audit: BPF prog-id=147 op=UNLOAD Oct 2 19:08:41.523693 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-37312ba1558a80a4e72af4f5a4ca27d5a9721e469ddedabadb1ee67938416c9f-rootfs.mount: Deactivated successfully. Oct 2 19:08:41.528181 kubelet[2903]: I1002 19:08:41.527886 2903 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:08:41.549130 env[1629]: time="2023-10-02T19:08:41.549075383Z" level=info msg="shim disconnected" id=37312ba1558a80a4e72af4f5a4ca27d5a9721e469ddedabadb1ee67938416c9f Oct 2 19:08:41.549130 env[1629]: time="2023-10-02T19:08:41.549131847Z" level=warning msg="cleaning up after shim disconnected" id=37312ba1558a80a4e72af4f5a4ca27d5a9721e469ddedabadb1ee67938416c9f namespace=k8s.io Oct 2 19:08:41.549482 env[1629]: time="2023-10-02T19:08:41.549143793Z" level=info msg="cleaning up dead shim" Oct 2 19:08:41.576839 kubelet[2903]: I1002 19:08:41.575916 2903 topology_manager.go:215] "Topology Admit Handler" podUID="96b96afe-e737-4867-b90f-186c15658085" podNamespace="kube-system" podName="coredns-5dd5756b68-gqflr" Oct 2 19:08:41.581763 env[1629]: time="2023-10-02T19:08:41.581358489Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:08:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3585 runtime=io.containerd.runc.v2\ntime=\"2023-10-02T19:08:41Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n" Oct 2 19:08:41.586647 systemd[1]: Created slice kubepods-burstable-pod96b96afe_e737_4867_b90f_186c15658085.slice. Oct 2 19:08:41.597767 kubelet[2903]: I1002 19:08:41.597734 2903 topology_manager.go:215] "Topology Admit Handler" podUID="10d7547d-1645-49b4-95f4-d942f1774dd9" podNamespace="kube-system" podName="coredns-5dd5756b68-2kpgn" Oct 2 19:08:41.605305 systemd[1]: Created slice kubepods-burstable-pod10d7547d_1645_49b4_95f4_d942f1774dd9.slice. Oct 2 19:08:41.610161 kubelet[2903]: I1002 19:08:41.610128 2903 topology_manager.go:215] "Topology Admit Handler" podUID="0a8e8c39-7baf-4dd4-a860-89fe78651ce1" podNamespace="calico-system" podName="calico-kube-controllers-74b9887bb6-9hf9m" Oct 2 19:08:41.617308 systemd[1]: Created slice kubepods-besteffort-pod0a8e8c39_7baf_4dd4_a860_89fe78651ce1.slice. Oct 2 19:08:41.632626 kubelet[2903]: I1002 19:08:41.632592 2903 topology_manager.go:215] "Topology Admit Handler" podUID="ade4b6df-b8e6-4e5c-8373-7c3c92757aec" podNamespace="calico-system" podName="csi-node-driver-wcmgn" Oct 2 19:08:41.639903 systemd[1]: Created slice kubepods-besteffort-podade4b6df_b8e6_4e5c_8373_7c3c92757aec.slice. Oct 2 19:08:41.724799 kubelet[2903]: I1002 19:08:41.724657 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/ade4b6df-b8e6-4e5c-8373-7c3c92757aec-etccalico\") pod \"csi-node-driver-wcmgn\" (UID: \"ade4b6df-b8e6-4e5c-8373-7c3c92757aec\") " pod="calico-system/csi-node-driver-wcmgn" Oct 2 19:08:41.725057 kubelet[2903]: I1002 19:08:41.724827 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qcstg\" (UniqueName: \"kubernetes.io/projected/0a8e8c39-7baf-4dd4-a860-89fe78651ce1-kube-api-access-qcstg\") pod \"calico-kube-controllers-74b9887bb6-9hf9m\" (UID: \"0a8e8c39-7baf-4dd4-a860-89fe78651ce1\") " pod="calico-system/calico-kube-controllers-74b9887bb6-9hf9m" Oct 2 19:08:41.725057 kubelet[2903]: I1002 19:08:41.724987 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rkknk\" (UniqueName: \"kubernetes.io/projected/96b96afe-e737-4867-b90f-186c15658085-kube-api-access-rkknk\") pod \"coredns-5dd5756b68-gqflr\" (UID: \"96b96afe-e737-4867-b90f-186c15658085\") " pod="kube-system/coredns-5dd5756b68-gqflr" Oct 2 19:08:41.725523 kubelet[2903]: I1002 19:08:41.725060 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/96b96afe-e737-4867-b90f-186c15658085-config-volume\") pod \"coredns-5dd5756b68-gqflr\" (UID: \"96b96afe-e737-4867-b90f-186c15658085\") " pod="kube-system/coredns-5dd5756b68-gqflr" Oct 2 19:08:41.725523 kubelet[2903]: I1002 19:08:41.725154 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k7tr6\" (UniqueName: \"kubernetes.io/projected/10d7547d-1645-49b4-95f4-d942f1774dd9-kube-api-access-k7tr6\") pod \"coredns-5dd5756b68-2kpgn\" (UID: \"10d7547d-1645-49b4-95f4-d942f1774dd9\") " pod="kube-system/coredns-5dd5756b68-2kpgn" Oct 2 19:08:41.725523 kubelet[2903]: I1002 19:08:41.725243 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ade4b6df-b8e6-4e5c-8373-7c3c92757aec-varrun\") pod \"csi-node-driver-wcmgn\" (UID: \"ade4b6df-b8e6-4e5c-8373-7c3c92757aec\") " pod="calico-system/csi-node-driver-wcmgn" Oct 2 19:08:41.725779 kubelet[2903]: I1002 19:08:41.725612 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ade4b6df-b8e6-4e5c-8373-7c3c92757aec-socket-dir\") pod \"csi-node-driver-wcmgn\" (UID: \"ade4b6df-b8e6-4e5c-8373-7c3c92757aec\") " pod="calico-system/csi-node-driver-wcmgn" Oct 2 19:08:41.725779 kubelet[2903]: I1002 19:08:41.725689 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2z2zp\" (UniqueName: \"kubernetes.io/projected/ade4b6df-b8e6-4e5c-8373-7c3c92757aec-kube-api-access-2z2zp\") pod \"csi-node-driver-wcmgn\" (UID: \"ade4b6df-b8e6-4e5c-8373-7c3c92757aec\") " pod="calico-system/csi-node-driver-wcmgn" Oct 2 19:08:41.725779 kubelet[2903]: I1002 19:08:41.725775 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/10d7547d-1645-49b4-95f4-d942f1774dd9-config-volume\") pod \"coredns-5dd5756b68-2kpgn\" (UID: \"10d7547d-1645-49b4-95f4-d942f1774dd9\") " pod="kube-system/coredns-5dd5756b68-2kpgn" Oct 2 19:08:41.725976 kubelet[2903]: I1002 19:08:41.725874 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ade4b6df-b8e6-4e5c-8373-7c3c92757aec-registration-dir\") pod \"csi-node-driver-wcmgn\" (UID: \"ade4b6df-b8e6-4e5c-8373-7c3c92757aec\") " pod="calico-system/csi-node-driver-wcmgn" Oct 2 19:08:41.725976 kubelet[2903]: I1002 19:08:41.725944 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ade4b6df-b8e6-4e5c-8373-7c3c92757aec-kubelet-dir\") pod \"csi-node-driver-wcmgn\" (UID: \"ade4b6df-b8e6-4e5c-8373-7c3c92757aec\") " pod="calico-system/csi-node-driver-wcmgn" Oct 2 19:08:41.897832 env[1629]: time="2023-10-02T19:08:41.897732261Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-gqflr,Uid:96b96afe-e737-4867-b90f-186c15658085,Namespace:kube-system,Attempt:0,}" Oct 2 19:08:41.913590 env[1629]: time="2023-10-02T19:08:41.913527781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-2kpgn,Uid:10d7547d-1645-49b4-95f4-d942f1774dd9,Namespace:kube-system,Attempt:0,}" Oct 2 19:08:41.929827 env[1629]: time="2023-10-02T19:08:41.929704901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-9hf9m,Uid:0a8e8c39-7baf-4dd4-a860-89fe78651ce1,Namespace:calico-system,Attempt:0,}" Oct 2 19:08:41.948730 env[1629]: time="2023-10-02T19:08:41.948602251Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wcmgn,Uid:ade4b6df-b8e6-4e5c-8373-7c3c92757aec,Namespace:calico-system,Attempt:0,}" Oct 2 19:08:41.950647 env[1629]: time="2023-10-02T19:08:41.950615297Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:08:42.265054 env[1629]: time="2023-10-02T19:08:42.264766767Z" level=error msg="Failed to destroy network for sandbox \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.265917 env[1629]: time="2023-10-02T19:08:42.265867385Z" level=error msg="encountered an error cleaning up failed sandbox \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.266159 env[1629]: time="2023-10-02T19:08:42.266121445Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-2kpgn,Uid:10d7547d-1645-49b4-95f4-d942f1774dd9,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.266576 env[1629]: time="2023-10-02T19:08:42.266517550Z" level=error msg="Failed to destroy network for sandbox \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.266700 kubelet[2903]: E1002 19:08:42.266684 2903 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.266795 kubelet[2903]: E1002 19:08:42.266783 2903 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-2kpgn" Oct 2 19:08:42.267060 kubelet[2903]: E1002 19:08:42.266959 2903 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-2kpgn" Oct 2 19:08:42.267210 kubelet[2903]: E1002 19:08:42.267109 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-2kpgn_kube-system(10d7547d-1645-49b4-95f4-d942f1774dd9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-2kpgn_kube-system(10d7547d-1645-49b4-95f4-d942f1774dd9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-2kpgn" podUID="10d7547d-1645-49b4-95f4-d942f1774dd9" Oct 2 19:08:42.270473 env[1629]: time="2023-10-02T19:08:42.270408137Z" level=error msg="encountered an error cleaning up failed sandbox \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.270714 env[1629]: time="2023-10-02T19:08:42.270510832Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wcmgn,Uid:ade4b6df-b8e6-4e5c-8373-7c3c92757aec,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.271836 kubelet[2903]: E1002 19:08:42.271804 2903 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.271947 kubelet[2903]: E1002 19:08:42.271893 2903 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wcmgn" Oct 2 19:08:42.272088 kubelet[2903]: E1002 19:08:42.271926 2903 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wcmgn" Oct 2 19:08:42.272228 kubelet[2903]: E1002 19:08:42.272200 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wcmgn_calico-system(ade4b6df-b8e6-4e5c-8373-7c3c92757aec)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wcmgn_calico-system(ade4b6df-b8e6-4e5c-8373-7c3c92757aec)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wcmgn" podUID="ade4b6df-b8e6-4e5c-8373-7c3c92757aec" Oct 2 19:08:42.278610 env[1629]: time="2023-10-02T19:08:42.278553280Z" level=error msg="Failed to destroy network for sandbox \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.279397 env[1629]: time="2023-10-02T19:08:42.279339383Z" level=error msg="encountered an error cleaning up failed sandbox \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.279729 env[1629]: time="2023-10-02T19:08:42.279679317Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-gqflr,Uid:96b96afe-e737-4867-b90f-186c15658085,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.281741 kubelet[2903]: E1002 19:08:42.281551 2903 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.281741 kubelet[2903]: E1002 19:08:42.281610 2903 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-gqflr" Oct 2 19:08:42.281741 kubelet[2903]: E1002 19:08:42.281641 2903 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-gqflr" Oct 2 19:08:42.285146 kubelet[2903]: E1002 19:08:42.281709 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-gqflr_kube-system(96b96afe-e737-4867-b90f-186c15658085)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-gqflr_kube-system(96b96afe-e737-4867-b90f-186c15658085)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-gqflr" podUID="96b96afe-e737-4867-b90f-186c15658085" Oct 2 19:08:42.288355 env[1629]: time="2023-10-02T19:08:42.288249522Z" level=error msg="Failed to destroy network for sandbox \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.288962 env[1629]: time="2023-10-02T19:08:42.288917383Z" level=error msg="encountered an error cleaning up failed sandbox \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.289107 env[1629]: time="2023-10-02T19:08:42.288987035Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-9hf9m,Uid:0a8e8c39-7baf-4dd4-a860-89fe78651ce1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.289454 kubelet[2903]: E1002 19:08:42.289430 2903 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:42.289540 kubelet[2903]: E1002 19:08:42.289491 2903 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-9hf9m" Oct 2 19:08:42.289540 kubelet[2903]: E1002 19:08:42.289521 2903 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-9hf9m" Oct 2 19:08:42.289645 kubelet[2903]: E1002 19:08:42.289601 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-74b9887bb6-9hf9m_calico-system(0a8e8c39-7baf-4dd4-a860-89fe78651ce1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-74b9887bb6-9hf9m_calico-system(0a8e8c39-7baf-4dd4-a860-89fe78651ce1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-9hf9m" podUID="0a8e8c39-7baf-4dd4-a860-89fe78651ce1" Oct 2 19:08:42.954465 kubelet[2903]: I1002 19:08:42.954430 2903 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Oct 2 19:08:42.956965 env[1629]: time="2023-10-02T19:08:42.955358332Z" level=info msg="StopPodSandbox for \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\"" Oct 2 19:08:42.971257 kubelet[2903]: I1002 19:08:42.970756 2903 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Oct 2 19:08:42.975624 env[1629]: time="2023-10-02T19:08:42.973291052Z" level=info msg="StopPodSandbox for \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\"" Oct 2 19:08:42.975774 kubelet[2903]: I1002 19:08:42.974999 2903 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Oct 2 19:08:42.975861 env[1629]: time="2023-10-02T19:08:42.975805506Z" level=info msg="StopPodSandbox for \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\"" Oct 2 19:08:42.983661 kubelet[2903]: I1002 19:08:42.979482 2903 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Oct 2 19:08:42.983868 env[1629]: time="2023-10-02T19:08:42.981418040Z" level=info msg="StopPodSandbox for \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\"" Oct 2 19:08:43.111151 env[1629]: time="2023-10-02T19:08:43.111070321Z" level=error msg="StopPodSandbox for \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\" failed" error="failed to destroy network for sandbox \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:43.111946 kubelet[2903]: E1002 19:08:43.111641 2903 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Oct 2 19:08:43.111946 kubelet[2903]: E1002 19:08:43.111755 2903 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd"} Oct 2 19:08:43.111946 kubelet[2903]: E1002 19:08:43.111804 2903 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0a8e8c39-7baf-4dd4-a860-89fe78651ce1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:08:43.111946 kubelet[2903]: E1002 19:08:43.111857 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0a8e8c39-7baf-4dd4-a860-89fe78651ce1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-9hf9m" podUID="0a8e8c39-7baf-4dd4-a860-89fe78651ce1" Oct 2 19:08:43.131191 env[1629]: time="2023-10-02T19:08:43.131048375Z" level=error msg="StopPodSandbox for \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\" failed" error="failed to destroy network for sandbox \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:43.131744 kubelet[2903]: E1002 19:08:43.131718 2903 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Oct 2 19:08:43.131906 kubelet[2903]: E1002 19:08:43.131787 2903 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3"} Oct 2 19:08:43.131906 kubelet[2903]: E1002 19:08:43.131851 2903 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"96b96afe-e737-4867-b90f-186c15658085\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:08:43.131906 kubelet[2903]: E1002 19:08:43.131894 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"96b96afe-e737-4867-b90f-186c15658085\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-gqflr" podUID="96b96afe-e737-4867-b90f-186c15658085" Oct 2 19:08:43.143061 env[1629]: time="2023-10-02T19:08:43.142997043Z" level=error msg="StopPodSandbox for \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\" failed" error="failed to destroy network for sandbox \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:43.143367 kubelet[2903]: E1002 19:08:43.143344 2903 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Oct 2 19:08:43.143656 kubelet[2903]: E1002 19:08:43.143517 2903 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b"} Oct 2 19:08:43.143656 kubelet[2903]: E1002 19:08:43.143579 2903 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ade4b6df-b8e6-4e5c-8373-7c3c92757aec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:08:43.143656 kubelet[2903]: E1002 19:08:43.143623 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ade4b6df-b8e6-4e5c-8373-7c3c92757aec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wcmgn" podUID="ade4b6df-b8e6-4e5c-8373-7c3c92757aec" Oct 2 19:08:43.149236 env[1629]: time="2023-10-02T19:08:43.149176360Z" level=error msg="StopPodSandbox for \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\" failed" error="failed to destroy network for sandbox \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:08:43.149595 kubelet[2903]: E1002 19:08:43.149556 2903 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Oct 2 19:08:43.149768 kubelet[2903]: E1002 19:08:43.149606 2903 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f"} Oct 2 19:08:43.149768 kubelet[2903]: E1002 19:08:43.149707 2903 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"10d7547d-1645-49b4-95f4-d942f1774dd9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:08:43.149768 kubelet[2903]: E1002 19:08:43.149746 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"10d7547d-1645-49b4-95f4-d942f1774dd9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-2kpgn" podUID="10d7547d-1645-49b4-95f4-d942f1774dd9" Oct 2 19:08:48.192597 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount132621170.mount: Deactivated successfully. Oct 2 19:08:48.281530 env[1629]: time="2023-10-02T19:08:48.281480289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:48.285105 env[1629]: time="2023-10-02T19:08:48.285062633Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:48.287879 env[1629]: time="2023-10-02T19:08:48.287842828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:48.290787 env[1629]: time="2023-10-02T19:08:48.290700673Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:08:48.291476 env[1629]: time="2023-10-02T19:08:48.291441720Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:08:48.297750 env[1629]: time="2023-10-02T19:08:48.296812800Z" level=info msg="CreateContainer within sandbox \"1c075417b88ad3890308a53ad81b0044baee74760858fc37a600e40ae68ff4be\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:08:48.332984 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount92614510.mount: Deactivated successfully. Oct 2 19:08:48.345857 env[1629]: time="2023-10-02T19:08:48.345803886Z" level=info msg="CreateContainer within sandbox \"1c075417b88ad3890308a53ad81b0044baee74760858fc37a600e40ae68ff4be\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"bafed02af36894ab4793e078b0c497d98d72569336fcbeff720dcbf9b95f7b55\"" Oct 2 19:08:48.349209 env[1629]: time="2023-10-02T19:08:48.346735749Z" level=info msg="StartContainer for \"bafed02af36894ab4793e078b0c497d98d72569336fcbeff720dcbf9b95f7b55\"" Oct 2 19:08:48.377135 systemd[1]: Started cri-containerd-bafed02af36894ab4793e078b0c497d98d72569336fcbeff720dcbf9b95f7b55.scope. Oct 2 19:08:48.428654 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:08:48.428840 kernel: audit: type=1400 audit(1696273728.416:1119): avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428893 kernel: audit: type=1300 audit(1696273728.416:1119): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3312 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.416000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.416000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3312 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261666564303261663336383934616234373933653037386230633439 Oct 2 19:08:48.436571 kernel: audit: type=1327 audit(1696273728.416:1119): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261666564303261663336383934616234373933653037386230633439 Oct 2 19:08:48.441930 kernel: audit: type=1400 audit(1696273728.416:1120): avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.416000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.416000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.455059 kernel: audit: type=1400 audit(1696273728.416:1120): avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.455175 kernel: audit: type=1400 audit(1696273728.416:1120): avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.416000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.416000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.466138 kernel: audit: type=1400 audit(1696273728.416:1120): avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.466284 kernel: audit: type=1400 audit(1696273728.416:1120): avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.416000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.416000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.479825 kernel: audit: type=1400 audit(1696273728.416:1120): avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.479941 kernel: audit: type=1400 audit(1696273728.416:1120): avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.416000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.416000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.416000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.416000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.416000 audit: BPF prog-id=148 op=LOAD Oct 2 19:08:48.416000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00033c650 items=0 ppid=3312 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261666564303261663336383934616234373933653037386230633439 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit: BPF prog-id=149 op=LOAD Oct 2 19:08:48.428000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00033c698 items=0 ppid=3312 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261666564303261663336383934616234373933653037386230633439 Oct 2 19:08:48.428000 audit: BPF prog-id=149 op=UNLOAD Oct 2 19:08:48.428000 audit: BPF prog-id=148 op=UNLOAD Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:48.428000 audit: BPF prog-id=150 op=LOAD Oct 2 19:08:48.428000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00033c728 items=0 ppid=3312 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:48.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261666564303261663336383934616234373933653037386230633439 Oct 2 19:08:48.487361 env[1629]: time="2023-10-02T19:08:48.487307519Z" level=info msg="StartContainer for \"bafed02af36894ab4793e078b0c497d98d72569336fcbeff720dcbf9b95f7b55\" returns successfully" Oct 2 19:08:48.635610 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:08:48.635844 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:08:50.486000 audit[3966]: AVC avc: denied { write } for pid=3966 comm="tee" name="fd" dev="proc" ino=24990 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:08:50.486000 audit[3966]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5b2a6981 a2=241 a3=1b6 items=1 ppid=3928 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:50.486000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:08:50.486000 audit: PATH item=0 name="/dev/fd/63" inode=25819 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:50.486000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:08:50.490000 audit[3947]: AVC avc: denied { write } for pid=3947 comm="tee" name="fd" dev="proc" ino=25824 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:08:50.490000 audit[3947]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3be9b981 a2=241 a3=1b6 items=1 ppid=3925 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:50.490000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:08:50.490000 audit: PATH item=0 name="/dev/fd/63" inode=25807 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:50.490000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:08:50.534000 audit[3973]: AVC avc: denied { write } for pid=3973 comm="tee" name="fd" dev="proc" ino=25843 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:08:50.534000 audit[3973]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd59da5983 a2=241 a3=1b6 items=1 ppid=3931 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:50.534000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:08:50.534000 audit: PATH item=0 name="/dev/fd/63" inode=25828 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:50.540000 audit[3975]: AVC avc: denied { write } for pid=3975 comm="tee" name="fd" dev="proc" ino=25847 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:08:50.540000 audit[3975]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb29c7972 a2=241 a3=1b6 items=1 ppid=3927 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:50.540000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:08:50.540000 audit: PATH item=0 name="/dev/fd/63" inode=25831 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:50.534000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:08:50.547000 audit[3978]: AVC avc: denied { write } for pid=3978 comm="tee" name="fd" dev="proc" ino=25000 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:08:50.547000 audit[3978]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1c617981 a2=241 a3=1b6 items=1 ppid=3923 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:50.547000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:08:50.547000 audit: PATH item=0 name="/dev/fd/63" inode=25836 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:50.547000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:08:50.554000 audit[3983]: AVC avc: denied { write } for pid=3983 comm="tee" name="fd" dev="proc" ino=25851 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:08:50.554000 audit[3983]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0d4fd971 a2=241 a3=1b6 items=1 ppid=3933 pid=3983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:50.554000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:08:50.554000 audit: PATH item=0 name="/dev/fd/63" inode=25839 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:50.540000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:08:50.554000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:08:50.592000 audit[3985]: AVC avc: denied { write } for pid=3985 comm="tee" name="fd" dev="proc" ino=25858 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:08:50.592000 audit[3985]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd927a3982 a2=241 a3=1b6 items=1 ppid=3921 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:50.592000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:08:50.592000 audit: PATH item=0 name="/dev/fd/63" inode=25840 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:08:50.592000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:08:51.338692 (udev-worker)[3848]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:08:51.340157 (udev-worker)[4082]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:08:51.343000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.343000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.343000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.343000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.343000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.343000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.343000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.343000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.343000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.343000 audit: BPF prog-id=151 op=LOAD Oct 2 19:08:51.343000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdae92d010 a2=70 a3=7f764c72c000 items=0 ppid=3924 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:51.343000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:51.345000 audit: BPF prog-id=151 op=UNLOAD Oct 2 19:08:51.345000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.345000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.345000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.345000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.345000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.345000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.345000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.345000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.345000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.345000 audit: BPF prog-id=152 op=LOAD Oct 2 19:08:51.345000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdae92d010 a2=70 a3=6e items=0 ppid=3924 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:51.345000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:51.346000 audit: BPF prog-id=152 op=UNLOAD Oct 2 19:08:51.346000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.346000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdae92cfc0 a2=70 a3=7ffdae92d010 items=0 ppid=3924 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:51.346000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:51.346000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.346000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.346000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.346000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.346000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.346000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.346000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.346000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.346000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.346000 audit: BPF prog-id=153 op=LOAD Oct 2 19:08:51.346000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdae92cfa0 a2=70 a3=7ffdae92d010 items=0 ppid=3924 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:51.346000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:51.346000 audit: BPF prog-id=153 op=UNLOAD Oct 2 19:08:51.346000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.346000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdae92d080 a2=70 a3=0 items=0 ppid=3924 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:51.346000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:51.346000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.346000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdae92d070 a2=70 a3=0 items=0 ppid=3924 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:51.346000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:51.348000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.348000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffdae92d0b0 a2=70 a3=0 items=0 ppid=3924 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:51.348000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:51.350000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.350000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.350000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.350000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.350000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.350000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.350000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.350000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.350000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.350000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.350000 audit: BPF prog-id=154 op=LOAD Oct 2 19:08:51.350000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdae92cfd0 a2=70 a3=ffffffff items=0 ppid=3924 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:51.350000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:08:51.354000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.354000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe492090a0 a2=70 a3=fff80800 items=0 ppid=3924 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:51.354000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:08:51.355000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:51.355000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe49208f70 a2=70 a3=3 items=0 ppid=3924 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:51.355000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:08:51.362000 audit: BPF prog-id=154 op=UNLOAD Oct 2 19:08:51.469000 audit[4112]: NETFILTER_CFG table=nat:97 family=2 entries=16 op=nft_register_chain pid=4112 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:51.469000 audit[4112]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffddeb273b0 a2=0 a3=7ffddeb2739c items=0 ppid=3924 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:51.469000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:51.480000 audit[4115]: NETFILTER_CFG table=mangle:98 family=2 entries=19 op=nft_register_chain pid=4115 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:51.480000 audit[4115]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffcd0736cd0 a2=0 a3=7ffcd0736cbc items=0 ppid=3924 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:51.480000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:51.490000 audit[4113]: NETFILTER_CFG table=raw:99 family=2 entries=19 op=nft_register_chain pid=4113 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:51.490000 audit[4113]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffe1d348840 a2=0 a3=7ffe1d34882c items=0 ppid=3924 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:51.490000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:51.495000 audit[4116]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4116 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:51.495000 audit[4116]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffcb7fc81a0 a2=0 a3=55b05d56a000 items=0 ppid=3924 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:51.495000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:52.203974 systemd-networkd[1447]: vxlan.calico: Link UP Oct 2 19:08:52.203984 systemd-networkd[1447]: vxlan.calico: Gained carrier Oct 2 19:08:53.787361 systemd-networkd[1447]: vxlan.calico: Gained IPv6LL Oct 2 19:08:55.688520 env[1629]: time="2023-10-02T19:08:55.688477224Z" level=info msg="StopPodSandbox for \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\"" Oct 2 19:08:55.689107 env[1629]: time="2023-10-02T19:08:55.688478296Z" level=info msg="StopPodSandbox for \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\"" Oct 2 19:08:55.796171 kubelet[2903]: I1002 19:08:55.796137 2903 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-jttfg" podStartSLOduration=8.24824255 podCreationTimestamp="2023-10-02 19:08:27 +0000 UTC" firstStartedPulling="2023-10-02 19:08:27.748074928 +0000 UTC m=+19.309204709" lastFinishedPulling="2023-10-02 19:08:48.292026492 +0000 UTC m=+39.853156277" observedRunningTime="2023-10-02 19:08:49.107130851 +0000 UTC m=+40.668260646" watchObservedRunningTime="2023-10-02 19:08:55.792194118 +0000 UTC m=+47.353323953" Oct 2 19:08:56.030767 env[1629]: 2023-10-02 19:08:55.792 [INFO][4184] k8s.go 576: Cleaning up netns ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Oct 2 19:08:56.030767 env[1629]: 2023-10-02 19:08:55.794 [INFO][4184] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" iface="eth0" netns="/var/run/netns/cni-3a83c9e4-e035-699a-b0eb-fa63828955a1" Oct 2 19:08:56.030767 env[1629]: 2023-10-02 19:08:55.794 [INFO][4184] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" iface="eth0" netns="/var/run/netns/cni-3a83c9e4-e035-699a-b0eb-fa63828955a1" Oct 2 19:08:56.030767 env[1629]: 2023-10-02 19:08:55.795 [INFO][4184] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" iface="eth0" netns="/var/run/netns/cni-3a83c9e4-e035-699a-b0eb-fa63828955a1" Oct 2 19:08:56.030767 env[1629]: 2023-10-02 19:08:55.795 [INFO][4184] k8s.go 583: Releasing IP address(es) ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Oct 2 19:08:56.030767 env[1629]: 2023-10-02 19:08:55.795 [INFO][4184] utils.go 196: Calico CNI releasing IP address ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Oct 2 19:08:56.030767 env[1629]: 2023-10-02 19:08:55.994 [INFO][4193] ipam_plugin.go 416: Releasing address using handleID ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" HandleID="k8s-pod-network.b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Workload="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:08:56.030767 env[1629]: time="2023-10-02T19:08:55Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:56.030767 env[1629]: time="2023-10-02T19:08:55Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:56.030767 env[1629]: 2023-10-02 19:08:56.012 [WARNING][4193] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" HandleID="k8s-pod-network.b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Workload="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:08:56.030767 env[1629]: 2023-10-02 19:08:56.012 [INFO][4193] ipam_plugin.go 444: Releasing address using workloadID ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" HandleID="k8s-pod-network.b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Workload="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:08:56.030767 env[1629]: time="2023-10-02T19:08:56Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:56.030767 env[1629]: 2023-10-02 19:08:56.019 [INFO][4184] k8s.go 589: Teardown processing complete. ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Oct 2 19:08:56.030767 env[1629]: time="2023-10-02T19:08:56.023928145Z" level=info msg="TearDown network for sandbox \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\" successfully" Oct 2 19:08:56.030767 env[1629]: time="2023-10-02T19:08:56.023968737Z" level=info msg="StopPodSandbox for \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\" returns successfully" Oct 2 19:08:56.030767 env[1629]: time="2023-10-02T19:08:56.026427906Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-9hf9m,Uid:0a8e8c39-7baf-4dd4-a860-89fe78651ce1,Namespace:calico-system,Attempt:1,}" Oct 2 19:08:56.026243 systemd[1]: run-netns-cni\x2d3a83c9e4\x2de035\x2d699a\x2db0eb\x2dfa63828955a1.mount: Deactivated successfully. Oct 2 19:08:56.044405 env[1629]: 2023-10-02 19:08:55.795 [INFO][4176] k8s.go 576: Cleaning up netns ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Oct 2 19:08:56.044405 env[1629]: 2023-10-02 19:08:55.797 [INFO][4176] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" iface="eth0" netns="/var/run/netns/cni-49d2286c-912c-e8e4-f8b2-0571c7ac4827" Oct 2 19:08:56.044405 env[1629]: 2023-10-02 19:08:55.797 [INFO][4176] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" iface="eth0" netns="/var/run/netns/cni-49d2286c-912c-e8e4-f8b2-0571c7ac4827" Oct 2 19:08:56.044405 env[1629]: 2023-10-02 19:08:55.797 [INFO][4176] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" iface="eth0" netns="/var/run/netns/cni-49d2286c-912c-e8e4-f8b2-0571c7ac4827" Oct 2 19:08:56.044405 env[1629]: 2023-10-02 19:08:55.797 [INFO][4176] k8s.go 583: Releasing IP address(es) ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Oct 2 19:08:56.044405 env[1629]: 2023-10-02 19:08:55.798 [INFO][4176] utils.go 196: Calico CNI releasing IP address ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Oct 2 19:08:56.044405 env[1629]: 2023-10-02 19:08:55.994 [INFO][4194] ipam_plugin.go 416: Releasing address using handleID ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" HandleID="k8s-pod-network.d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Workload="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:08:56.044405 env[1629]: time="2023-10-02T19:08:55Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:56.044405 env[1629]: time="2023-10-02T19:08:56Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:56.044405 env[1629]: 2023-10-02 19:08:56.032 [WARNING][4194] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" HandleID="k8s-pod-network.d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Workload="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:08:56.044405 env[1629]: 2023-10-02 19:08:56.032 [INFO][4194] ipam_plugin.go 444: Releasing address using workloadID ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" HandleID="k8s-pod-network.d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Workload="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:08:56.044405 env[1629]: time="2023-10-02T19:08:56Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:56.044405 env[1629]: 2023-10-02 19:08:56.041 [INFO][4176] k8s.go 589: Teardown processing complete. ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Oct 2 19:08:56.048652 systemd[1]: run-netns-cni\x2d49d2286c\x2d912c\x2de8e4\x2df8b2\x2d0571c7ac4827.mount: Deactivated successfully. Oct 2 19:08:56.049484 env[1629]: time="2023-10-02T19:08:56.049361266Z" level=info msg="TearDown network for sandbox \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\" successfully" Oct 2 19:08:56.049484 env[1629]: time="2023-10-02T19:08:56.049481896Z" level=info msg="StopPodSandbox for \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\" returns successfully" Oct 2 19:08:56.050764 env[1629]: time="2023-10-02T19:08:56.050732928Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wcmgn,Uid:ade4b6df-b8e6-4e5c-8373-7c3c92757aec,Namespace:calico-system,Attempt:1,}" Oct 2 19:08:56.318939 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:08:56.319109 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali53c33cdf3bd: link becomes ready Oct 2 19:08:56.330948 systemd-networkd[1447]: cali53c33cdf3bd: Link UP Oct 2 19:08:56.330957 systemd-networkd[1447]: cali53c33cdf3bd: Gained carrier Oct 2 19:08:56.333520 (udev-worker)[4242]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.141 [INFO][4205] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0 calico-kube-controllers-74b9887bb6- calico-system 0a8e8c39-7baf-4dd4-a860-89fe78651ce1 672 0 2023-10-02 19:08:27 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:74b9887bb6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-27-110 calico-kube-controllers-74b9887bb6-9hf9m eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali53c33cdf3bd [] []}} ContainerID="440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-9hf9m" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-" Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.142 [INFO][4205] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-9hf9m" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.225 [INFO][4228] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" HandleID="k8s-pod-network.440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" Workload="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.246 [INFO][4228] ipam_plugin.go 269: Auto assigning IP ContainerID="440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" HandleID="k8s-pod-network.440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" Workload="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000525640), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-27-110", "pod":"calico-kube-controllers-74b9887bb6-9hf9m", "timestamp":"2023-10-02 19:08:56.225444169 +0000 UTC"}, Hostname:"ip-172-31-27-110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:08:56.370771 env[1629]: time="2023-10-02T19:08:56Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:56.370771 env[1629]: time="2023-10-02T19:08:56Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.247 [INFO][4228] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-110' Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.252 [INFO][4228] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" host="ip-172-31-27-110" Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.259 [INFO][4228] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-110" Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.269 [INFO][4228] ipam.go 489: Trying affinity for 192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.273 [INFO][4228] ipam.go 155: Attempting to load block cidr=192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.279 [INFO][4228] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.279 [INFO][4228] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.22.128/26 handle="k8s-pod-network.440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" host="ip-172-31-27-110" Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.282 [INFO][4228] ipam.go 1682: Creating new handle: k8s-pod-network.440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.287 [INFO][4228] ipam.go 1203: Writing block in order to claim IPs block=192.168.22.128/26 handle="k8s-pod-network.440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" host="ip-172-31-27-110" Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.298 [INFO][4228] ipam.go 1216: Successfully claimed IPs: [192.168.22.129/26] block=192.168.22.128/26 handle="k8s-pod-network.440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" host="ip-172-31-27-110" Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.298 [INFO][4228] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.22.129/26] handle="k8s-pod-network.440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" host="ip-172-31-27-110" Oct 2 19:08:56.370771 env[1629]: time="2023-10-02T19:08:56Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:56.370771 env[1629]: 2023-10-02 19:08:56.299 [INFO][4228] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.22.129/26] IPv6=[] ContainerID="440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" HandleID="k8s-pod-network.440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" Workload="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:08:56.371769 env[1629]: 2023-10-02 19:08:56.308 [INFO][4205] k8s.go 383: Populated endpoint ContainerID="440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-9hf9m" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"0a8e8c39-7baf-4dd4-a860-89fe78651ce1", ResourceVersion:"672", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"", Pod:"calico-kube-controllers-74b9887bb6-9hf9m", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.22.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali53c33cdf3bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:56.371769 env[1629]: 2023-10-02 19:08:56.308 [INFO][4205] k8s.go 384: Calico CNI using IPs: [192.168.22.129/32] ContainerID="440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-9hf9m" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:08:56.371769 env[1629]: 2023-10-02 19:08:56.308 [INFO][4205] dataplane_linux.go 68: Setting the host side veth name to cali53c33cdf3bd ContainerID="440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-9hf9m" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:08:56.371769 env[1629]: 2023-10-02 19:08:56.319 [INFO][4205] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-9hf9m" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:08:56.371769 env[1629]: 2023-10-02 19:08:56.334 [INFO][4205] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-9hf9m" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"0a8e8c39-7baf-4dd4-a860-89fe78651ce1", ResourceVersion:"672", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf", Pod:"calico-kube-controllers-74b9887bb6-9hf9m", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.22.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali53c33cdf3bd", MAC:"32:61:b1:0f:9e:f5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:56.371769 env[1629]: 2023-10-02 19:08:56.358 [INFO][4205] k8s.go 489: Wrote updated endpoint to datastore ContainerID="440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-9hf9m" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:08:56.406698 systemd-networkd[1447]: cali933176b8050: Link UP Oct 2 19:08:56.406708 systemd-networkd[1447]: cali933176b8050: Gained carrier Oct 2 19:08:56.423673 env[1629]: time="2023-10-02T19:08:56.423580512Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:56.423962 env[1629]: time="2023-10-02T19:08:56.423921332Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:56.424117 env[1629]: time="2023-10-02T19:08:56.424090337Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:56.424660 env[1629]: time="2023-10-02T19:08:56.424552259Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf pid=4266 runtime=io.containerd.runc.v2 Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.200 [INFO][4215] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0 csi-node-driver- calico-system ade4b6df-b8e6-4e5c-8373-7c3c92757aec 673 0 2023-10-02 19:08:41 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6b49688c47 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-27-110 csi-node-driver-wcmgn eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali933176b8050 [] []}} ContainerID="9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" Namespace="calico-system" Pod="csi-node-driver-wcmgn" WorkloadEndpoint="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-" Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.200 [INFO][4215] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" Namespace="calico-system" Pod="csi-node-driver-wcmgn" WorkloadEndpoint="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.263 [INFO][4235] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" HandleID="k8s-pod-network.9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" Workload="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.276 [INFO][4235] ipam_plugin.go 269: Auto assigning IP ContainerID="9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" HandleID="k8s-pod-network.9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" Workload="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001af270), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-27-110", "pod":"csi-node-driver-wcmgn", "timestamp":"2023-10-02 19:08:56.263386306 +0000 UTC"}, Hostname:"ip-172-31-27-110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:08:56.440733 env[1629]: time="2023-10-02T19:08:56Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:56.440733 env[1629]: time="2023-10-02T19:08:56Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.299 [INFO][4235] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-110' Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.315 [INFO][4235] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" host="ip-172-31-27-110" Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.326 [INFO][4235] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-110" Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.343 [INFO][4235] ipam.go 489: Trying affinity for 192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.346 [INFO][4235] ipam.go 155: Attempting to load block cidr=192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.350 [INFO][4235] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.351 [INFO][4235] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.22.128/26 handle="k8s-pod-network.9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" host="ip-172-31-27-110" Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.353 [INFO][4235] ipam.go 1682: Creating new handle: k8s-pod-network.9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.362 [INFO][4235] ipam.go 1203: Writing block in order to claim IPs block=192.168.22.128/26 handle="k8s-pod-network.9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" host="ip-172-31-27-110" Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.390 [INFO][4235] ipam.go 1216: Successfully claimed IPs: [192.168.22.130/26] block=192.168.22.128/26 handle="k8s-pod-network.9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" host="ip-172-31-27-110" Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.390 [INFO][4235] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.22.130/26] handle="k8s-pod-network.9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" host="ip-172-31-27-110" Oct 2 19:08:56.440733 env[1629]: time="2023-10-02T19:08:56Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:56.440733 env[1629]: 2023-10-02 19:08:56.390 [INFO][4235] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.22.130/26] IPv6=[] ContainerID="9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" HandleID="k8s-pod-network.9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" Workload="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:08:56.441904 env[1629]: 2023-10-02 19:08:56.395 [INFO][4215] k8s.go 383: Populated endpoint ContainerID="9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" Namespace="calico-system" Pod="csi-node-driver-wcmgn" WorkloadEndpoint="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ade4b6df-b8e6-4e5c-8373-7c3c92757aec", ResourceVersion:"673", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"", Pod:"csi-node-driver-wcmgn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.22.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali933176b8050", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:56.441904 env[1629]: 2023-10-02 19:08:56.395 [INFO][4215] k8s.go 384: Calico CNI using IPs: [192.168.22.130/32] ContainerID="9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" Namespace="calico-system" Pod="csi-node-driver-wcmgn" WorkloadEndpoint="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:08:56.441904 env[1629]: 2023-10-02 19:08:56.395 [INFO][4215] dataplane_linux.go 68: Setting the host side veth name to cali933176b8050 ContainerID="9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" Namespace="calico-system" Pod="csi-node-driver-wcmgn" WorkloadEndpoint="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:08:56.441904 env[1629]: 2023-10-02 19:08:56.397 [INFO][4215] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" Namespace="calico-system" Pod="csi-node-driver-wcmgn" WorkloadEndpoint="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:08:56.441904 env[1629]: 2023-10-02 19:08:56.409 [INFO][4215] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" Namespace="calico-system" Pod="csi-node-driver-wcmgn" WorkloadEndpoint="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ade4b6df-b8e6-4e5c-8373-7c3c92757aec", ResourceVersion:"673", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b", Pod:"csi-node-driver-wcmgn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.22.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali933176b8050", MAC:"52:56:83:9f:b2:83", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:56.441904 env[1629]: 2023-10-02 19:08:56.427 [INFO][4215] k8s.go 489: Wrote updated endpoint to datastore ContainerID="9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b" Namespace="calico-system" Pod="csi-node-driver-wcmgn" WorkloadEndpoint="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:08:56.493455 kernel: kauditd_printk_skb: 151 callbacks suppressed Oct 2 19:08:56.493603 kernel: audit: type=1325 audit(1696273736.469:1150): table=filter:101 family=2 entries=36 op=nft_register_chain pid=4284 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:56.493643 kernel: audit: type=1300 audit(1696273736.469:1150): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffea4697a80 a2=0 a3=7ffea4697a6c items=0 ppid=3924 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.469000 audit[4284]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=4284 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:56.469000 audit[4284]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffea4697a80 a2=0 a3=7ffea4697a6c items=0 ppid=3924 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.477555 systemd[1]: Started cri-containerd-440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf.scope. Oct 2 19:08:56.469000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:56.502421 kernel: audit: type=1327 audit(1696273736.469:1150): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:56.523350 env[1629]: time="2023-10-02T19:08:56.519272583Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:56.523350 env[1629]: time="2023-10-02T19:08:56.519335510Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:56.523350 env[1629]: time="2023-10-02T19:08:56.519351778Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:56.523350 env[1629]: time="2023-10-02T19:08:56.519739236Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b pid=4305 runtime=io.containerd.runc.v2 Oct 2 19:08:56.557000 audit[4327]: NETFILTER_CFG table=filter:102 family=2 entries=34 op=nft_register_chain pid=4327 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:56.561095 systemd[1]: Started cri-containerd-9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b.scope. Oct 2 19:08:56.562649 kernel: audit: type=1325 audit(1696273736.557:1151): table=filter:102 family=2 entries=34 op=nft_register_chain pid=4327 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:56.581465 kernel: audit: type=1300 audit(1696273736.557:1151): arch=c000003e syscall=46 success=yes exit=18320 a0=3 a1=7ffde0a3a060 a2=0 a3=7ffde0a3a04c items=0 ppid=3924 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.557000 audit[4327]: SYSCALL arch=c000003e syscall=46 success=yes exit=18320 a0=3 a1=7ffde0a3a060 a2=0 a3=7ffde0a3a04c items=0 ppid=3924 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.557000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:56.597414 kernel: audit: type=1327 audit(1696273736.557:1151): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:56.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.606626 kernel: audit: type=1400 audit(1696273736.586:1152): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.614471 kernel: audit: type=1400 audit(1696273736.586:1153): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.622409 kernel: audit: type=1400 audit(1696273736.586:1154): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.631453 kernel: audit: type=1400 audit(1696273736.586:1155): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.592000 audit: BPF prog-id=155 op=LOAD Oct 2 19:08:56.596000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.596000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4266 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434306533663830343337393961363638326438616331336664353562 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4266 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434306533663830343337393961363638326438616331336664353562 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit: BPF prog-id=156 op=LOAD Oct 2 19:08:56.597000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000255dc0 items=0 ppid=4266 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434306533663830343337393961363638326438616331336664353562 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit: BPF prog-id=157 op=LOAD Oct 2 19:08:56.597000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000255e08 items=0 ppid=4266 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434306533663830343337393961363638326438616331336664353562 Oct 2 19:08:56.597000 audit: BPF prog-id=157 op=UNLOAD Oct 2 19:08:56.597000 audit: BPF prog-id=156 op=UNLOAD Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.597000 audit: BPF prog-id=158 op=LOAD Oct 2 19:08:56.597000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000358218 items=0 ppid=4266 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434306533663830343337393961363638326438616331336664353562 Oct 2 19:08:56.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.656000 audit: BPF prog-id=159 op=LOAD Oct 2 19:08:56.657000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.657000 audit[4312]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4305 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966316534303534376366373462303836393739346439383365353636 Oct 2 19:08:56.657000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.657000 audit[4312]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4305 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966316534303534376366373462303836393739346439383365353636 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit: BPF prog-id=160 op=LOAD Oct 2 19:08:56.659000 audit[4312]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003266f0 items=0 ppid=4305 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966316534303534376366373462303836393739346439383365353636 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit: BPF prog-id=161 op=LOAD Oct 2 19:08:56.659000 audit[4312]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000326738 items=0 ppid=4305 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966316534303534376366373462303836393739346439383365353636 Oct 2 19:08:56.659000 audit: BPF prog-id=161 op=UNLOAD Oct 2 19:08:56.659000 audit: BPF prog-id=160 op=UNLOAD Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:56.659000 audit: BPF prog-id=162 op=LOAD Oct 2 19:08:56.659000 audit[4312]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000326b48 items=0 ppid=4305 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:56.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966316534303534376366373462303836393739346439383365353636 Oct 2 19:08:56.688186 env[1629]: time="2023-10-02T19:08:56.688142888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wcmgn,Uid:ade4b6df-b8e6-4e5c-8373-7c3c92757aec,Namespace:calico-system,Attempt:1,} returns sandbox id \"9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b\"" Oct 2 19:08:56.690573 env[1629]: time="2023-10-02T19:08:56.690535511Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:08:56.712503 env[1629]: time="2023-10-02T19:08:56.712453354Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-9hf9m,Uid:0a8e8c39-7baf-4dd4-a860-89fe78651ce1,Namespace:calico-system,Attempt:1,} returns sandbox id \"440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf\"" Oct 2 19:08:56.868539 env[1629]: time="2023-10-02T19:08:56.868404293Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:08:56.871066 env[1629]: time="2023-10-02T19:08:56.870958687Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:08:56.872971 kubelet[2903]: E1002 19:08:56.872937 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:08:56.873641 kubelet[2903]: E1002 19:08:56.873615 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:08:56.875069 env[1629]: time="2023-10-02T19:08:56.875026826Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:08:56.882667 kubelet[2903]: E1002 19:08:56.882522 2903 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-2z2zp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wcmgn_calico-system(ade4b6df-b8e6-4e5c-8373-7c3c92757aec): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:08:57.624045 systemd-networkd[1447]: cali933176b8050: Gained IPv6LL Oct 2 19:08:57.628786 systemd[1]: run-containerd-runc-k8s.io-bafed02af36894ab4793e078b0c497d98d72569336fcbeff720dcbf9b95f7b55-runc.NwFkCH.mount: Deactivated successfully. Oct 2 19:08:57.689109 env[1629]: time="2023-10-02T19:08:57.689040302Z" level=info msg="StopPodSandbox for \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\"" Oct 2 19:08:57.918162 env[1629]: 2023-10-02 19:08:57.828 [INFO][4378] k8s.go 576: Cleaning up netns ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Oct 2 19:08:57.918162 env[1629]: 2023-10-02 19:08:57.828 [INFO][4378] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" iface="eth0" netns="/var/run/netns/cni-2859754a-18f3-274a-addf-0bb1307b99c9" Oct 2 19:08:57.918162 env[1629]: 2023-10-02 19:08:57.829 [INFO][4378] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" iface="eth0" netns="/var/run/netns/cni-2859754a-18f3-274a-addf-0bb1307b99c9" Oct 2 19:08:57.918162 env[1629]: 2023-10-02 19:08:57.829 [INFO][4378] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" iface="eth0" netns="/var/run/netns/cni-2859754a-18f3-274a-addf-0bb1307b99c9" Oct 2 19:08:57.918162 env[1629]: 2023-10-02 19:08:57.829 [INFO][4378] k8s.go 583: Releasing IP address(es) ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Oct 2 19:08:57.918162 env[1629]: 2023-10-02 19:08:57.829 [INFO][4378] utils.go 196: Calico CNI releasing IP address ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Oct 2 19:08:57.918162 env[1629]: 2023-10-02 19:08:57.891 [INFO][4391] ipam_plugin.go 416: Releasing address using handleID ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" HandleID="k8s-pod-network.fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:08:57.918162 env[1629]: time="2023-10-02T19:08:57Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:57.918162 env[1629]: time="2023-10-02T19:08:57Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:57.918162 env[1629]: 2023-10-02 19:08:57.907 [WARNING][4391] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" HandleID="k8s-pod-network.fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:08:57.918162 env[1629]: 2023-10-02 19:08:57.907 [INFO][4391] ipam_plugin.go 444: Releasing address using workloadID ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" HandleID="k8s-pod-network.fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:08:57.918162 env[1629]: time="2023-10-02T19:08:57Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:57.918162 env[1629]: 2023-10-02 19:08:57.915 [INFO][4378] k8s.go 589: Teardown processing complete. ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Oct 2 19:08:57.924199 systemd[1]: run-netns-cni\x2d2859754a\x2d18f3\x2d274a\x2daddf\x2d0bb1307b99c9.mount: Deactivated successfully. Oct 2 19:08:57.925075 env[1629]: time="2023-10-02T19:08:57.925015700Z" level=info msg="TearDown network for sandbox \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\" successfully" Oct 2 19:08:57.925075 env[1629]: time="2023-10-02T19:08:57.925070990Z" level=info msg="StopPodSandbox for \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\" returns successfully" Oct 2 19:08:57.926367 env[1629]: time="2023-10-02T19:08:57.926318970Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-gqflr,Uid:96b96afe-e737-4867-b90f-186c15658085,Namespace:kube-system,Attempt:1,}" Oct 2 19:08:58.070766 systemd-networkd[1447]: cali53c33cdf3bd: Gained IPv6LL Oct 2 19:08:58.229844 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount496664823.mount: Deactivated successfully. Oct 2 19:08:58.382536 systemd-networkd[1447]: cali3d9a7d3238d: Link UP Oct 2 19:08:58.387458 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3d9a7d3238d: link becomes ready Oct 2 19:08:58.387636 systemd-networkd[1447]: cali3d9a7d3238d: Gained carrier Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.018 [INFO][4401] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0 coredns-5dd5756b68- kube-system 96b96afe-e737-4867-b90f-186c15658085 692 0 2023-10-02 19:08:20 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-27-110 coredns-5dd5756b68-gqflr eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali3d9a7d3238d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" Namespace="kube-system" Pod="coredns-5dd5756b68-gqflr" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-" Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.019 [INFO][4401] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" Namespace="kube-system" Pod="coredns-5dd5756b68-gqflr" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.264 [INFO][4412] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" HandleID="k8s-pod-network.18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.288 [INFO][4412] ipam_plugin.go 269: Auto assigning IP ContainerID="18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" HandleID="k8s-pod-network.18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010bbf0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-27-110", "pod":"coredns-5dd5756b68-gqflr", "timestamp":"2023-10-02 19:08:58.263998341 +0000 UTC"}, Hostname:"ip-172-31-27-110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:08:58.412953 env[1629]: time="2023-10-02T19:08:58Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:58.412953 env[1629]: time="2023-10-02T19:08:58Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.288 [INFO][4412] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-110' Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.295 [INFO][4412] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" host="ip-172-31-27-110" Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.302 [INFO][4412] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-110" Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.309 [INFO][4412] ipam.go 489: Trying affinity for 192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.314 [INFO][4412] ipam.go 155: Attempting to load block cidr=192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.323 [INFO][4412] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.323 [INFO][4412] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.22.128/26 handle="k8s-pod-network.18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" host="ip-172-31-27-110" Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.327 [INFO][4412] ipam.go 1682: Creating new handle: k8s-pod-network.18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403 Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.336 [INFO][4412] ipam.go 1203: Writing block in order to claim IPs block=192.168.22.128/26 handle="k8s-pod-network.18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" host="ip-172-31-27-110" Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.349 [INFO][4412] ipam.go 1216: Successfully claimed IPs: [192.168.22.131/26] block=192.168.22.128/26 handle="k8s-pod-network.18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" host="ip-172-31-27-110" Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.349 [INFO][4412] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.22.131/26] handle="k8s-pod-network.18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" host="ip-172-31-27-110" Oct 2 19:08:58.412953 env[1629]: time="2023-10-02T19:08:58Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:58.412953 env[1629]: 2023-10-02 19:08:58.349 [INFO][4412] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.22.131/26] IPv6=[] ContainerID="18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" HandleID="k8s-pod-network.18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:08:58.414578 env[1629]: 2023-10-02 19:08:58.365 [INFO][4401] k8s.go 383: Populated endpoint ContainerID="18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" Namespace="kube-system" Pod="coredns-5dd5756b68-gqflr" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"96b96afe-e737-4867-b90f-186c15658085", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"", Pod:"coredns-5dd5756b68-gqflr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.22.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3d9a7d3238d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:58.414578 env[1629]: 2023-10-02 19:08:58.365 [INFO][4401] k8s.go 384: Calico CNI using IPs: [192.168.22.131/32] ContainerID="18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" Namespace="kube-system" Pod="coredns-5dd5756b68-gqflr" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:08:58.414578 env[1629]: 2023-10-02 19:08:58.365 [INFO][4401] dataplane_linux.go 68: Setting the host side veth name to cali3d9a7d3238d ContainerID="18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" Namespace="kube-system" Pod="coredns-5dd5756b68-gqflr" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:08:58.414578 env[1629]: 2023-10-02 19:08:58.367 [INFO][4401] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" Namespace="kube-system" Pod="coredns-5dd5756b68-gqflr" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:08:58.414578 env[1629]: 2023-10-02 19:08:58.390 [INFO][4401] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" Namespace="kube-system" Pod="coredns-5dd5756b68-gqflr" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"96b96afe-e737-4867-b90f-186c15658085", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403", Pod:"coredns-5dd5756b68-gqflr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.22.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3d9a7d3238d", MAC:"c6:10:39:66:e8:be", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:58.414578 env[1629]: 2023-10-02 19:08:58.407 [INFO][4401] k8s.go 489: Wrote updated endpoint to datastore ContainerID="18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403" Namespace="kube-system" Pod="coredns-5dd5756b68-gqflr" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:08:58.447975 env[1629]: time="2023-10-02T19:08:58.447887469Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:58.448240 env[1629]: time="2023-10-02T19:08:58.447952806Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:58.448240 env[1629]: time="2023-10-02T19:08:58.447968872Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:58.448240 env[1629]: time="2023-10-02T19:08:58.448151583Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403 pid=4438 runtime=io.containerd.runc.v2 Oct 2 19:08:58.510260 systemd[1]: Started cri-containerd-18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403.scope. Oct 2 19:08:58.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.589000 audit: BPF prog-id=163 op=LOAD Oct 2 19:08:58.590000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.590000 audit[4448]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4438 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138343239656639376536353438613237636532356339343762336438 Oct 2 19:08:58.591000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.591000 audit[4448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4438 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138343239656639376536353438613237636532356339343762336438 Oct 2 19:08:58.591000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.591000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.591000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.591000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.591000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.591000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.591000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.591000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.591000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.591000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.591000 audit: BPF prog-id=164 op=LOAD Oct 2 19:08:58.591000 audit[4448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000219970 items=0 ppid=4438 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138343239656639376536353438613237636532356339343762336438 Oct 2 19:08:58.593000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.593000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.593000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.593000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.593000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.593000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.593000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.593000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.593000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.593000 audit: BPF prog-id=165 op=LOAD Oct 2 19:08:58.593000 audit[4448]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002199b8 items=0 ppid=4438 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138343239656639376536353438613237636532356339343762336438 Oct 2 19:08:58.595000 audit: BPF prog-id=165 op=UNLOAD Oct 2 19:08:58.595000 audit: BPF prog-id=164 op=UNLOAD Oct 2 19:08:58.595000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.595000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.595000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.595000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.595000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.595000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.595000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.595000 audit[4448]: AVC avc: denied { perfmon } for pid=4448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.595000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.596000 audit[4467]: NETFILTER_CFG table=filter:103 family=2 entries=44 op=nft_register_chain pid=4467 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:58.595000 audit[4448]: AVC avc: denied { bpf } for pid=4448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.595000 audit: BPF prog-id=166 op=LOAD Oct 2 19:08:58.595000 audit[4448]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000219dc8 items=0 ppid=4438 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138343239656639376536353438613237636532356339343762336438 Oct 2 19:08:58.596000 audit[4467]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7ffec81598b0 a2=0 a3=7ffec815989c items=0 ppid=3924 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.596000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:58.686316 env[1629]: time="2023-10-02T19:08:58.686266482Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-gqflr,Uid:96b96afe-e737-4867-b90f-186c15658085,Namespace:kube-system,Attempt:1,} returns sandbox id \"18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403\"" Oct 2 19:08:58.715635 env[1629]: time="2023-10-02T19:08:58.715592961Z" level=info msg="StopPodSandbox for \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\"" Oct 2 19:08:58.733358 env[1629]: time="2023-10-02T19:08:58.733314323Z" level=info msg="CreateContainer within sandbox \"18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:08:58.811856 env[1629]: time="2023-10-02T19:08:58.811739018Z" level=info msg="CreateContainer within sandbox \"18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"15d91719fb24ee590f4174441dfcf57b3f7528eb2d10c3df75885dfbd347173d\"" Oct 2 19:08:58.820014 env[1629]: time="2023-10-02T19:08:58.819968466Z" level=info msg="StartContainer for \"15d91719fb24ee590f4174441dfcf57b3f7528eb2d10c3df75885dfbd347173d\"" Oct 2 19:08:58.887196 systemd[1]: Started cri-containerd-15d91719fb24ee590f4174441dfcf57b3f7528eb2d10c3df75885dfbd347173d.scope. Oct 2 19:08:58.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.986000 audit: BPF prog-id=167 op=LOAD Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4438 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135643931373139666232346565353930663431373434343164666366 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4438 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135643931373139666232346565353930663431373434343164666366 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit: BPF prog-id=168 op=LOAD Oct 2 19:08:58.988000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003808a0 items=0 ppid=4438 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135643931373139666232346565353930663431373434343164666366 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit: BPF prog-id=169 op=LOAD Oct 2 19:08:58.988000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003808e8 items=0 ppid=4438 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135643931373139666232346565353930663431373434343164666366 Oct 2 19:08:58.988000 audit: BPF prog-id=169 op=UNLOAD Oct 2 19:08:58.988000 audit: BPF prog-id=168 op=UNLOAD Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:58.988000 audit: BPF prog-id=170 op=LOAD Oct 2 19:08:58.988000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000380cf8 items=0 ppid=4438 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:58.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135643931373139666232346565353930663431373434343164666366 Oct 2 19:08:59.033417 systemd[1]: run-containerd-runc-k8s.io-18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403-runc.P120Mm.mount: Deactivated successfully. Oct 2 19:08:59.092261 env[1629]: time="2023-10-02T19:08:59.092155331Z" level=info msg="StartContainer for \"15d91719fb24ee590f4174441dfcf57b3f7528eb2d10c3df75885dfbd347173d\" returns successfully" Oct 2 19:08:59.100244 env[1629]: 2023-10-02 19:08:58.849 [INFO][4489] k8s.go 576: Cleaning up netns ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Oct 2 19:08:59.100244 env[1629]: 2023-10-02 19:08:58.849 [INFO][4489] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" iface="eth0" netns="/var/run/netns/cni-87ebf9d9-9bb3-7865-b05c-d5f22f9086a1" Oct 2 19:08:59.100244 env[1629]: 2023-10-02 19:08:58.849 [INFO][4489] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" iface="eth0" netns="/var/run/netns/cni-87ebf9d9-9bb3-7865-b05c-d5f22f9086a1" Oct 2 19:08:59.100244 env[1629]: 2023-10-02 19:08:58.849 [INFO][4489] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" iface="eth0" netns="/var/run/netns/cni-87ebf9d9-9bb3-7865-b05c-d5f22f9086a1" Oct 2 19:08:59.100244 env[1629]: 2023-10-02 19:08:58.850 [INFO][4489] k8s.go 583: Releasing IP address(es) ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Oct 2 19:08:59.100244 env[1629]: 2023-10-02 19:08:58.851 [INFO][4489] utils.go 196: Calico CNI releasing IP address ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Oct 2 19:08:59.100244 env[1629]: 2023-10-02 19:08:59.075 [INFO][4507] ipam_plugin.go 416: Releasing address using handleID ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" HandleID="k8s-pod-network.d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:08:59.100244 env[1629]: time="2023-10-02T19:08:59Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:59.100244 env[1629]: time="2023-10-02T19:08:59Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:59.100244 env[1629]: 2023-10-02 19:08:59.089 [WARNING][4507] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" HandleID="k8s-pod-network.d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:08:59.100244 env[1629]: 2023-10-02 19:08:59.089 [INFO][4507] ipam_plugin.go 444: Releasing address using workloadID ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" HandleID="k8s-pod-network.d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:08:59.100244 env[1629]: time="2023-10-02T19:08:59Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:59.100244 env[1629]: 2023-10-02 19:08:59.097 [INFO][4489] k8s.go 589: Teardown processing complete. ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Oct 2 19:08:59.108308 systemd[1]: run-netns-cni\x2d87ebf9d9\x2d9bb3\x2d7865\x2db05c\x2dd5f22f9086a1.mount: Deactivated successfully. Oct 2 19:08:59.110100 env[1629]: time="2023-10-02T19:08:59.110048065Z" level=info msg="TearDown network for sandbox \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\" successfully" Oct 2 19:08:59.110245 env[1629]: time="2023-10-02T19:08:59.110221044Z" level=info msg="StopPodSandbox for \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\" returns successfully" Oct 2 19:08:59.113718 env[1629]: time="2023-10-02T19:08:59.113509409Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-2kpgn,Uid:10d7547d-1645-49b4-95f4-d942f1774dd9,Namespace:kube-system,Attempt:1,}" Oct 2 19:08:59.521365 systemd-networkd[1447]: cali770c6c992dd: Link UP Oct 2 19:08:59.521432 systemd-networkd[1447]: cali770c6c992dd: Gained carrier Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.313 [INFO][4533] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0 coredns-5dd5756b68- kube-system 10d7547d-1645-49b4-95f4-d942f1774dd9 701 0 2023-10-02 19:08:20 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-27-110 coredns-5dd5756b68-2kpgn eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali770c6c992dd [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" Namespace="kube-system" Pod="coredns-5dd5756b68-2kpgn" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-" Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.313 [INFO][4533] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" Namespace="kube-system" Pod="coredns-5dd5756b68-2kpgn" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.436 [INFO][4547] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" HandleID="k8s-pod-network.a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.453 [INFO][4547] ipam_plugin.go 269: Auto assigning IP ContainerID="a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" HandleID="k8s-pod-network.a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a3e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-27-110", "pod":"coredns-5dd5756b68-2kpgn", "timestamp":"2023-10-02 19:08:59.436052848 +0000 UTC"}, Hostname:"ip-172-31-27-110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:08:59.570554 env[1629]: time="2023-10-02T19:08:59Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:08:59.570554 env[1629]: time="2023-10-02T19:08:59Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.454 [INFO][4547] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-110' Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.457 [INFO][4547] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" host="ip-172-31-27-110" Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.467 [INFO][4547] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-110" Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.474 [INFO][4547] ipam.go 489: Trying affinity for 192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.478 [INFO][4547] ipam.go 155: Attempting to load block cidr=192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.484 [INFO][4547] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.484 [INFO][4547] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.22.128/26 handle="k8s-pod-network.a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" host="ip-172-31-27-110" Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.487 [INFO][4547] ipam.go 1682: Creating new handle: k8s-pod-network.a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658 Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.499 [INFO][4547] ipam.go 1203: Writing block in order to claim IPs block=192.168.22.128/26 handle="k8s-pod-network.a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" host="ip-172-31-27-110" Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.513 [INFO][4547] ipam.go 1216: Successfully claimed IPs: [192.168.22.132/26] block=192.168.22.128/26 handle="k8s-pod-network.a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" host="ip-172-31-27-110" Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.513 [INFO][4547] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.22.132/26] handle="k8s-pod-network.a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" host="ip-172-31-27-110" Oct 2 19:08:59.570554 env[1629]: time="2023-10-02T19:08:59Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:08:59.570554 env[1629]: 2023-10-02 19:08:59.513 [INFO][4547] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.22.132/26] IPv6=[] ContainerID="a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" HandleID="k8s-pod-network.a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:08:59.572560 env[1629]: 2023-10-02 19:08:59.516 [INFO][4533] k8s.go 383: Populated endpoint ContainerID="a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" Namespace="kube-system" Pod="coredns-5dd5756b68-2kpgn" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"10d7547d-1645-49b4-95f4-d942f1774dd9", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"", Pod:"coredns-5dd5756b68-2kpgn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.22.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali770c6c992dd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:59.572560 env[1629]: 2023-10-02 19:08:59.516 [INFO][4533] k8s.go 384: Calico CNI using IPs: [192.168.22.132/32] ContainerID="a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" Namespace="kube-system" Pod="coredns-5dd5756b68-2kpgn" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:08:59.572560 env[1629]: 2023-10-02 19:08:59.516 [INFO][4533] dataplane_linux.go 68: Setting the host side veth name to cali770c6c992dd ContainerID="a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" Namespace="kube-system" Pod="coredns-5dd5756b68-2kpgn" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:08:59.572560 env[1629]: 2023-10-02 19:08:59.518 [INFO][4533] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" Namespace="kube-system" Pod="coredns-5dd5756b68-2kpgn" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:08:59.572560 env[1629]: 2023-10-02 19:08:59.521 [INFO][4533] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" Namespace="kube-system" Pod="coredns-5dd5756b68-2kpgn" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"10d7547d-1645-49b4-95f4-d942f1774dd9", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658", Pod:"coredns-5dd5756b68-2kpgn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.22.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali770c6c992dd", MAC:"a2:42:ad:ec:4d:16", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:08:59.572560 env[1629]: 2023-10-02 19:08:59.566 [INFO][4533] k8s.go 489: Wrote updated endpoint to datastore ContainerID="a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658" Namespace="kube-system" Pod="coredns-5dd5756b68-2kpgn" WorkloadEndpoint="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:08:59.638893 env[1629]: time="2023-10-02T19:08:59.636306634Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:08:59.638893 env[1629]: time="2023-10-02T19:08:59.636534539Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:08:59.638893 env[1629]: time="2023-10-02T19:08:59.636551903Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:08:59.638893 env[1629]: time="2023-10-02T19:08:59.637029208Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658 pid=4577 runtime=io.containerd.runc.v2 Oct 2 19:08:59.684208 systemd[1]: Started cri-containerd-a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658.scope. Oct 2 19:08:59.762000 audit[4598]: NETFILTER_CFG table=filter:104 family=2 entries=38 op=nft_register_chain pid=4598 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:08:59.762000 audit[4598]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffc6b128d40 a2=0 a3=7ffc6b128d2c items=0 ppid=3924 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.762000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:08:59.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.788000 audit: BPF prog-id=171 op=LOAD Oct 2 19:08:59.789000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.789000 audit[4588]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4577 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134376336336262653237646334633934636537623263656533646134 Oct 2 19:08:59.789000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.789000 audit[4588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4577 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134376336336262653237646334633934636537623263656533646134 Oct 2 19:08:59.792000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.792000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.792000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.792000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.792000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.792000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.792000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.792000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.792000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.792000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.792000 audit: BPF prog-id=172 op=LOAD Oct 2 19:08:59.792000 audit[4588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d74d0 items=0 ppid=4577 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134376336336262653237646334633934636537623263656533646134 Oct 2 19:08:59.794000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.794000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.794000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.794000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.794000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.794000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.794000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.794000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.794000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.794000 audit: BPF prog-id=173 op=LOAD Oct 2 19:08:59.794000 audit[4588]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d7518 items=0 ppid=4577 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134376336336262653237646334633934636537623263656533646134 Oct 2 19:08:59.795000 audit: BPF prog-id=173 op=UNLOAD Oct 2 19:08:59.795000 audit: BPF prog-id=172 op=UNLOAD Oct 2 19:08:59.796000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.796000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.796000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.796000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.796000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.796000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.796000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.796000 audit[4588]: AVC avc: denied { perfmon } for pid=4588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.796000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.796000 audit[4588]: AVC avc: denied { bpf } for pid=4588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:08:59.796000 audit: BPF prog-id=174 op=LOAD Oct 2 19:08:59.796000 audit[4588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d7928 items=0 ppid=4577 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:08:59.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134376336336262653237646334633934636537623263656533646134 Oct 2 19:08:59.870559 env[1629]: time="2023-10-02T19:08:59.870441001Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-2kpgn,Uid:10d7547d-1645-49b4-95f4-d942f1774dd9,Namespace:kube-system,Attempt:1,} returns sandbox id \"a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658\"" Oct 2 19:08:59.877127 env[1629]: time="2023-10-02T19:08:59.877084522Z" level=info msg="CreateContainer within sandbox \"a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:08:59.915299 env[1629]: time="2023-10-02T19:08:59.915246841Z" level=info msg="CreateContainer within sandbox \"a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"4aa785f48d5fdfc9c25b389839e4331f56b67ed2591b9d9877085777341a5fdb\"" Oct 2 19:08:59.918416 env[1629]: time="2023-10-02T19:08:59.918362485Z" level=info msg="StartContainer for \"4aa785f48d5fdfc9c25b389839e4331f56b67ed2591b9d9877085777341a5fdb\"" Oct 2 19:08:59.975487 systemd[1]: Started cri-containerd-4aa785f48d5fdfc9c25b389839e4331f56b67ed2591b9d9877085777341a5fdb.scope. Oct 2 19:09:00.040775 systemd[1]: run-containerd-runc-k8s.io-a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658-runc.vHRp6b.mount: Deactivated successfully. Oct 2 19:09:00.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.076000 audit: BPF prog-id=175 op=LOAD Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4577 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461613738356634386435666466633963323562333839383339653433 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4577 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461613738356634386435666466633963323562333839383339653433 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit: BPF prog-id=176 op=LOAD Oct 2 19:09:00.077000 audit[4627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003463f0 items=0 ppid=4577 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461613738356634386435666466633963323562333839383339653433 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.077000 audit: BPF prog-id=177 op=LOAD Oct 2 19:09:00.077000 audit[4627]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000346438 items=0 ppid=4577 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461613738356634386435666466633963323562333839383339653433 Oct 2 19:09:00.077000 audit: BPF prog-id=177 op=UNLOAD Oct 2 19:09:00.078000 audit: BPF prog-id=176 op=UNLOAD Oct 2 19:09:00.078000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.078000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.078000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.078000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.078000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.078000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.078000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.078000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.078000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.078000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:00.078000 audit: BPF prog-id=178 op=LOAD Oct 2 19:09:00.078000 audit[4627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000346848 items=0 ppid=4577 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461613738356634386435666466633963323562333839383339653433 Oct 2 19:09:00.154033 env[1629]: time="2023-10-02T19:09:00.153974700Z" level=info msg="StartContainer for \"4aa785f48d5fdfc9c25b389839e4331f56b67ed2591b9d9877085777341a5fdb\" returns successfully" Oct 2 19:09:00.161901 kubelet[2903]: I1002 19:09:00.161762 2903 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-gqflr" podStartSLOduration=40.161713123 podCreationTimestamp="2023-10-02 19:08:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:09:00.161520813 +0000 UTC m=+51.722650608" watchObservedRunningTime="2023-10-02 19:09:00.161713123 +0000 UTC m=+51.722842919" Oct 2 19:09:00.326000 audit[4657]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=4657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:00.326000 audit[4657]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff9edf3660 a2=0 a3=7fff9edf364c items=0 ppid=3044 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:00.328000 audit[4657]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=4657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:00.328000 audit[4657]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7fff9edf3660 a2=0 a3=31030 items=0 ppid=3044 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.328000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:00.347000 audit[4659]: NETFILTER_CFG table=filter:107 family=2 entries=11 op=nft_register_rule pid=4659 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:00.347000 audit[4659]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff462b93d0 a2=0 a3=7fff462b93bc items=0 ppid=3044 pid=4659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:00.350000 audit[4659]: NETFILTER_CFG table=nat:108 family=2 entries=35 op=nft_register_chain pid=4659 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:00.350000 audit[4659]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7fff462b93d0 a2=0 a3=7fff462b93bc items=0 ppid=3044 pid=4659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:00.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:00.374903 systemd-networkd[1447]: cali3d9a7d3238d: Gained IPv6LL Oct 2 19:09:00.822959 systemd-networkd[1447]: cali770c6c992dd: Gained IPv6LL Oct 2 19:09:01.387883 kubelet[2903]: I1002 19:09:01.387831 2903 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-2kpgn" podStartSLOduration=41.387761451 podCreationTimestamp="2023-10-02 19:08:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:09:01.180349763 +0000 UTC m=+52.741479560" watchObservedRunningTime="2023-10-02 19:09:01.387761451 +0000 UTC m=+52.948891246" Oct 2 19:09:01.407520 env[1629]: time="2023-10-02T19:09:01.407472132Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:01.413298 env[1629]: time="2023-10-02T19:09:01.413254834Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:01.418048 env[1629]: time="2023-10-02T19:09:01.418008375Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:01.423028 env[1629]: time="2023-10-02T19:09:01.422982628Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:09:01.424826 env[1629]: time="2023-10-02T19:09:01.424770607Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 19:09:01.427117 env[1629]: time="2023-10-02T19:09:01.427081379Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:09:01.430669 env[1629]: time="2023-10-02T19:09:01.430628409Z" level=info msg="CreateContainer within sandbox \"440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:09:01.432000 audit[4664]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4664 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:01.432000 audit[4664]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc054206f0 a2=0 a3=7ffc054206dc items=0 ppid=3044 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:01.432000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:01.437000 audit[4664]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=4664 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:01.437000 audit[4664]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffc054206f0 a2=0 a3=7ffc054206dc items=0 ppid=3044 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:01.437000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:01.457430 env[1629]: time="2023-10-02T19:09:01.457284568Z" level=info msg="CreateContainer within sandbox \"440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c\"" Oct 2 19:09:01.458771 env[1629]: time="2023-10-02T19:09:01.458728397Z" level=info msg="StartContainer for \"d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c\"" Oct 2 19:09:01.550220 systemd[1]: Started cri-containerd-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c.scope. Oct 2 19:09:01.593678 kernel: kauditd_printk_skb: 362 callbacks suppressed Oct 2 19:09:01.593901 kernel: audit: type=1400 audit(1696273741.587:1268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.598839 kernel: audit: type=1400 audit(1696273741.587:1269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.618422 kernel: audit: type=1400 audit(1696273741.587:1270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.626026 kernel: audit: type=1400 audit(1696273741.587:1271): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.626135 kernel: audit: type=1400 audit(1696273741.587:1272): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.634453 kernel: audit: type=1400 audit(1696273741.587:1273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.636495 env[1629]: time="2023-10-02T19:09:01.636416131Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:01.661971 env[1629]: time="2023-10-02T19:09:01.659572436Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:01.668635 kubelet[2903]: E1002 19:09:01.662316 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:01.668635 kubelet[2903]: E1002 19:09:01.662367 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:01.668635 kubelet[2903]: E1002 19:09:01.664077 2903 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-2z2zp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wcmgn_calico-system(ade4b6df-b8e6-4e5c-8373-7c3c92757aec): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:01.668635 kubelet[2903]: E1002 19:09:01.666491 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-wcmgn" podUID="ade4b6df-b8e6-4e5c-8373-7c3c92757aec" Oct 2 19:09:01.676771 kernel: audit: type=1400 audit(1696273741.587:1274): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.685438 kernel: audit: type=1400 audit(1696273741.587:1275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.686507 env[1629]: time="2023-10-02T19:09:01.686452732Z" level=info msg="StartContainer for \"d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c\" returns successfully" Oct 2 19:09:01.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.693507 kernel: audit: type=1400 audit(1696273741.587:1276): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.700338 kernel: audit: type=1400 audit(1696273741.588:1277): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.588000 audit: BPF prog-id=179 op=LOAD Oct 2 19:09:01.589000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.589000 audit[4673]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4266 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:01.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432633231613138666662616637633730303636643663383463316134 Oct 2 19:09:01.589000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.589000 audit[4673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4266 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:01.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432633231613138666662616637633730303636643663383463316134 Oct 2 19:09:01.589000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.589000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.589000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.589000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.589000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.589000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.589000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.589000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.589000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.589000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.589000 audit: BPF prog-id=180 op=LOAD Oct 2 19:09:01.589000 audit[4673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001cc820 items=0 ppid=4266 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:01.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432633231613138666662616637633730303636643663383463316134 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit: BPF prog-id=181 op=LOAD Oct 2 19:09:01.593000 audit[4673]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001cc868 items=0 ppid=4266 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:01.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432633231613138666662616637633730303636643663383463316134 Oct 2 19:09:01.593000 audit: BPF prog-id=181 op=UNLOAD Oct 2 19:09:01.593000 audit: BPF prog-id=180 op=UNLOAD Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:01.593000 audit: BPF prog-id=182 op=LOAD Oct 2 19:09:01.593000 audit[4673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001ccc78 items=0 ppid=4266 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:01.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432633231613138666662616637633730303636643663383463316134 Oct 2 19:09:02.158691 kubelet[2903]: E1002 19:09:02.158648 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-wcmgn" podUID="ade4b6df-b8e6-4e5c-8373-7c3c92757aec" Oct 2 19:09:02.329532 kubelet[2903]: I1002 19:09:02.328989 2903 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-74b9887bb6-9hf9m" podStartSLOduration=30.615831375 podCreationTimestamp="2023-10-02 19:08:27 +0000 UTC" firstStartedPulling="2023-10-02 19:08:56.713783611 +0000 UTC m=+48.274913385" lastFinishedPulling="2023-10-02 19:09:01.426889492 +0000 UTC m=+52.988019280" observedRunningTime="2023-10-02 19:09:02.237987683 +0000 UTC m=+53.799117477" watchObservedRunningTime="2023-10-02 19:09:02.32893727 +0000 UTC m=+53.890067064" Oct 2 19:09:02.447629 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.RIr61T.mount: Deactivated successfully. Oct 2 19:09:02.488000 audit[4724]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=4724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:02.488000 audit[4724]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcbda66f10 a2=0 a3=7ffcbda66efc items=0 ppid=3044 pid=4724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:02.488000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:02.505000 audit[4724]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:02.505000 audit[4724]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffcbda66f10 a2=0 a3=7ffcbda66efc items=0 ppid=3044 pid=4724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:02.505000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:02.824000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:02.824000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:02.824000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c3db60 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:09:02.824000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:02.824000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c26280 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:09:02.824000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:04.405000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:04.405000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:04.405000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00eaba780 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:09:04.405000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:04.405000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c006ecba70 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:09:04.405000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:04.405000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:04.405000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c006ecbaa0 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:09:04.405000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:04.426000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:04.426000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c006edc960 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:09:04.426000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:04.446000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:04.446000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:04.446000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c006edca50 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:09:04.446000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:04.446000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0043f02e0 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:09:04.446000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:09:06.288580 kubelet[2903]: I1002 19:09:06.288547 2903 topology_manager.go:215] "Topology Admit Handler" podUID="b6868c13-5bca-4cb2-9e28-81bafb52f718" podNamespace="calico-apiserver" podName="calico-apiserver-7f859d5f9d-bd7wb" Oct 2 19:09:06.289836 kubelet[2903]: I1002 19:09:06.289810 2903 topology_manager.go:215] "Topology Admit Handler" podUID="44598139-27c6-4881-91a3-2a8dabdec898" podNamespace="calico-apiserver" podName="calico-apiserver-7f859d5f9d-fxhq2" Oct 2 19:09:06.301832 systemd[1]: Created slice kubepods-besteffort-podb6868c13_5bca_4cb2_9e28_81bafb52f718.slice. Oct 2 19:09:06.314636 systemd[1]: Created slice kubepods-besteffort-pod44598139_27c6_4881_91a3_2a8dabdec898.slice. Oct 2 19:09:06.376000 audit[4730]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=4730 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:06.376000 audit[4730]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc88966900 a2=0 a3=7ffc889668ec items=0 ppid=3044 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:06.378000 audit[4730]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4730 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:06.378000 audit[4730]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc88966900 a2=0 a3=7ffc889668ec items=0 ppid=3044 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.378000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:06.408000 audit[4732]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:06.408000 audit[4732]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe8fb87ab0 a2=0 a3=7ffe8fb87a9c items=0 ppid=3044 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:06.410090 kubelet[2903]: I1002 19:09:06.409690 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b6868c13-5bca-4cb2-9e28-81bafb52f718-calico-apiserver-certs\") pod \"calico-apiserver-7f859d5f9d-bd7wb\" (UID: \"b6868c13-5bca-4cb2-9e28-81bafb52f718\") " pod="calico-apiserver/calico-apiserver-7f859d5f9d-bd7wb" Oct 2 19:09:06.410862 kubelet[2903]: I1002 19:09:06.410761 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-65h4q\" (UniqueName: \"kubernetes.io/projected/44598139-27c6-4881-91a3-2a8dabdec898-kube-api-access-65h4q\") pod \"calico-apiserver-7f859d5f9d-fxhq2\" (UID: \"44598139-27c6-4881-91a3-2a8dabdec898\") " pod="calico-apiserver/calico-apiserver-7f859d5f9d-fxhq2" Oct 2 19:09:06.411021 kubelet[2903]: I1002 19:09:06.411010 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/44598139-27c6-4881-91a3-2a8dabdec898-calico-apiserver-certs\") pod \"calico-apiserver-7f859d5f9d-fxhq2\" (UID: \"44598139-27c6-4881-91a3-2a8dabdec898\") " pod="calico-apiserver/calico-apiserver-7f859d5f9d-fxhq2" Oct 2 19:09:06.411146 kubelet[2903]: I1002 19:09:06.411134 2903 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w8glq\" (UniqueName: \"kubernetes.io/projected/b6868c13-5bca-4cb2-9e28-81bafb52f718-kube-api-access-w8glq\") pod \"calico-apiserver-7f859d5f9d-bd7wb\" (UID: \"b6868c13-5bca-4cb2-9e28-81bafb52f718\") " pod="calico-apiserver/calico-apiserver-7f859d5f9d-bd7wb" Oct 2 19:09:06.410000 audit[4732]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:06.410000 audit[4732]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe8fb87ab0 a2=0 a3=7ffe8fb87a9c items=0 ppid=3044 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:06.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:06.612053 env[1629]: time="2023-10-02T19:09:06.611936482Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f859d5f9d-bd7wb,Uid:b6868c13-5bca-4cb2-9e28-81bafb52f718,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:09:06.625481 env[1629]: time="2023-10-02T19:09:06.625419771Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f859d5f9d-fxhq2,Uid:44598139-27c6-4881-91a3-2a8dabdec898,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:09:06.918394 kernel: kauditd_printk_skb: 89 callbacks suppressed Oct 2 19:09:06.918579 kernel: audit: type=1400 audit(1696273746.909:1301): avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:06.909000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:06.909000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:06.929606 kernel: audit: type=1400 audit(1696273746.909:1300): avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:06.909000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d50ce0 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:09:06.945600 kernel: audit: type=1300 audit(1696273746.909:1301): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d50ce0 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:09:06.909000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:06.913000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:06.981333 kernel: audit: type=1327 audit(1696273746.909:1301): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:06.981491 kernel: audit: type=1400 audit(1696273746.913:1302): avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:06.981530 kernel: audit: type=1300 audit(1696273746.913:1302): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d50e60 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:09:06.913000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d50e60 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:09:06.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:06.999551 kernel: audit: type=1327 audit(1696273746.913:1302): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:06.913000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:07.010255 kernel: audit: type=1400 audit(1696273746.913:1303): avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:09:06.913000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d50e80 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:09:07.027631 kernel: audit: type=1300 audit(1696273746.913:1303): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d50e80 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:09:06.913000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:07.034528 kernel: audit: type=1327 audit(1696273746.913:1303): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:06.909000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ddc1c0 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:09:06.909000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:09:07.102307 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:09:07.102475 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5fce88ccbce: link becomes ready Oct 2 19:09:07.112780 (udev-worker)[4772]: Network interface NamePolicy= disabled on kernel command line. Oct 2 19:09:07.113806 systemd-networkd[1447]: cali5fce88ccbce: Link UP Oct 2 19:09:07.113812 systemd-networkd[1447]: cali5fce88ccbce: Gained carrier Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:06.782 [INFO][4747] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--fxhq2-eth0 calico-apiserver-7f859d5f9d- calico-apiserver 44598139-27c6-4881-91a3-2a8dabdec898 807 0 2023-10-02 19:09:06 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7f859d5f9d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-27-110 calico-apiserver-7f859d5f9d-fxhq2 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5fce88ccbce [] []}} ContainerID="9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-fxhq2" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--fxhq2-" Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:06.782 [INFO][4747] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-fxhq2" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--fxhq2-eth0" Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:06.903 [INFO][4760] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" HandleID="k8s-pod-network.9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" Workload="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--fxhq2-eth0" Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:06.988 [INFO][4760] ipam_plugin.go 269: Auto assigning IP ContainerID="9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" HandleID="k8s-pod-network.9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" Workload="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--fxhq2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a3e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-27-110", "pod":"calico-apiserver-7f859d5f9d-fxhq2", "timestamp":"2023-10-02 19:09:06.902096992 +0000 UTC"}, Hostname:"ip-172-31-27-110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:09:07.212142 env[1629]: time="2023-10-02T19:09:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:07.212142 env[1629]: time="2023-10-02T19:09:06Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:06.989 [INFO][4760] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-110' Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:06.995 [INFO][4760] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" host="ip-172-31-27-110" Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:07.008 [INFO][4760] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-110" Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:07.030 [INFO][4760] ipam.go 489: Trying affinity for 192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:07.033 [INFO][4760] ipam.go 155: Attempting to load block cidr=192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:07.037 [INFO][4760] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:07.037 [INFO][4760] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.22.128/26 handle="k8s-pod-network.9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" host="ip-172-31-27-110" Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:07.040 [INFO][4760] ipam.go 1682: Creating new handle: k8s-pod-network.9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3 Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:07.047 [INFO][4760] ipam.go 1203: Writing block in order to claim IPs block=192.168.22.128/26 handle="k8s-pod-network.9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" host="ip-172-31-27-110" Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:07.093 [INFO][4760] ipam.go 1216: Successfully claimed IPs: [192.168.22.133/26] block=192.168.22.128/26 handle="k8s-pod-network.9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" host="ip-172-31-27-110" Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:07.094 [INFO][4760] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.22.133/26] handle="k8s-pod-network.9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" host="ip-172-31-27-110" Oct 2 19:09:07.212142 env[1629]: time="2023-10-02T19:09:07Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:07.212142 env[1629]: 2023-10-02 19:09:07.094 [INFO][4760] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.22.133/26] IPv6=[] ContainerID="9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" HandleID="k8s-pod-network.9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" Workload="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--fxhq2-eth0" Oct 2 19:09:07.214083 env[1629]: 2023-10-02 19:09:07.098 [INFO][4747] k8s.go 383: Populated endpoint ContainerID="9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-fxhq2" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--fxhq2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--fxhq2-eth0", GenerateName:"calico-apiserver-7f859d5f9d-", Namespace:"calico-apiserver", SelfLink:"", UID:"44598139-27c6-4881-91a3-2a8dabdec898", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f859d5f9d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"", Pod:"calico-apiserver-7f859d5f9d-fxhq2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.22.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5fce88ccbce", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:07.214083 env[1629]: 2023-10-02 19:09:07.098 [INFO][4747] k8s.go 384: Calico CNI using IPs: [192.168.22.133/32] ContainerID="9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-fxhq2" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--fxhq2-eth0" Oct 2 19:09:07.214083 env[1629]: 2023-10-02 19:09:07.098 [INFO][4747] dataplane_linux.go 68: Setting the host side veth name to cali5fce88ccbce ContainerID="9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-fxhq2" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--fxhq2-eth0" Oct 2 19:09:07.214083 env[1629]: 2023-10-02 19:09:07.102 [INFO][4747] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-fxhq2" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--fxhq2-eth0" Oct 2 19:09:07.214083 env[1629]: 2023-10-02 19:09:07.112 [INFO][4747] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-fxhq2" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--fxhq2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--fxhq2-eth0", GenerateName:"calico-apiserver-7f859d5f9d-", Namespace:"calico-apiserver", SelfLink:"", UID:"44598139-27c6-4881-91a3-2a8dabdec898", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f859d5f9d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3", Pod:"calico-apiserver-7f859d5f9d-fxhq2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.22.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5fce88ccbce", MAC:"e2:25:a1:7a:d4:75", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:07.214083 env[1629]: 2023-10-02 19:09:07.209 [INFO][4747] k8s.go 489: Wrote updated endpoint to datastore ContainerID="9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-fxhq2" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--fxhq2-eth0" Oct 2 19:09:07.247962 env[1629]: time="2023-10-02T19:09:07.247869649Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:07.248194 env[1629]: time="2023-10-02T19:09:07.248170392Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:07.248311 env[1629]: time="2023-10-02T19:09:07.248290421Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:07.248769 env[1629]: time="2023-10-02T19:09:07.248637251Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3 pid=4790 runtime=io.containerd.runc.v2 Oct 2 19:09:07.296079 systemd[1]: Started cri-containerd-9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3.scope. Oct 2 19:09:07.499663 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali176bb1b4ebd: link becomes ready Oct 2 19:09:07.506798 systemd-networkd[1447]: cali176bb1b4ebd: Link UP Oct 2 19:09:07.506813 systemd-networkd[1447]: cali176bb1b4ebd: Gained carrier Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:06.809 [INFO][4737] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--bd7wb-eth0 calico-apiserver-7f859d5f9d- calico-apiserver b6868c13-5bca-4cb2-9e28-81bafb52f718 804 0 2023-10-02 19:09:06 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7f859d5f9d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-27-110 calico-apiserver-7f859d5f9d-bd7wb eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali176bb1b4ebd [] []}} ContainerID="03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-bd7wb" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--bd7wb-" Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:06.809 [INFO][4737] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-bd7wb" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--bd7wb-eth0" Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:06.943 [INFO][4765] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" HandleID="k8s-pod-network.03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" Workload="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--bd7wb-eth0" Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:06.998 [INFO][4765] ipam_plugin.go 269: Auto assigning IP ContainerID="03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" HandleID="k8s-pod-network.03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" Workload="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--bd7wb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004db00), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-27-110", "pod":"calico-apiserver-7f859d5f9d-bd7wb", "timestamp":"2023-10-02 19:09:06.943837485 +0000 UTC"}, Hostname:"ip-172-31-27-110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:09:07.549063 env[1629]: time="2023-10-02T19:09:06Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:07.549063 env[1629]: time="2023-10-02T19:09:07Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:07.094 [INFO][4765] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-27-110' Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:07.166 [INFO][4765] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" host="ip-172-31-27-110" Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:07.319 [INFO][4765] ipam.go 372: Looking up existing affinities for host host="ip-172-31-27-110" Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:07.377 [INFO][4765] ipam.go 489: Trying affinity for 192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:07.422 [INFO][4765] ipam.go 155: Attempting to load block cidr=192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:07.445 [INFO][4765] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.22.128/26 host="ip-172-31-27-110" Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:07.445 [INFO][4765] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.22.128/26 handle="k8s-pod-network.03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" host="ip-172-31-27-110" Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:07.453 [INFO][4765] ipam.go 1682: Creating new handle: k8s-pod-network.03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8 Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:07.477 [INFO][4765] ipam.go 1203: Writing block in order to claim IPs block=192.168.22.128/26 handle="k8s-pod-network.03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" host="ip-172-31-27-110" Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:07.490 [INFO][4765] ipam.go 1216: Successfully claimed IPs: [192.168.22.134/26] block=192.168.22.128/26 handle="k8s-pod-network.03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" host="ip-172-31-27-110" Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:07.490 [INFO][4765] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.22.134/26] handle="k8s-pod-network.03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" host="ip-172-31-27-110" Oct 2 19:09:07.549063 env[1629]: time="2023-10-02T19:09:07Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:07.549063 env[1629]: 2023-10-02 19:09:07.491 [INFO][4765] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.22.134/26] IPv6=[] ContainerID="03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" HandleID="k8s-pod-network.03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" Workload="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--bd7wb-eth0" Oct 2 19:09:07.550709 env[1629]: 2023-10-02 19:09:07.494 [INFO][4737] k8s.go 383: Populated endpoint ContainerID="03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-bd7wb" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--bd7wb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--bd7wb-eth0", GenerateName:"calico-apiserver-7f859d5f9d-", Namespace:"calico-apiserver", SelfLink:"", UID:"b6868c13-5bca-4cb2-9e28-81bafb52f718", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f859d5f9d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"", Pod:"calico-apiserver-7f859d5f9d-bd7wb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.22.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali176bb1b4ebd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:07.550709 env[1629]: 2023-10-02 19:09:07.495 [INFO][4737] k8s.go 384: Calico CNI using IPs: [192.168.22.134/32] ContainerID="03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-bd7wb" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--bd7wb-eth0" Oct 2 19:09:07.550709 env[1629]: 2023-10-02 19:09:07.495 [INFO][4737] dataplane_linux.go 68: Setting the host side veth name to cali176bb1b4ebd ContainerID="03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-bd7wb" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--bd7wb-eth0" Oct 2 19:09:07.550709 env[1629]: 2023-10-02 19:09:07.499 [INFO][4737] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-bd7wb" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--bd7wb-eth0" Oct 2 19:09:07.550709 env[1629]: 2023-10-02 19:09:07.506 [INFO][4737] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-bd7wb" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--bd7wb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--bd7wb-eth0", GenerateName:"calico-apiserver-7f859d5f9d-", Namespace:"calico-apiserver", SelfLink:"", UID:"b6868c13-5bca-4cb2-9e28-81bafb52f718", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 9, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f859d5f9d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8", Pod:"calico-apiserver-7f859d5f9d-bd7wb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.22.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali176bb1b4ebd", MAC:"1e:83:c0:87:34:e5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:07.550709 env[1629]: 2023-10-02 19:09:07.547 [INFO][4737] k8s.go 489: Wrote updated endpoint to datastore ContainerID="03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8" Namespace="calico-apiserver" Pod="calico-apiserver-7f859d5f9d-bd7wb" WorkloadEndpoint="ip--172--31--27--110-k8s-calico--apiserver--7f859d5f9d--bd7wb-eth0" Oct 2 19:09:07.575901 env[1629]: time="2023-10-02T19:09:07.575746819Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:09:07.576113 env[1629]: time="2023-10-02T19:09:07.576084592Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:09:07.576225 env[1629]: time="2023-10-02T19:09:07.576197149Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:09:07.576624 env[1629]: time="2023-10-02T19:09:07.576569618Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8 pid=4833 runtime=io.containerd.runc.v2 Oct 2 19:09:07.619147 systemd[1]: Started cri-containerd-03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8.scope. Oct 2 19:09:07.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.110:22-139.178.89.65:34690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:07.674459 systemd[1]: Started sshd@7-172.31.27.110:22-139.178.89.65:34690.service. Oct 2 19:09:07.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.821000 audit: BPF prog-id=183 op=LOAD Oct 2 19:09:07.822000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.822000 audit[4800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4790 pid=4800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963353137626439386464626266356631663533653539303534303031 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4790 pid=4800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963353137626439386464626266356631663533653539303534303031 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit: BPF prog-id=184 op=LOAD Oct 2 19:09:07.824000 audit[4800]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00039b5c0 items=0 ppid=4790 pid=4800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963353137626439386464626266356631663533653539303534303031 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit: BPF prog-id=185 op=LOAD Oct 2 19:09:07.824000 audit[4800]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00039b608 items=0 ppid=4790 pid=4800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963353137626439386464626266356631663533653539303534303031 Oct 2 19:09:07.824000 audit: BPF prog-id=185 op=UNLOAD Oct 2 19:09:07.824000 audit: BPF prog-id=184 op=UNLOAD Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { perfmon } for pid=4800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit[4800]: AVC avc: denied { bpf } for pid=4800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.824000 audit: BPF prog-id=186 op=LOAD Oct 2 19:09:07.824000 audit[4800]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00039ba18 items=0 ppid=4790 pid=4800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963353137626439386464626266356631663533653539303534303031 Oct 2 19:09:07.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.884000 audit: BPF prog-id=187 op=LOAD Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4833 pid=4844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033633861663139306130633437653832303530623238373438333639 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4833 pid=4844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033633861663139306130633437653832303530623238373438333639 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit: BPF prog-id=188 op=LOAD Oct 2 19:09:07.885000 audit[4844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000300350 items=0 ppid=4833 pid=4844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033633861663139306130633437653832303530623238373438333639 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit: BPF prog-id=189 op=LOAD Oct 2 19:09:07.885000 audit[4844]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000300398 items=0 ppid=4833 pid=4844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033633861663139306130633437653832303530623238373438333639 Oct 2 19:09:07.885000 audit: BPF prog-id=189 op=UNLOAD Oct 2 19:09:07.885000 audit: BPF prog-id=188 op=UNLOAD Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:09:07.885000 audit: BPF prog-id=190 op=LOAD Oct 2 19:09:07.885000 audit[4844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003007a8 items=0 ppid=4833 pid=4844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033633861663139306130633437653832303530623238373438333639 Oct 2 19:09:07.939000 audit[4862]: USER_ACCT pid=4862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:07.942000 audit[4862]: CRED_ACQ pid=4862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:07.942907 sshd[4862]: Accepted publickey for core from 139.178.89.65 port 34690 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:07.943000 audit[4862]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff96269d70 a2=3 a3=0 items=0 ppid=1 pid=4862 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:07.943000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:07.946171 sshd[4862]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:07.959318 systemd-logind[1622]: New session 8 of user core. Oct 2 19:09:07.960694 systemd[1]: Started session-8.scope. Oct 2 19:09:07.971000 audit[4862]: USER_START pid=4862 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:07.974000 audit[4895]: CRED_ACQ pid=4895 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:08.102020 env[1629]: time="2023-10-02T19:09:08.101873580Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f859d5f9d-fxhq2,Uid:44598139-27c6-4881-91a3-2a8dabdec898,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"9c517bd98ddbbf5f1f53e59054001b47c54ee1abe33cd7c3f5381b972694a9e3\"" Oct 2 19:09:08.108465 env[1629]: time="2023-10-02T19:09:08.108427431Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:09:08.141020 env[1629]: time="2023-10-02T19:09:08.140961640Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f859d5f9d-bd7wb,Uid:b6868c13-5bca-4cb2-9e28-81bafb52f718,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8\"" Oct 2 19:09:08.201000 audit[4923]: NETFILTER_CFG table=filter:117 family=2 entries=91 op=nft_register_chain pid=4923 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:09:08.201000 audit[4923]: SYSCALL arch=c000003e syscall=46 success=yes exit=48956 a0=3 a1=7ffd478847e0 a2=0 a3=7ffd478847cc items=0 ppid=3924 pid=4923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:08.201000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:09:08.211302 systemd-networkd[1447]: cali5fce88ccbce: Gained IPv6LL Oct 2 19:09:08.327346 env[1629]: time="2023-10-02T19:09:08.327266438Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:08.329407 env[1629]: time="2023-10-02T19:09:08.329325111Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:08.329693 kubelet[2903]: E1002 19:09:08.329666 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:08.330491 kubelet[2903]: E1002 19:09:08.329716 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:08.330774 env[1629]: time="2023-10-02T19:09:08.330741040Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:09:08.331571 kubelet[2903]: E1002 19:09:08.331327 2903 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-65h4q,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7f859d5f9d-fxhq2_calico-apiserver(44598139-27c6-4881-91a3-2a8dabdec898): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:08.331571 kubelet[2903]: E1002 19:09:08.331530 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-fxhq2" podUID="44598139-27c6-4881-91a3-2a8dabdec898" Oct 2 19:09:08.528854 sshd[4862]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:08.529343 systemd[1]: run-containerd-runc-k8s.io-03c8af190a0c47e82050b287483695c6d333d2165369d8a6f782b1c20df03ed8-runc.oRMxEc.mount: Deactivated successfully. Oct 2 19:09:08.532000 audit[4862]: USER_END pid=4862 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:08.532000 audit[4862]: CRED_DISP pid=4862 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:08.535173 systemd[1]: sshd@7-172.31.27.110:22-139.178.89.65:34690.service: Deactivated successfully. Oct 2 19:09:08.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.27.110:22-139.178.89.65:34690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:08.536807 env[1629]: time="2023-10-02T19:09:08.536582468Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:08.536717 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:09:08.537868 systemd-logind[1622]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:09:08.539454 kubelet[2903]: E1002 19:09:08.538986 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:08.539454 kubelet[2903]: E1002 19:09:08.539030 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:08.539587 env[1629]: time="2023-10-02T19:09:08.538457832Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:08.539701 kubelet[2903]: E1002 19:09:08.539669 2903 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-w8glq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7f859d5f9d-bd7wb_calico-apiserver(b6868c13-5bca-4cb2-9e28-81bafb52f718): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:08.539850 kubelet[2903]: E1002 19:09:08.539750 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-bd7wb" podUID="b6868c13-5bca-4cb2-9e28-81bafb52f718" Oct 2 19:09:08.540961 systemd-logind[1622]: Removed session 8. Oct 2 19:09:08.740781 env[1629]: time="2023-10-02T19:09:08.740733645Z" level=info msg="StopPodSandbox for \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\"" Oct 2 19:09:08.872228 env[1629]: 2023-10-02 19:09:08.806 [WARNING][4940] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ade4b6df-b8e6-4e5c-8373-7c3c92757aec", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b", Pod:"csi-node-driver-wcmgn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.22.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali933176b8050", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:08.872228 env[1629]: 2023-10-02 19:09:08.806 [INFO][4940] k8s.go 576: Cleaning up netns ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Oct 2 19:09:08.872228 env[1629]: 2023-10-02 19:09:08.806 [INFO][4940] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" iface="eth0" netns="" Oct 2 19:09:08.872228 env[1629]: 2023-10-02 19:09:08.806 [INFO][4940] k8s.go 583: Releasing IP address(es) ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Oct 2 19:09:08.872228 env[1629]: 2023-10-02 19:09:08.806 [INFO][4940] utils.go 196: Calico CNI releasing IP address ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Oct 2 19:09:08.872228 env[1629]: 2023-10-02 19:09:08.857 [INFO][4946] ipam_plugin.go 416: Releasing address using handleID ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" HandleID="k8s-pod-network.d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Workload="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:09:08.872228 env[1629]: time="2023-10-02T19:09:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:08.872228 env[1629]: time="2023-10-02T19:09:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:08.872228 env[1629]: 2023-10-02 19:09:08.864 [WARNING][4946] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" HandleID="k8s-pod-network.d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Workload="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:09:08.872228 env[1629]: 2023-10-02 19:09:08.864 [INFO][4946] ipam_plugin.go 444: Releasing address using workloadID ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" HandleID="k8s-pod-network.d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Workload="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:09:08.872228 env[1629]: time="2023-10-02T19:09:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:08.872228 env[1629]: 2023-10-02 19:09:08.868 [INFO][4940] k8s.go 589: Teardown processing complete. ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Oct 2 19:09:08.872228 env[1629]: time="2023-10-02T19:09:08.870995120Z" level=info msg="TearDown network for sandbox \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\" successfully" Oct 2 19:09:08.872228 env[1629]: time="2023-10-02T19:09:08.871035403Z" level=info msg="StopPodSandbox for \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\" returns successfully" Oct 2 19:09:08.873010 env[1629]: time="2023-10-02T19:09:08.872674909Z" level=info msg="RemovePodSandbox for \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\"" Oct 2 19:09:08.873010 env[1629]: time="2023-10-02T19:09:08.872717787Z" level=info msg="Forcibly stopping sandbox \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\"" Oct 2 19:09:08.888132 systemd-networkd[1447]: cali176bb1b4ebd: Gained IPv6LL Oct 2 19:09:08.996447 env[1629]: 2023-10-02 19:09:08.936 [WARNING][4964] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ade4b6df-b8e6-4e5c-8373-7c3c92757aec", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"9f1e40547cf74b0869794d983e56611977332e7740c5d7399986133118eaa02b", Pod:"csi-node-driver-wcmgn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.22.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali933176b8050", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:08.996447 env[1629]: 2023-10-02 19:09:08.936 [INFO][4964] k8s.go 576: Cleaning up netns ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Oct 2 19:09:08.996447 env[1629]: 2023-10-02 19:09:08.936 [INFO][4964] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" iface="eth0" netns="" Oct 2 19:09:08.996447 env[1629]: 2023-10-02 19:09:08.936 [INFO][4964] k8s.go 583: Releasing IP address(es) ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Oct 2 19:09:08.996447 env[1629]: 2023-10-02 19:09:08.937 [INFO][4964] utils.go 196: Calico CNI releasing IP address ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Oct 2 19:09:08.996447 env[1629]: 2023-10-02 19:09:08.975 [INFO][4970] ipam_plugin.go 416: Releasing address using handleID ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" HandleID="k8s-pod-network.d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Workload="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:09:08.996447 env[1629]: time="2023-10-02T19:09:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:08.996447 env[1629]: time="2023-10-02T19:09:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:08.996447 env[1629]: 2023-10-02 19:09:08.985 [WARNING][4970] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" HandleID="k8s-pod-network.d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Workload="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:09:08.996447 env[1629]: 2023-10-02 19:09:08.986 [INFO][4970] ipam_plugin.go 444: Releasing address using workloadID ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" HandleID="k8s-pod-network.d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Workload="ip--172--31--27--110-k8s-csi--node--driver--wcmgn-eth0" Oct 2 19:09:08.996447 env[1629]: time="2023-10-02T19:09:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:08.996447 env[1629]: 2023-10-02 19:09:08.992 [INFO][4964] k8s.go 589: Teardown processing complete. ContainerID="d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b" Oct 2 19:09:08.997257 env[1629]: time="2023-10-02T19:09:08.996545718Z" level=info msg="TearDown network for sandbox \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\" successfully" Oct 2 19:09:09.005140 env[1629]: time="2023-10-02T19:09:09.005082920Z" level=info msg="RemovePodSandbox \"d984affe4fe70d23243d53b6af8c173e755922f8b3f6414ed6dc4e04856c122b\" returns successfully" Oct 2 19:09:09.006193 env[1629]: time="2023-10-02T19:09:09.006159757Z" level=info msg="StopPodSandbox for \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\"" Oct 2 19:09:09.117334 env[1629]: 2023-10-02 19:09:09.062 [WARNING][4988] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"10d7547d-1645-49b4-95f4-d942f1774dd9", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658", Pod:"coredns-5dd5756b68-2kpgn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.22.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali770c6c992dd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:09.117334 env[1629]: 2023-10-02 19:09:09.064 [INFO][4988] k8s.go 576: Cleaning up netns ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Oct 2 19:09:09.117334 env[1629]: 2023-10-02 19:09:09.064 [INFO][4988] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" iface="eth0" netns="" Oct 2 19:09:09.117334 env[1629]: 2023-10-02 19:09:09.064 [INFO][4988] k8s.go 583: Releasing IP address(es) ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Oct 2 19:09:09.117334 env[1629]: 2023-10-02 19:09:09.064 [INFO][4988] utils.go 196: Calico CNI releasing IP address ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Oct 2 19:09:09.117334 env[1629]: 2023-10-02 19:09:09.100 [INFO][4994] ipam_plugin.go 416: Releasing address using handleID ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" HandleID="k8s-pod-network.d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:09:09.117334 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:09.117334 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:09.117334 env[1629]: 2023-10-02 19:09:09.108 [WARNING][4994] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" HandleID="k8s-pod-network.d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:09:09.117334 env[1629]: 2023-10-02 19:09:09.109 [INFO][4994] ipam_plugin.go 444: Releasing address using workloadID ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" HandleID="k8s-pod-network.d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:09:09.117334 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:09.117334 env[1629]: 2023-10-02 19:09:09.115 [INFO][4988] k8s.go 589: Teardown processing complete. ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Oct 2 19:09:09.118657 env[1629]: time="2023-10-02T19:09:09.117406767Z" level=info msg="TearDown network for sandbox \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\" successfully" Oct 2 19:09:09.118657 env[1629]: time="2023-10-02T19:09:09.117444931Z" level=info msg="StopPodSandbox for \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\" returns successfully" Oct 2 19:09:09.118657 env[1629]: time="2023-10-02T19:09:09.118135616Z" level=info msg="RemovePodSandbox for \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\"" Oct 2 19:09:09.118657 env[1629]: time="2023-10-02T19:09:09.118177487Z" level=info msg="Forcibly stopping sandbox \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\"" Oct 2 19:09:09.177694 kubelet[2903]: E1002 19:09:09.177511 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-fxhq2" podUID="44598139-27c6-4881-91a3-2a8dabdec898" Oct 2 19:09:09.178090 kubelet[2903]: E1002 19:09:09.178071 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-bd7wb" podUID="b6868c13-5bca-4cb2-9e28-81bafb52f718" Oct 2 19:09:09.315838 env[1629]: 2023-10-02 19:09:09.206 [WARNING][5012] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"10d7547d-1645-49b4-95f4-d942f1774dd9", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"a47c63bbe27dc4c94ce7b2cee3da4eb34c34791b16fd6f61e65c8aff0622f658", Pod:"coredns-5dd5756b68-2kpgn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.22.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali770c6c992dd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:09.315838 env[1629]: 2023-10-02 19:09:09.207 [INFO][5012] k8s.go 576: Cleaning up netns ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Oct 2 19:09:09.315838 env[1629]: 2023-10-02 19:09:09.207 [INFO][5012] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" iface="eth0" netns="" Oct 2 19:09:09.315838 env[1629]: 2023-10-02 19:09:09.207 [INFO][5012] k8s.go 583: Releasing IP address(es) ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Oct 2 19:09:09.315838 env[1629]: 2023-10-02 19:09:09.207 [INFO][5012] utils.go 196: Calico CNI releasing IP address ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Oct 2 19:09:09.315838 env[1629]: 2023-10-02 19:09:09.265 [INFO][5019] ipam_plugin.go 416: Releasing address using handleID ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" HandleID="k8s-pod-network.d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:09:09.315838 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:09.315838 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:09.315838 env[1629]: 2023-10-02 19:09:09.294 [WARNING][5019] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" HandleID="k8s-pod-network.d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:09:09.315838 env[1629]: 2023-10-02 19:09:09.294 [INFO][5019] ipam_plugin.go 444: Releasing address using workloadID ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" HandleID="k8s-pod-network.d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--2kpgn-eth0" Oct 2 19:09:09.315838 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:09.315838 env[1629]: 2023-10-02 19:09:09.313 [INFO][5012] k8s.go 589: Teardown processing complete. ContainerID="d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f" Oct 2 19:09:09.316849 env[1629]: time="2023-10-02T19:09:09.316809399Z" level=info msg="TearDown network for sandbox \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\" successfully" Oct 2 19:09:09.324532 env[1629]: time="2023-10-02T19:09:09.324291003Z" level=info msg="RemovePodSandbox \"d2d0591d641cf0a0ba7ea115ece0b6b45ae28e91f0d1ffed3dc22b8f7ea5cb0f\" returns successfully" Oct 2 19:09:09.325646 env[1629]: time="2023-10-02T19:09:09.325607928Z" level=info msg="StopPodSandbox for \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\"" Oct 2 19:09:09.336000 audit[5035]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=5035 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:09.336000 audit[5035]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fffa8384c20 a2=0 a3=7fffa8384c0c items=0 ppid=3044 pid=5035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:09.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:09.338000 audit[5035]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=5035 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:09.338000 audit[5035]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fffa8384c20 a2=0 a3=7fffa8384c0c items=0 ppid=3044 pid=5035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:09.338000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:09.374000 audit[5046]: NETFILTER_CFG table=filter:120 family=2 entries=10 op=nft_register_rule pid=5046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:09.374000 audit[5046]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd60315ab0 a2=0 a3=7ffd60315a9c items=0 ppid=3044 pid=5046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:09.374000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:09.377000 audit[5046]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=5046 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:09:09.377000 audit[5046]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd60315ab0 a2=0 a3=7ffd60315a9c items=0 ppid=3044 pid=5046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:09.377000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:09:09.467744 env[1629]: 2023-10-02 19:09:09.415 [WARNING][5041] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"0a8e8c39-7baf-4dd4-a860-89fe78651ce1", ResourceVersion:"748", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf", Pod:"calico-kube-controllers-74b9887bb6-9hf9m", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.22.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali53c33cdf3bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:09.467744 env[1629]: 2023-10-02 19:09:09.416 [INFO][5041] k8s.go 576: Cleaning up netns ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Oct 2 19:09:09.467744 env[1629]: 2023-10-02 19:09:09.416 [INFO][5041] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" iface="eth0" netns="" Oct 2 19:09:09.467744 env[1629]: 2023-10-02 19:09:09.416 [INFO][5041] k8s.go 583: Releasing IP address(es) ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Oct 2 19:09:09.467744 env[1629]: 2023-10-02 19:09:09.416 [INFO][5041] utils.go 196: Calico CNI releasing IP address ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Oct 2 19:09:09.467744 env[1629]: 2023-10-02 19:09:09.451 [INFO][5049] ipam_plugin.go 416: Releasing address using handleID ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" HandleID="k8s-pod-network.b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Workload="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:09:09.467744 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:09.467744 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:09.467744 env[1629]: 2023-10-02 19:09:09.462 [WARNING][5049] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" HandleID="k8s-pod-network.b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Workload="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:09:09.467744 env[1629]: 2023-10-02 19:09:09.462 [INFO][5049] ipam_plugin.go 444: Releasing address using workloadID ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" HandleID="k8s-pod-network.b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Workload="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:09:09.467744 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:09.467744 env[1629]: 2023-10-02 19:09:09.465 [INFO][5041] k8s.go 589: Teardown processing complete. ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Oct 2 19:09:09.469744 env[1629]: time="2023-10-02T19:09:09.467721923Z" level=info msg="TearDown network for sandbox \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\" successfully" Oct 2 19:09:09.469861 env[1629]: time="2023-10-02T19:09:09.469759179Z" level=info msg="StopPodSandbox for \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\" returns successfully" Oct 2 19:09:09.470706 env[1629]: time="2023-10-02T19:09:09.470667421Z" level=info msg="RemovePodSandbox for \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\"" Oct 2 19:09:09.470809 env[1629]: time="2023-10-02T19:09:09.470712320Z" level=info msg="Forcibly stopping sandbox \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\"" Oct 2 19:09:09.587098 env[1629]: 2023-10-02 19:09:09.533 [WARNING][5067] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"0a8e8c39-7baf-4dd4-a860-89fe78651ce1", ResourceVersion:"748", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"440e3f8043799a6682d8ac13fd55b4eac9d85b1c82389a1183891a0505ad13bf", Pod:"calico-kube-controllers-74b9887bb6-9hf9m", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.22.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali53c33cdf3bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:09.587098 env[1629]: 2023-10-02 19:09:09.535 [INFO][5067] k8s.go 576: Cleaning up netns ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Oct 2 19:09:09.587098 env[1629]: 2023-10-02 19:09:09.536 [INFO][5067] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" iface="eth0" netns="" Oct 2 19:09:09.587098 env[1629]: 2023-10-02 19:09:09.536 [INFO][5067] k8s.go 583: Releasing IP address(es) ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Oct 2 19:09:09.587098 env[1629]: 2023-10-02 19:09:09.536 [INFO][5067] utils.go 196: Calico CNI releasing IP address ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Oct 2 19:09:09.587098 env[1629]: 2023-10-02 19:09:09.573 [INFO][5073] ipam_plugin.go 416: Releasing address using handleID ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" HandleID="k8s-pod-network.b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Workload="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:09:09.587098 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:09.587098 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:09.587098 env[1629]: 2023-10-02 19:09:09.580 [WARNING][5073] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" HandleID="k8s-pod-network.b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Workload="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:09:09.587098 env[1629]: 2023-10-02 19:09:09.580 [INFO][5073] ipam_plugin.go 444: Releasing address using workloadID ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" HandleID="k8s-pod-network.b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Workload="ip--172--31--27--110-k8s-calico--kube--controllers--74b9887bb6--9hf9m-eth0" Oct 2 19:09:09.587098 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:09.587098 env[1629]: 2023-10-02 19:09:09.584 [INFO][5067] k8s.go 589: Teardown processing complete. ContainerID="b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd" Oct 2 19:09:09.587896 env[1629]: time="2023-10-02T19:09:09.587146123Z" level=info msg="TearDown network for sandbox \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\" successfully" Oct 2 19:09:09.593796 env[1629]: time="2023-10-02T19:09:09.593751818Z" level=info msg="RemovePodSandbox \"b3fc1d3c70ec5c7e2e06016d83c8608784ca34a00df9839607897b66ecaa66cd\" returns successfully" Oct 2 19:09:09.594622 env[1629]: time="2023-10-02T19:09:09.594590202Z" level=info msg="StopPodSandbox for \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\"" Oct 2 19:09:09.724843 env[1629]: 2023-10-02 19:09:09.668 [WARNING][5092] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"96b96afe-e737-4867-b90f-186c15658085", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403", Pod:"coredns-5dd5756b68-gqflr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.22.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3d9a7d3238d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:09.724843 env[1629]: 2023-10-02 19:09:09.669 [INFO][5092] k8s.go 576: Cleaning up netns ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Oct 2 19:09:09.724843 env[1629]: 2023-10-02 19:09:09.669 [INFO][5092] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" iface="eth0" netns="" Oct 2 19:09:09.724843 env[1629]: 2023-10-02 19:09:09.669 [INFO][5092] k8s.go 583: Releasing IP address(es) ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Oct 2 19:09:09.724843 env[1629]: 2023-10-02 19:09:09.669 [INFO][5092] utils.go 196: Calico CNI releasing IP address ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Oct 2 19:09:09.724843 env[1629]: 2023-10-02 19:09:09.704 [INFO][5098] ipam_plugin.go 416: Releasing address using handleID ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" HandleID="k8s-pod-network.fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:09:09.724843 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:09.724843 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:09.724843 env[1629]: 2023-10-02 19:09:09.715 [WARNING][5098] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" HandleID="k8s-pod-network.fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:09:09.724843 env[1629]: 2023-10-02 19:09:09.715 [INFO][5098] ipam_plugin.go 444: Releasing address using workloadID ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" HandleID="k8s-pod-network.fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:09:09.724843 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:09.724843 env[1629]: 2023-10-02 19:09:09.721 [INFO][5092] k8s.go 589: Teardown processing complete. ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Oct 2 19:09:09.724843 env[1629]: time="2023-10-02T19:09:09.723598223Z" level=info msg="TearDown network for sandbox \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\" successfully" Oct 2 19:09:09.724843 env[1629]: time="2023-10-02T19:09:09.723634953Z" level=info msg="StopPodSandbox for \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\" returns successfully" Oct 2 19:09:09.726082 env[1629]: time="2023-10-02T19:09:09.726047367Z" level=info msg="RemovePodSandbox for \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\"" Oct 2 19:09:09.726669 env[1629]: time="2023-10-02T19:09:09.726085948Z" level=info msg="Forcibly stopping sandbox \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\"" Oct 2 19:09:09.885806 env[1629]: 2023-10-02 19:09:09.821 [WARNING][5117] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"96b96afe-e737-4867-b90f-186c15658085", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 8, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-27-110", ContainerID:"18429ef97e6548a27ce25c947b3d871e424d29a97c4debf6e014d7dde4429403", Pod:"coredns-5dd5756b68-gqflr", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.22.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3d9a7d3238d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:09:09.885806 env[1629]: 2023-10-02 19:09:09.824 [INFO][5117] k8s.go 576: Cleaning up netns ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Oct 2 19:09:09.885806 env[1629]: 2023-10-02 19:09:09.824 [INFO][5117] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" iface="eth0" netns="" Oct 2 19:09:09.885806 env[1629]: 2023-10-02 19:09:09.824 [INFO][5117] k8s.go 583: Releasing IP address(es) ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Oct 2 19:09:09.885806 env[1629]: 2023-10-02 19:09:09.824 [INFO][5117] utils.go 196: Calico CNI releasing IP address ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Oct 2 19:09:09.885806 env[1629]: 2023-10-02 19:09:09.863 [INFO][5123] ipam_plugin.go 416: Releasing address using handleID ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" HandleID="k8s-pod-network.fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:09:09.885806 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:09:09.885806 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:09:09.885806 env[1629]: 2023-10-02 19:09:09.874 [WARNING][5123] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" HandleID="k8s-pod-network.fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:09:09.885806 env[1629]: 2023-10-02 19:09:09.874 [INFO][5123] ipam_plugin.go 444: Releasing address using workloadID ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" HandleID="k8s-pod-network.fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Workload="ip--172--31--27--110-k8s-coredns--5dd5756b68--gqflr-eth0" Oct 2 19:09:09.885806 env[1629]: time="2023-10-02T19:09:09Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:09:09.885806 env[1629]: 2023-10-02 19:09:09.882 [INFO][5117] k8s.go 589: Teardown processing complete. ContainerID="fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3" Oct 2 19:09:09.885806 env[1629]: time="2023-10-02T19:09:09.885022990Z" level=info msg="TearDown network for sandbox \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\" successfully" Oct 2 19:09:09.901704 env[1629]: time="2023-10-02T19:09:09.901555667Z" level=info msg="RemovePodSandbox \"fe51f8a5b8f0605ae7c9fbce05310a3a76984bfd2eeb574c4b2f45f4fb7369f3\" returns successfully" Oct 2 19:09:11.977852 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.s2yNfb.mount: Deactivated successfully. Oct 2 19:09:12.045304 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.ghIbGX.mount: Deactivated successfully. Oct 2 19:09:14.690444 env[1629]: time="2023-10-02T19:09:14.689801332Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:09:14.904674 env[1629]: time="2023-10-02T19:09:14.904592230Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:14.906710 env[1629]: time="2023-10-02T19:09:14.906645086Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:14.906996 kubelet[2903]: E1002 19:09:14.906970 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:09:14.907425 kubelet[2903]: E1002 19:09:14.907023 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:09:14.907425 kubelet[2903]: E1002 19:09:14.907180 2903 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-2z2zp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wcmgn_calico-system(ade4b6df-b8e6-4e5c-8373-7c3c92757aec): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:14.909787 env[1629]: time="2023-10-02T19:09:14.909748689Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:09:15.121600 env[1629]: time="2023-10-02T19:09:15.120883975Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:15.122800 env[1629]: time="2023-10-02T19:09:15.122747867Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:15.123231 kubelet[2903]: E1002 19:09:15.123196 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:15.123367 kubelet[2903]: E1002 19:09:15.123257 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:15.123465 kubelet[2903]: E1002 19:09:15.123388 2903 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-2z2zp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wcmgn_calico-system(ade4b6df-b8e6-4e5c-8373-7c3c92757aec): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:15.123465 kubelet[2903]: E1002 19:09:15.123457 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-wcmgn" podUID="ade4b6df-b8e6-4e5c-8373-7c3c92757aec" Oct 2 19:09:17.619786 systemd[1]: run-containerd-runc-k8s.io-bafed02af36894ab4793e078b0c497d98d72569336fcbeff720dcbf9b95f7b55-runc.Oa5fOe.mount: Deactivated successfully. Oct 2 19:09:18.556359 systemd[1]: Started sshd@8-172.31.27.110:22-139.178.89.65:39000.service. Oct 2 19:09:18.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.110:22-139.178.89.65:39000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:18.568111 kernel: kauditd_printk_skb: 142 callbacks suppressed Oct 2 19:09:18.568290 kernel: audit: type=1130 audit(1696273758.556:1354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.110:22-139.178.89.65:39000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:18.763000 audit[5196]: USER_ACCT pid=5196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:18.766839 sshd[5196]: Accepted publickey for core from 139.178.89.65 port 39000 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:18.778000 audit[5196]: CRED_ACQ pid=5196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:18.783202 sshd[5196]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:18.799886 systemd[1]: Started session-9.scope. Oct 2 19:09:18.801113 kernel: audit: type=1101 audit(1696273758.763:1355): pid=5196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:18.801170 kernel: audit: type=1103 audit(1696273758.778:1356): pid=5196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:18.801673 kernel: audit: type=1006 audit(1696273758.779:1357): pid=5196 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Oct 2 19:09:18.801261 systemd-logind[1622]: New session 9 of user core. Oct 2 19:09:18.779000 audit[5196]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4b7ec600 a2=3 a3=0 items=0 ppid=1 pid=5196 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:18.814346 kernel: audit: type=1300 audit(1696273758.779:1357): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4b7ec600 a2=3 a3=0 items=0 ppid=1 pid=5196 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:18.779000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:18.812000 audit[5196]: USER_START pid=5196 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:18.826236 kernel: audit: type=1327 audit(1696273758.779:1357): proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:18.826359 kernel: audit: type=1105 audit(1696273758.812:1358): pid=5196 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:18.826459 kernel: audit: type=1103 audit(1696273758.816:1359): pid=5198 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:18.816000 audit[5198]: CRED_ACQ pid=5198 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:19.068178 sshd[5196]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:19.068000 audit[5196]: USER_END pid=5196 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:19.079440 kernel: audit: type=1106 audit(1696273759.068:1360): pid=5196 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:19.073071 systemd-logind[1622]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:09:19.076353 systemd[1]: sshd@8-172.31.27.110:22-139.178.89.65:39000.service: Deactivated successfully. Oct 2 19:09:19.077734 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:09:19.079897 systemd-logind[1622]: Removed session 9. Oct 2 19:09:19.068000 audit[5196]: CRED_DISP pid=5196 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:19.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.27.110:22-139.178.89.65:39000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:19.087414 kernel: audit: type=1104 audit(1696273759.068:1361): pid=5196 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:21.977060 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.sIvwvs.mount: Deactivated successfully. Oct 2 19:09:22.036908 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.bMtx3u.mount: Deactivated successfully. Oct 2 19:09:22.691155 env[1629]: time="2023-10-02T19:09:22.691104793Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:09:22.878155 env[1629]: time="2023-10-02T19:09:22.878073495Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:22.880034 env[1629]: time="2023-10-02T19:09:22.879973855Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:22.880667 kubelet[2903]: E1002 19:09:22.880641 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:22.881094 kubelet[2903]: E1002 19:09:22.880690 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:22.881149 env[1629]: time="2023-10-02T19:09:22.881083172Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:09:22.883272 kubelet[2903]: E1002 19:09:22.883245 2903 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-65h4q,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7f859d5f9d-fxhq2_calico-apiserver(44598139-27c6-4881-91a3-2a8dabdec898): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:22.883611 kubelet[2903]: E1002 19:09:22.883580 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-fxhq2" podUID="44598139-27c6-4881-91a3-2a8dabdec898" Oct 2 19:09:23.074765 env[1629]: time="2023-10-02T19:09:23.074609929Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:23.076487 env[1629]: time="2023-10-02T19:09:23.076429563Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:23.076824 kubelet[2903]: E1002 19:09:23.076798 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:23.076950 kubelet[2903]: E1002 19:09:23.076847 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:23.077515 kubelet[2903]: E1002 19:09:23.077491 2903 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-w8glq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7f859d5f9d-bd7wb_calico-apiserver(b6868c13-5bca-4cb2-9e28-81bafb52f718): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:23.077857 kubelet[2903]: E1002 19:09:23.077561 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-bd7wb" podUID="b6868c13-5bca-4cb2-9e28-81bafb52f718" Oct 2 19:09:27.668269 systemd[1]: run-containerd-runc-k8s.io-bafed02af36894ab4793e078b0c497d98d72569336fcbeff720dcbf9b95f7b55-runc.1tFk6b.mount: Deactivated successfully. Oct 2 19:09:27.709765 kubelet[2903]: E1002 19:09:27.709731 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-wcmgn" podUID="ade4b6df-b8e6-4e5c-8373-7c3c92757aec" Oct 2 19:09:29.108490 systemd[1]: Started sshd@9-172.31.27.110:22-139.178.89.65:35296.service. Oct 2 19:09:29.118003 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:09:29.118118 kernel: audit: type=1130 audit(1696273769.108:1363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.110:22-139.178.89.65:35296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:29.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.110:22-139.178.89.65:35296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:29.290000 audit[5284]: USER_ACCT pid=5284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.293556 sshd[5284]: Accepted publickey for core from 139.178.89.65 port 35296 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:29.297000 audit[5284]: CRED_ACQ pid=5284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.299308 sshd[5284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:29.305088 kernel: audit: type=1101 audit(1696273769.290:1364): pid=5284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.305193 kernel: audit: type=1103 audit(1696273769.297:1365): pid=5284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.305226 kernel: audit: type=1006 audit(1696273769.297:1366): pid=5284 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 19:09:29.306890 systemd[1]: Started session-10.scope. Oct 2 19:09:29.309508 kernel: audit: type=1300 audit(1696273769.297:1366): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd294e8b0 a2=3 a3=0 items=0 ppid=1 pid=5284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:29.297000 audit[5284]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd294e8b0 a2=3 a3=0 items=0 ppid=1 pid=5284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:29.309740 systemd-logind[1622]: New session 10 of user core. Oct 2 19:09:29.297000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:29.319444 kernel: audit: type=1327 audit(1696273769.297:1366): proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:29.315000 audit[5284]: USER_START pid=5284 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.318000 audit[5286]: CRED_ACQ pid=5286 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.333453 kernel: audit: type=1105 audit(1696273769.315:1367): pid=5284 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.333565 kernel: audit: type=1103 audit(1696273769.318:1368): pid=5286 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.570490 sshd[5284]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:29.570000 audit[5284]: USER_END pid=5284 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.577568 systemd[1]: sshd@9-172.31.27.110:22-139.178.89.65:35296.service: Deactivated successfully. Oct 2 19:09:29.578880 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:09:29.570000 audit[5284]: CRED_DISP pid=5284 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.581723 systemd-logind[1622]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:09:29.583118 systemd-logind[1622]: Removed session 10. Oct 2 19:09:29.586700 kernel: audit: type=1106 audit(1696273769.570:1369): pid=5284 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.586828 kernel: audit: type=1104 audit(1696273769.570:1370): pid=5284 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.27.110:22-139.178.89.65:35296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:29.619208 systemd[1]: Started sshd@10-172.31.27.110:22-139.178.89.65:35312.service. Oct 2 19:09:29.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.110:22-139.178.89.65:35312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:29.789000 audit[5297]: USER_ACCT pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.791456 sshd[5297]: Accepted publickey for core from 139.178.89.65 port 35312 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:29.792000 audit[5297]: CRED_ACQ pid=5297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.793000 audit[5297]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffceb856d0 a2=3 a3=0 items=0 ppid=1 pid=5297 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:29.793000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:29.795517 sshd[5297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:29.804218 systemd[1]: Started session-11.scope. Oct 2 19:09:29.805157 systemd-logind[1622]: New session 11 of user core. Oct 2 19:09:29.818000 audit[5297]: USER_START pid=5297 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:29.822000 audit[5299]: CRED_ACQ pid=5299 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:30.556683 sshd[5297]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:30.568000 audit[5297]: USER_END pid=5297 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:30.569000 audit[5297]: CRED_DISP pid=5297 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:30.581617 systemd[1]: Started sshd@11-172.31.27.110:22-139.178.89.65:35320.service. Oct 2 19:09:30.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.110:22-139.178.89.65:35320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:30.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.27.110:22-139.178.89.65:35312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:30.588121 systemd[1]: sshd@10-172.31.27.110:22-139.178.89.65:35312.service: Deactivated successfully. Oct 2 19:09:30.589622 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:09:30.597360 systemd-logind[1622]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:09:30.602787 systemd-logind[1622]: Removed session 11. Oct 2 19:09:30.790000 audit[5306]: USER_ACCT pid=5306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:30.792149 sshd[5306]: Accepted publickey for core from 139.178.89.65 port 35320 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:30.792000 audit[5306]: CRED_ACQ pid=5306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:30.792000 audit[5306]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd208ea50 a2=3 a3=0 items=0 ppid=1 pid=5306 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:30.792000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:30.795349 sshd[5306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:30.803232 systemd[1]: Started session-12.scope. Oct 2 19:09:30.804589 systemd-logind[1622]: New session 12 of user core. Oct 2 19:09:30.811000 audit[5306]: USER_START pid=5306 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:30.814000 audit[5309]: CRED_ACQ pid=5309 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:31.054222 sshd[5306]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:31.055000 audit[5306]: USER_END pid=5306 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:31.056000 audit[5306]: CRED_DISP pid=5306 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:31.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.27.110:22-139.178.89.65:35320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:31.061258 systemd[1]: sshd@11-172.31.27.110:22-139.178.89.65:35320.service: Deactivated successfully. Oct 2 19:09:31.062367 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:09:31.063856 systemd-logind[1622]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:09:31.064996 systemd-logind[1622]: Removed session 12. Oct 2 19:09:31.958446 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.dK79Os.mount: Deactivated successfully. Oct 2 19:09:32.944329 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.sl59O7.mount: Deactivated successfully. Oct 2 19:09:34.692103 kubelet[2903]: E1002 19:09:34.692072 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-fxhq2" podUID="44598139-27c6-4881-91a3-2a8dabdec898" Oct 2 19:09:37.655331 systemd[1]: run-containerd-runc-k8s.io-bafed02af36894ab4793e078b0c497d98d72569336fcbeff720dcbf9b95f7b55-runc.58oQQv.mount: Deactivated successfully. Oct 2 19:09:37.691927 kubelet[2903]: E1002 19:09:37.691894 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-bd7wb" podUID="b6868c13-5bca-4cb2-9e28-81bafb52f718" Oct 2 19:09:41.083287 systemd[1]: Started sshd@12-172.31.27.110:22-139.178.89.65:37448.service. Oct 2 19:09:41.092776 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:09:41.092913 kernel: audit: type=1130 audit(1696273781.083:1390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.110:22-139.178.89.65:37448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:41.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.110:22-139.178.89.65:37448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:41.252000 audit[5388]: USER_ACCT pid=5388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:41.261208 sshd[5388]: Accepted publickey for core from 139.178.89.65 port 37448 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:41.261681 kernel: audit: type=1101 audit(1696273781.252:1391): pid=5388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:41.261000 audit[5388]: CRED_ACQ pid=5388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:41.262688 sshd[5388]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:41.271838 kernel: audit: type=1103 audit(1696273781.261:1392): pid=5388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:41.274768 systemd[1]: Started session-13.scope. Oct 2 19:09:41.276789 systemd-logind[1622]: New session 13 of user core. Oct 2 19:09:41.261000 audit[5388]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5fb1b800 a2=3 a3=0 items=0 ppid=1 pid=5388 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:41.285469 kernel: audit: type=1006 audit(1696273781.261:1393): pid=5388 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 2 19:09:41.285645 kernel: audit: type=1300 audit(1696273781.261:1393): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5fb1b800 a2=3 a3=0 items=0 ppid=1 pid=5388 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:41.261000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:41.299661 kernel: audit: type=1327 audit(1696273781.261:1393): proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:41.312000 audit[5388]: USER_START pid=5388 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:41.322466 kernel: audit: type=1105 audit(1696273781.312:1394): pid=5388 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:41.322000 audit[5390]: CRED_ACQ pid=5390 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:41.331410 kernel: audit: type=1103 audit(1696273781.322:1395): pid=5390 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:41.534804 sshd[5388]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:41.537000 audit[5388]: USER_END pid=5388 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:41.555586 kernel: audit: type=1106 audit(1696273781.537:1396): pid=5388 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:41.555730 kernel: audit: type=1104 audit(1696273781.551:1397): pid=5388 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:41.551000 audit[5388]: CRED_DISP pid=5388 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:41.561543 systemd-logind[1622]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:09:41.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.27.110:22-139.178.89.65:37448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:41.565449 systemd[1]: sshd@12-172.31.27.110:22-139.178.89.65:37448.service: Deactivated successfully. Oct 2 19:09:41.566654 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:09:41.570193 systemd-logind[1622]: Removed session 13. Oct 2 19:09:41.970310 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.JDiHXK.mount: Deactivated successfully. Oct 2 19:09:42.692065 env[1629]: time="2023-10-02T19:09:42.692012270Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:09:42.905798 env[1629]: time="2023-10-02T19:09:42.905729665Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:42.907814 env[1629]: time="2023-10-02T19:09:42.907658257Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:42.908213 kubelet[2903]: E1002 19:09:42.908187 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:09:42.908605 kubelet[2903]: E1002 19:09:42.908250 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:09:42.908605 kubelet[2903]: E1002 19:09:42.908405 2903 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-2z2zp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wcmgn_calico-system(ade4b6df-b8e6-4e5c-8373-7c3c92757aec): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:42.910193 env[1629]: time="2023-10-02T19:09:42.910135612Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:09:43.127472 env[1629]: time="2023-10-02T19:09:43.127316535Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:43.129350 env[1629]: time="2023-10-02T19:09:43.129278426Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:43.130026 kubelet[2903]: E1002 19:09:43.129982 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:43.130535 kubelet[2903]: E1002 19:09:43.130399 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:09:43.130598 kubelet[2903]: E1002 19:09:43.130531 2903 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-2z2zp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wcmgn_calico-system(ade4b6df-b8e6-4e5c-8373-7c3c92757aec): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:43.130725 kubelet[2903]: E1002 19:09:43.130604 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-wcmgn" podUID="ade4b6df-b8e6-4e5c-8373-7c3c92757aec" Oct 2 19:09:45.690759 env[1629]: time="2023-10-02T19:09:45.690718063Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:09:45.891841 env[1629]: time="2023-10-02T19:09:45.891440740Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:45.894810 env[1629]: time="2023-10-02T19:09:45.894587806Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:45.896532 kubelet[2903]: E1002 19:09:45.896500 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:45.897637 kubelet[2903]: E1002 19:09:45.896574 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:45.897637 kubelet[2903]: E1002 19:09:45.896734 2903 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-65h4q,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7f859d5f9d-fxhq2_calico-apiserver(44598139-27c6-4881-91a3-2a8dabdec898): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:45.897637 kubelet[2903]: E1002 19:09:45.896802 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-fxhq2" podUID="44598139-27c6-4881-91a3-2a8dabdec898" Oct 2 19:09:51.566470 systemd[1]: Started sshd@13-172.31.27.110:22-139.178.89.65:45266.service. Oct 2 19:09:51.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.110:22-139.178.89.65:45266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:51.571633 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:09:51.571783 kernel: audit: type=1130 audit(1696273791.568:1399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.110:22-139.178.89.65:45266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:51.742000 audit[5463]: USER_ACCT pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:51.753128 sshd[5463]: Accepted publickey for core from 139.178.89.65 port 45266 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:09:51.753484 kernel: audit: type=1101 audit(1696273791.742:1400): pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:51.752000 audit[5463]: CRED_ACQ pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:51.754340 sshd[5463]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:09:51.765781 kernel: audit: type=1103 audit(1696273791.752:1401): pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:51.765918 kernel: audit: type=1006 audit(1696273791.752:1402): pid=5463 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Oct 2 19:09:51.762086 systemd[1]: Started session-14.scope. Oct 2 19:09:51.763466 systemd-logind[1622]: New session 14 of user core. Oct 2 19:09:51.752000 audit[5463]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecb8a1b20 a2=3 a3=0 items=0 ppid=1 pid=5463 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:51.773477 kernel: audit: type=1300 audit(1696273791.752:1402): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecb8a1b20 a2=3 a3=0 items=0 ppid=1 pid=5463 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:09:51.752000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:51.776710 kernel: audit: type=1327 audit(1696273791.752:1402): proctitle=737368643A20636F7265205B707269765D Oct 2 19:09:51.776791 kernel: audit: type=1105 audit(1696273791.771:1403): pid=5463 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:51.771000 audit[5463]: USER_START pid=5463 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:51.775000 audit[5467]: CRED_ACQ pid=5467 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:51.809573 kernel: audit: type=1103 audit(1696273791.775:1404): pid=5467 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:51.967261 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.3cGg9b.mount: Deactivated successfully. Oct 2 19:09:52.039107 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.FVnH7a.mount: Deactivated successfully. Oct 2 19:09:52.094915 sshd[5463]: pam_unix(sshd:session): session closed for user core Oct 2 19:09:52.095000 audit[5463]: USER_END pid=5463 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:52.098981 systemd[1]: sshd@13-172.31.27.110:22-139.178.89.65:45266.service: Deactivated successfully. Oct 2 19:09:52.101393 systemd-logind[1622]: Session 14 logged out. Waiting for processes to exit. Oct 2 19:09:52.095000 audit[5463]: CRED_DISP pid=5463 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:52.105399 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 19:09:52.107675 systemd-logind[1622]: Removed session 14. Oct 2 19:09:52.111014 kernel: audit: type=1106 audit(1696273792.095:1405): pid=5463 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:52.111096 kernel: audit: type=1104 audit(1696273792.095:1406): pid=5463 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:09:52.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.27.110:22-139.178.89.65:45266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:09:52.691591 env[1629]: time="2023-10-02T19:09:52.691550955Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:09:52.888330 env[1629]: time="2023-10-02T19:09:52.888197420Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:09:52.890239 env[1629]: time="2023-10-02T19:09:52.890188361Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:09:52.890496 kubelet[2903]: E1002 19:09:52.890460 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:52.890866 kubelet[2903]: E1002 19:09:52.890508 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:09:52.891191 kubelet[2903]: E1002 19:09:52.891160 2903 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-w8glq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7f859d5f9d-bd7wb_calico-apiserver(b6868c13-5bca-4cb2-9e28-81bafb52f718): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:09:52.891625 kubelet[2903]: E1002 19:09:52.891218 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-bd7wb" podUID="b6868c13-5bca-4cb2-9e28-81bafb52f718" Oct 2 19:09:53.690835 kubelet[2903]: E1002 19:09:53.690800 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-wcmgn" podUID="ade4b6df-b8e6-4e5c-8373-7c3c92757aec" Oct 2 19:10:00.692330 kubelet[2903]: E1002 19:10:00.692191 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-fxhq2" podUID="44598139-27c6-4881-91a3-2a8dabdec898" Oct 2 19:10:01.968278 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.QbrtLn.mount: Deactivated successfully. Oct 2 19:10:02.141156 systemd[1]: Started sshd@14-172.31.27.110:22-139.178.89.65:34116.service. Oct 2 19:10:02.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.110:22-139.178.89.65:34116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:02.147777 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:10:02.147933 kernel: audit: type=1130 audit(1696273802.140:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.110:22-139.178.89.65:34116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:02.449302 sshd[5576]: Accepted publickey for core from 139.178.89.65 port 34116 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:10:02.447000 audit[5576]: USER_ACCT pid=5576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:02.470448 kernel: audit: type=1101 audit(1696273802.447:1409): pid=5576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:02.451000 audit[5576]: CRED_ACQ pid=5576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:02.485961 kernel: audit: type=1103 audit(1696273802.451:1410): pid=5576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:02.487590 sshd[5576]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:10:02.451000 audit[5576]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6bca0dd0 a2=3 a3=0 items=0 ppid=1 pid=5576 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:02.514610 systemd-logind[1622]: New session 15 of user core. Oct 2 19:10:02.516614 kernel: audit: type=1006 audit(1696273802.451:1411): pid=5576 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 2 19:10:02.516803 kernel: audit: type=1300 audit(1696273802.451:1411): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6bca0dd0 a2=3 a3=0 items=0 ppid=1 pid=5576 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:02.516841 kernel: audit: type=1327 audit(1696273802.451:1411): proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:02.451000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:02.520611 systemd[1]: Started session-15.scope. Oct 2 19:10:02.554000 audit[5576]: USER_START pid=5576 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:02.570784 kernel: audit: type=1105 audit(1696273802.554:1412): pid=5576 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:02.570918 kernel: audit: type=1103 audit(1696273802.563:1413): pid=5591 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:02.563000 audit[5591]: CRED_ACQ pid=5591 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:02.825000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:02.834556 kernel: audit: type=1400 audit(1696273802.825:1415): avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:02.825000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:02.825000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c1ade0 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:10:02.842555 kernel: audit: type=1400 audit(1696273802.825:1414): avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:02.825000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d51fe0 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:10:02.825000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:02.825000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:02.905834 sshd[5576]: pam_unix(sshd:session): session closed for user core Oct 2 19:10:02.907000 audit[5576]: USER_END pid=5576 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:02.907000 audit[5576]: CRED_DISP pid=5576 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:02.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.27.110:22-139.178.89.65:34116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:02.911744 systemd[1]: sshd@14-172.31.27.110:22-139.178.89.65:34116.service: Deactivated successfully. Oct 2 19:10:02.913024 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 19:10:02.914179 systemd-logind[1622]: Session 15 logged out. Waiting for processes to exit. Oct 2 19:10:02.915590 systemd-logind[1622]: Removed session 15. Oct 2 19:10:04.408000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:04.408000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:04.408000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c006f04450 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:10:04.408000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:04.408000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c003c799c0 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:10:04.408000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:04.409000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:04.409000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c006c4efc0 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:10:04.409000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:04.426000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:04.426000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c006f04600 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:10:04.426000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:04.446000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:04.446000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c006c4f1d0 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:10:04.446000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:04.450000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:04.450000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00c720320 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:10:04.450000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:10:05.691276 kubelet[2903]: E1002 19:10:05.691241 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-wcmgn" podUID="ade4b6df-b8e6-4e5c-8373-7c3c92757aec" Oct 2 19:10:06.909000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:06.909000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ddcca0 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:10:06.909000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:06.914000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:06.914000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:06.914000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011a7de0 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:10:06.914000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:06.914000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ddce80 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:10:06.914000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:06.919000 audit[2511]: AVC avc: denied { watch } for pid=2511 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:10:06.919000 audit[2511]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ef2100 a2=fc6 a3=0 items=0 ppid=2379 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:10:06.919000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:10:07.690916 kubelet[2903]: E1002 19:10:07.689915 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-bd7wb" podUID="b6868c13-5bca-4cb2-9e28-81bafb52f718" Oct 2 19:10:11.689345 kubelet[2903]: E1002 19:10:11.689316 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-fxhq2" podUID="44598139-27c6-4881-91a3-2a8dabdec898" Oct 2 19:10:11.967610 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.MhHmC9.mount: Deactivated successfully. Oct 2 19:10:12.940245 systemd[1]: Started sshd@15-172.31.27.110:22-139.178.89.65:54968.service. Oct 2 19:10:12.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.110:22-139.178.89.65:54968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:12.950498 kernel: kauditd_printk_skb: 37 callbacks suppressed Oct 2 19:10:12.950622 kernel: audit: type=1130 audit(1696273812.939:1429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.110:22-139.178.89.65:54968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:13.124000 audit[5669]: USER_ACCT pid=5669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:13.135079 sshd[5669]: Accepted publickey for core from 139.178.89.65 port 54968 ssh2: RSA SHA256:x9/OT7ro8vjSge/fuA4/NJq92bLfWcOP18P7B4SEcY0 Oct 2 19:10:13.137140 kernel: audit: type=1101 audit(1696273813.124:1430): pid=5669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:13.137480 kernel: audit: type=1103 audit(1696273813.134:1431): pid=5669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:13.134000 audit[5669]: CRED_ACQ pid=5669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:13.138625 sshd[5669]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:10:13.152774 kernel: audit: type=1006 audit(1696273813.134:1432): pid=5669 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Oct 2 19:10:13.152928 kernel: audit: type=1300 audit(1696273813.134:1432): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7ec67220 a2=3 a3=0 items=0 ppid=1 pid=5669 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:13.134000 audit[5669]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7ec67220 a2=3 a3=0 items=0 ppid=1 pid=5669 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:13.150513 systemd[1]: Started session-16.scope. Oct 2 19:10:13.157909 systemd-logind[1622]: New session 16 of user core. Oct 2 19:10:13.170545 kernel: audit: type=1327 audit(1696273813.134:1432): proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:13.134000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:10:13.178000 audit[5669]: USER_START pid=5669 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:13.211495 kernel: audit: type=1105 audit(1696273813.178:1433): pid=5669 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:13.211628 kernel: audit: type=1103 audit(1696273813.181:1434): pid=5671 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:13.181000 audit[5671]: CRED_ACQ pid=5671 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:13.381070 sshd[5669]: pam_unix(sshd:session): session closed for user core Oct 2 19:10:13.381000 audit[5669]: USER_END pid=5669 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:13.381000 audit[5669]: CRED_DISP pid=5669 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:13.388778 systemd[1]: sshd@15-172.31.27.110:22-139.178.89.65:54968.service: Deactivated successfully. Oct 2 19:10:13.389792 systemd[1]: session-16.scope: Deactivated successfully. Oct 2 19:10:13.391723 systemd-logind[1622]: Session 16 logged out. Waiting for processes to exit. Oct 2 19:10:13.392980 systemd-logind[1622]: Removed session 16. Oct 2 19:10:13.395497 kernel: audit: type=1106 audit(1696273813.381:1435): pid=5669 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:13.395577 kernel: audit: type=1104 audit(1696273813.381:1436): pid=5669 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:10:13.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.27.110:22-139.178.89.65:54968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:10:17.609621 systemd[1]: run-containerd-runc-k8s.io-bafed02af36894ab4793e078b0c497d98d72569336fcbeff720dcbf9b95f7b55-runc.mjb3LA.mount: Deactivated successfully. Oct 2 19:10:17.689827 kubelet[2903]: E1002 19:10:17.689786 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-wcmgn" podUID="ade4b6df-b8e6-4e5c-8373-7c3c92757aec" Oct 2 19:10:21.689097 kubelet[2903]: E1002 19:10:21.689065 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-bd7wb" podUID="b6868c13-5bca-4cb2-9e28-81bafb52f718" Oct 2 19:10:21.974186 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.bhUEP7.mount: Deactivated successfully. Oct 2 19:10:22.020235 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.qNrQNz.mount: Deactivated successfully. Oct 2 19:10:24.691284 kubelet[2903]: E1002 19:10:24.691253 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-fxhq2" podUID="44598139-27c6-4881-91a3-2a8dabdec898" Oct 2 19:10:27.614792 systemd[1]: run-containerd-runc-k8s.io-bafed02af36894ab4793e078b0c497d98d72569336fcbeff720dcbf9b95f7b55-runc.4r09yC.mount: Deactivated successfully. Oct 2 19:10:31.689767 env[1629]: time="2023-10-02T19:10:31.689718934Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:10:31.868395 env[1629]: time="2023-10-02T19:10:31.868262546Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:31.871062 env[1629]: time="2023-10-02T19:10:31.870995309Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:31.871457 kubelet[2903]: E1002 19:10:31.871410 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:31.876786 kubelet[2903]: E1002 19:10:31.871485 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:10:31.876786 kubelet[2903]: E1002 19:10:31.871704 2903 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-2z2zp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wcmgn_calico-system(ade4b6df-b8e6-4e5c-8373-7c3c92757aec): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:31.884969 env[1629]: time="2023-10-02T19:10:31.884730579Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:10:32.112105 env[1629]: time="2023-10-02T19:10:32.111908202Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:32.114255 env[1629]: time="2023-10-02T19:10:32.114202685Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:32.114575 kubelet[2903]: E1002 19:10:32.114547 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:32.114730 kubelet[2903]: E1002 19:10:32.114599 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:10:32.115988 kubelet[2903]: E1002 19:10:32.115963 2903 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-2z2zp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wcmgn_calico-system(ade4b6df-b8e6-4e5c-8373-7c3c92757aec): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:32.116156 kubelet[2903]: E1002 19:10:32.116038 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-wcmgn" podUID="ade4b6df-b8e6-4e5c-8373-7c3c92757aec" Oct 2 19:10:32.690000 kubelet[2903]: E1002 19:10:32.689570 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-bd7wb" podUID="b6868c13-5bca-4cb2-9e28-81bafb52f718" Oct 2 19:10:37.624767 systemd[1]: run-containerd-runc-k8s.io-bafed02af36894ab4793e078b0c497d98d72569336fcbeff720dcbf9b95f7b55-runc.AmwnR0.mount: Deactivated successfully. Oct 2 19:10:37.773154 systemd[1]: run-containerd-runc-k8s.io-bafed02af36894ab4793e078b0c497d98d72569336fcbeff720dcbf9b95f7b55-runc.hWlwY2.mount: Deactivated successfully. Oct 2 19:10:38.692744 env[1629]: time="2023-10-02T19:10:38.692696656Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:10:38.894045 env[1629]: time="2023-10-02T19:10:38.893979618Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:38.895922 env[1629]: time="2023-10-02T19:10:38.895857770Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:38.896521 kubelet[2903]: E1002 19:10:38.896494 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:38.897264 kubelet[2903]: E1002 19:10:38.896545 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:38.897264 kubelet[2903]: E1002 19:10:38.896770 2903 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-65h4q,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7f859d5f9d-fxhq2_calico-apiserver(44598139-27c6-4881-91a3-2a8dabdec898): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:38.897264 kubelet[2903]: E1002 19:10:38.896864 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-fxhq2" podUID="44598139-27c6-4881-91a3-2a8dabdec898" Oct 2 19:10:41.944551 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.NaJS6y.mount: Deactivated successfully. Oct 2 19:10:42.016812 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.zDjzGv.mount: Deactivated successfully. Oct 2 19:10:45.689916 env[1629]: time="2023-10-02T19:10:45.689398426Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:10:45.690359 kubelet[2903]: E1002 19:10:45.690013 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-wcmgn" podUID="ade4b6df-b8e6-4e5c-8373-7c3c92757aec" Oct 2 19:10:45.860652 env[1629]: time="2023-10-02T19:10:45.860584725Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:10:45.862316 env[1629]: time="2023-10-02T19:10:45.862267771Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:10:45.862996 kubelet[2903]: E1002 19:10:45.862945 2903 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:45.863111 kubelet[2903]: E1002 19:10:45.863023 2903 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:10:45.863745 kubelet[2903]: E1002 19:10:45.863720 2903 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-w8glq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7f859d5f9d-bd7wb_calico-apiserver(b6868c13-5bca-4cb2-9e28-81bafb52f718): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:10:45.863903 kubelet[2903]: E1002 19:10:45.863781 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-bd7wb" podUID="b6868c13-5bca-4cb2-9e28-81bafb52f718" Oct 2 19:10:47.615316 systemd[1]: run-containerd-runc-k8s.io-bafed02af36894ab4793e078b0c497d98d72569336fcbeff720dcbf9b95f7b55-runc.0bSUaA.mount: Deactivated successfully. Oct 2 19:10:50.689289 kubelet[2903]: E1002 19:10:50.689263 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-fxhq2" podUID="44598139-27c6-4881-91a3-2a8dabdec898" Oct 2 19:10:51.964479 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.xYDoGm.mount: Deactivated successfully. Oct 2 19:10:56.691489 kubelet[2903]: E1002 19:10:56.691457 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-wcmgn" podUID="ade4b6df-b8e6-4e5c-8373-7c3c92757aec" Oct 2 19:10:58.635687 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:10:58.635857 kernel: audit: type=1334 audit(1696273858.632:1438): prog-id=126 op=UNLOAD Oct 2 19:10:58.632000 audit: BPF prog-id=126 op=UNLOAD Oct 2 19:10:58.632723 systemd[1]: cri-containerd-436c694b82bc1c1646682f7098e1fb484ade6642f1d69a1c6fe461c27a3c7cc2.scope: Deactivated successfully. Oct 2 19:10:58.633062 systemd[1]: cri-containerd-436c694b82bc1c1646682f7098e1fb484ade6642f1d69a1c6fe461c27a3c7cc2.scope: Consumed 4.137s CPU time. Oct 2 19:10:58.642000 audit: BPF prog-id=129 op=UNLOAD Oct 2 19:10:58.645515 kernel: audit: type=1334 audit(1696273858.642:1439): prog-id=129 op=UNLOAD Oct 2 19:10:58.692182 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-436c694b82bc1c1646682f7098e1fb484ade6642f1d69a1c6fe461c27a3c7cc2-rootfs.mount: Deactivated successfully. Oct 2 19:10:58.694642 kubelet[2903]: E1002 19:10:58.694618 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-bd7wb" podUID="b6868c13-5bca-4cb2-9e28-81bafb52f718" Oct 2 19:10:58.722447 env[1629]: time="2023-10-02T19:10:58.722390496Z" level=info msg="shim disconnected" id=436c694b82bc1c1646682f7098e1fb484ade6642f1d69a1c6fe461c27a3c7cc2 Oct 2 19:10:58.722447 env[1629]: time="2023-10-02T19:10:58.722447642Z" level=warning msg="cleaning up after shim disconnected" id=436c694b82bc1c1646682f7098e1fb484ade6642f1d69a1c6fe461c27a3c7cc2 namespace=k8s.io Oct 2 19:10:58.722447 env[1629]: time="2023-10-02T19:10:58.722459265Z" level=info msg="cleaning up dead shim" Oct 2 19:10:58.735216 env[1629]: time="2023-10-02T19:10:58.735166183Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:10:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6007 runtime=io.containerd.runc.v2\n" Oct 2 19:10:59.514951 kubelet[2903]: I1002 19:10:59.514923 2903 scope.go:117] "RemoveContainer" containerID="436c694b82bc1c1646682f7098e1fb484ade6642f1d69a1c6fe461c27a3c7cc2" Oct 2 19:10:59.519767 env[1629]: time="2023-10-02T19:10:59.519483914Z" level=info msg="CreateContainer within sandbox \"651fca2806a3148e3dd2a471d75b03e648ea1e4bc20bbf7af3b6e0a649d5709d\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Oct 2 19:10:59.547522 env[1629]: time="2023-10-02T19:10:59.547418828Z" level=info msg="CreateContainer within sandbox \"651fca2806a3148e3dd2a471d75b03e648ea1e4bc20bbf7af3b6e0a649d5709d\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"f8d1c7c6059c6865c4f3b9fc020f66e0200568281bf04c29e7336b9c9a10b520\"" Oct 2 19:10:59.549296 env[1629]: time="2023-10-02T19:10:59.549221962Z" level=info msg="StartContainer for \"f8d1c7c6059c6865c4f3b9fc020f66e0200568281bf04c29e7336b9c9a10b520\"" Oct 2 19:10:59.602589 systemd[1]: Started cri-containerd-f8d1c7c6059c6865c4f3b9fc020f66e0200568281bf04c29e7336b9c9a10b520.scope. Oct 2 19:10:59.637433 kernel: audit: type=1400 audit(1696273859.626:1440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637600 kernel: audit: type=1400 audit(1696273859.626:1441): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.643726 kernel: audit: type=1400 audit(1696273859.626:1442): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.649398 kernel: audit: type=1400 audit(1696273859.626:1443): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.649785 kernel: audit: type=1400 audit(1696273859.626:1444): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.661483 kernel: audit: type=1400 audit(1696273859.626:1445): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.683069 kernel: audit: type=1400 audit(1696273859.626:1446): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.683205 kernel: audit: type=1400 audit(1696273859.626:1447): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit: BPF prog-id=191 op=LOAD Oct 2 19:10:59.626000 audit[6034]: AVC avc: denied { bpf } for pid=6034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[6034]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3058 pid=6034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:59.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638643163376336303539633638363563346633623966633032306636 Oct 2 19:10:59.626000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[6034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3058 pid=6034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:59.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638643163376336303539633638363563346633623966633032306636 Oct 2 19:10:59.626000 audit[6034]: AVC avc: denied { bpf } for pid=6034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[6034]: AVC avc: denied { bpf } for pid=6034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[6034]: AVC avc: denied { bpf } for pid=6034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[6034]: AVC avc: denied { bpf } for pid=6034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit[6034]: AVC avc: denied { bpf } for pid=6034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.626000 audit: BPF prog-id=192 op=LOAD Oct 2 19:10:59.626000 audit[6034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000298400 items=0 ppid=3058 pid=6034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:59.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638643163376336303539633638363563346633623966633032306636 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { bpf } for pid=6034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { bpf } for pid=6034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { bpf } for pid=6034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { bpf } for pid=6034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit: BPF prog-id=193 op=LOAD Oct 2 19:10:59.637000 audit[6034]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000298448 items=0 ppid=3058 pid=6034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:59.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638643163376336303539633638363563346633623966633032306636 Oct 2 19:10:59.637000 audit: BPF prog-id=193 op=UNLOAD Oct 2 19:10:59.637000 audit: BPF prog-id=192 op=UNLOAD Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { bpf } for pid=6034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { bpf } for pid=6034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { bpf } for pid=6034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { perfmon } for pid=6034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { bpf } for pid=6034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit[6034]: AVC avc: denied { bpf } for pid=6034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:10:59.637000 audit: BPF prog-id=194 op=LOAD Oct 2 19:10:59.637000 audit[6034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000298858 items=0 ppid=3058 pid=6034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:10:59.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638643163376336303539633638363563346633623966633032306636 Oct 2 19:10:59.693670 systemd[1]: run-containerd-runc-k8s.io-f8d1c7c6059c6865c4f3b9fc020f66e0200568281bf04c29e7336b9c9a10b520-runc.Os1DaZ.mount: Deactivated successfully. Oct 2 19:10:59.701616 env[1629]: time="2023-10-02T19:10:59.701584792Z" level=info msg="StartContainer for \"f8d1c7c6059c6865c4f3b9fc020f66e0200568281bf04c29e7336b9c9a10b520\" returns successfully" Oct 2 19:10:59.945513 systemd[1]: cri-containerd-da68e550f1a13f78a09701f90e1180da97760c5f47010df70ef7a7cbe613821b.scope: Deactivated successfully. Oct 2 19:10:59.945947 systemd[1]: cri-containerd-da68e550f1a13f78a09701f90e1180da97760c5f47010df70ef7a7cbe613821b.scope: Consumed 3.734s CPU time. Oct 2 19:10:59.950000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:10:59.950000 audit: BPF prog-id=106 op=UNLOAD Oct 2 19:11:00.057497 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-da68e550f1a13f78a09701f90e1180da97760c5f47010df70ef7a7cbe613821b-rootfs.mount: Deactivated successfully. Oct 2 19:11:00.096056 env[1629]: time="2023-10-02T19:11:00.095969411Z" level=info msg="shim disconnected" id=da68e550f1a13f78a09701f90e1180da97760c5f47010df70ef7a7cbe613821b Oct 2 19:11:00.096056 env[1629]: time="2023-10-02T19:11:00.096057898Z" level=warning msg="cleaning up after shim disconnected" id=da68e550f1a13f78a09701f90e1180da97760c5f47010df70ef7a7cbe613821b namespace=k8s.io Oct 2 19:11:00.097219 env[1629]: time="2023-10-02T19:11:00.096072188Z" level=info msg="cleaning up dead shim" Oct 2 19:11:00.115407 env[1629]: time="2023-10-02T19:11:00.115335575Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:11:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6075 runtime=io.containerd.runc.v2\n" Oct 2 19:11:00.519359 kubelet[2903]: I1002 19:11:00.519330 2903 scope.go:117] "RemoveContainer" containerID="da68e550f1a13f78a09701f90e1180da97760c5f47010df70ef7a7cbe613821b" Oct 2 19:11:00.524964 env[1629]: time="2023-10-02T19:11:00.524728872Z" level=info msg="CreateContainer within sandbox \"ad9922d98d5a5641e67801d8fcab22c284ec9e22216739cfd195af05706dee46\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Oct 2 19:11:00.555975 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1470440098.mount: Deactivated successfully. Oct 2 19:11:00.576627 env[1629]: time="2023-10-02T19:11:00.576572055Z" level=info msg="CreateContainer within sandbox \"ad9922d98d5a5641e67801d8fcab22c284ec9e22216739cfd195af05706dee46\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"824546b497740e7da2eedf00f73e8fcd00700df2e45fd6bc1c0909d6f8486614\"" Oct 2 19:11:00.577225 env[1629]: time="2023-10-02T19:11:00.577192697Z" level=info msg="StartContainer for \"824546b497740e7da2eedf00f73e8fcd00700df2e45fd6bc1c0909d6f8486614\"" Oct 2 19:11:00.601704 systemd[1]: Started cri-containerd-824546b497740e7da2eedf00f73e8fcd00700df2e45fd6bc1c0909d6f8486614.scope. Oct 2 19:11:00.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.631000 audit: BPF prog-id=195 op=LOAD Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { bpf } for pid=6095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2379 pid=6095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:11:00.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832343534366234393737343065376461326565646630306637336538 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2379 pid=6095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:11:00.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832343534366234393737343065376461326565646630306637336538 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { bpf } for pid=6095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { bpf } for pid=6095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { bpf } for pid=6095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { bpf } for pid=6095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { bpf } for pid=6095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit: BPF prog-id=196 op=LOAD Oct 2 19:11:00.632000 audit[6095]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003a0c10 items=0 ppid=2379 pid=6095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:11:00.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832343534366234393737343065376461326565646630306637336538 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { bpf } for pid=6095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { bpf } for pid=6095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { bpf } for pid=6095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { bpf } for pid=6095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit: BPF prog-id=197 op=LOAD Oct 2 19:11:00.632000 audit[6095]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003a0c58 items=0 ppid=2379 pid=6095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:11:00.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832343534366234393737343065376461326565646630306637336538 Oct 2 19:11:00.632000 audit: BPF prog-id=197 op=UNLOAD Oct 2 19:11:00.632000 audit: BPF prog-id=196 op=UNLOAD Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { bpf } for pid=6095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { bpf } for pid=6095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { bpf } for pid=6095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { perfmon } for pid=6095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { bpf } for pid=6095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit[6095]: AVC avc: denied { bpf } for pid=6095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:00.632000 audit: BPF prog-id=198 op=LOAD Oct 2 19:11:00.632000 audit[6095]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003a1068 items=0 ppid=2379 pid=6095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:11:00.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832343534366234393737343065376461326565646630306637336538 Oct 2 19:11:00.688420 env[1629]: time="2023-10-02T19:11:00.687449721Z" level=info msg="StartContainer for \"824546b497740e7da2eedf00f73e8fcd00700df2e45fd6bc1c0909d6f8486614\" returns successfully" Oct 2 19:11:00.696028 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3130560948.mount: Deactivated successfully. Oct 2 19:11:01.704085 kubelet[2903]: E1002 19:11:01.704030 2903 request.go:1116] Unexpected error when reading response body: net/http: request canceled (Client.Timeout or context cancellation while reading body) Oct 2 19:11:01.708242 kubelet[2903]: E1002 19:11:01.708173 2903 controller.go:193] "Failed to update lease" err="unexpected error when reading response body. Please retry. Original error: net/http: request canceled (Client.Timeout or context cancellation while reading body)" Oct 2 19:11:01.983122 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.WkYOye.mount: Deactivated successfully. Oct 2 19:11:02.884000 audit[6106]: AVC avc: denied { watch } for pid=6106 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:11:02.884000 audit[6106]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00039ec30 a2=fc6 a3=0 items=0 ppid=2379 pid=6106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:11:02.884000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:11:02.888000 audit[6106]: AVC avc: denied { watch } for pid=6106 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:11:02.888000 audit[6106]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000494320 a2=fc6 a3=0 items=0 ppid=2379 pid=6106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c731 key=(null) Oct 2 19:11:02.888000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:11:03.689465 kubelet[2903]: E1002 19:11:03.689270 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-fxhq2" podUID="44598139-27c6-4881-91a3-2a8dabdec898" Oct 2 19:11:04.409000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:11:04.411665 kernel: kauditd_printk_skb: 114 callbacks suppressed Oct 2 19:11:04.411772 kernel: audit: type=1400 audit(1696273864.409:1480): avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:11:04.409000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5b a1=c007ba4d20 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:11:04.428433 kernel: audit: type=1300 audit(1696273864.409:1480): arch=c000003e syscall=254 success=no exit=-13 a0=5b a1=c007ba4d20 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:11:04.428616 kernel: audit: type=1327 audit(1696273864.409:1480): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:11:04.409000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:11:04.410000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:11:04.451794 kernel: audit: type=1400 audit(1696273864.410:1481): avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:11:04.452024 kernel: audit: type=1300 audit(1696273864.410:1481): arch=c000003e syscall=254 success=no exit=-13 a0=5b a1=c00667bc50 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:11:04.410000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5b a1=c00667bc50 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:11:04.462402 kernel: audit: type=1327 audit(1696273864.410:1481): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:11:04.410000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:11:04.410000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:11:04.480456 kernel: audit: type=1400 audit(1696273864.410:1482): avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:11:04.480994 kernel: audit: type=1300 audit(1696273864.410:1482): arch=c000003e syscall=254 success=no exit=-13 a0=5b a1=c007d3a1c0 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:11:04.410000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5b a1=c007d3a1c0 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:11:04.410000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:11:04.512169 kernel: audit: type=1327 audit(1696273864.410:1482): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:11:04.512395 kernel: audit: type=1400 audit(1696273864.428:1483): avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:11:04.428000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:11:04.428000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5b a1=c007ba4d50 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:11:04.428000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:11:04.444000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:11:04.444000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5b a1=c007ba4e40 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:11:04.444000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:11:04.451000 audit[2470]: AVC avc: denied { watch } for pid=2470 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:11:04.451000 audit[2470]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5b a1=c007d3a2c0 a2=fc6 a3=0 items=0 ppid=2333 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c302,c761 key=(null) Oct 2 19:11:04.451000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32372E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:11:05.080830 systemd[1]: cri-containerd-60c8cfe88ed2f77e32b70b169ebf23155fc3ab8690097ed8aeda48a800df2a96.scope: Deactivated successfully. Oct 2 19:11:05.081166 systemd[1]: cri-containerd-60c8cfe88ed2f77e32b70b169ebf23155fc3ab8690097ed8aeda48a800df2a96.scope: Consumed 2.000s CPU time. Oct 2 19:11:05.083000 audit: BPF prog-id=93 op=UNLOAD Oct 2 19:11:05.083000 audit: BPF prog-id=105 op=UNLOAD Oct 2 19:11:05.117400 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-60c8cfe88ed2f77e32b70b169ebf23155fc3ab8690097ed8aeda48a800df2a96-rootfs.mount: Deactivated successfully. Oct 2 19:11:05.173923 env[1629]: time="2023-10-02T19:11:05.173865343Z" level=info msg="shim disconnected" id=60c8cfe88ed2f77e32b70b169ebf23155fc3ab8690097ed8aeda48a800df2a96 Oct 2 19:11:05.173923 env[1629]: time="2023-10-02T19:11:05.173922745Z" level=warning msg="cleaning up after shim disconnected" id=60c8cfe88ed2f77e32b70b169ebf23155fc3ab8690097ed8aeda48a800df2a96 namespace=k8s.io Oct 2 19:11:05.174590 env[1629]: time="2023-10-02T19:11:05.173935353Z" level=info msg="cleaning up dead shim" Oct 2 19:11:05.213237 env[1629]: time="2023-10-02T19:11:05.213180156Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:11:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6177 runtime=io.containerd.runc.v2\n" Oct 2 19:11:05.546793 kubelet[2903]: I1002 19:11:05.546729 2903 scope.go:117] "RemoveContainer" containerID="60c8cfe88ed2f77e32b70b169ebf23155fc3ab8690097ed8aeda48a800df2a96" Oct 2 19:11:05.555471 env[1629]: time="2023-10-02T19:11:05.555424186Z" level=info msg="CreateContainer within sandbox \"38c2fc92efc5ebbcaee3a86c35a8b0802fcdf3a4740cf75259a1e939f0f303a2\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Oct 2 19:11:05.616021 env[1629]: time="2023-10-02T19:11:05.615965652Z" level=info msg="CreateContainer within sandbox \"38c2fc92efc5ebbcaee3a86c35a8b0802fcdf3a4740cf75259a1e939f0f303a2\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"ce8ddd9bb1471f3f85b982b44d6aa5f4ec89b1912f17e8d44ca5377b973c86e6\"" Oct 2 19:11:05.616532 env[1629]: time="2023-10-02T19:11:05.616501111Z" level=info msg="StartContainer for \"ce8ddd9bb1471f3f85b982b44d6aa5f4ec89b1912f17e8d44ca5377b973c86e6\"" Oct 2 19:11:05.661415 systemd[1]: Started cri-containerd-ce8ddd9bb1471f3f85b982b44d6aa5f4ec89b1912f17e8d44ca5377b973c86e6.scope. Oct 2 19:11:05.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.686000 audit: BPF prog-id=199 op=LOAD Oct 2 19:11:05.688000 audit[6198]: AVC avc: denied { bpf } for pid=6198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.688000 audit[6198]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2350 pid=6198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:11:05.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365386464643962623134373166336638356239383262343464366161 Oct 2 19:11:05.689000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.689000 audit[6198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2350 pid=6198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:11:05.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365386464643962623134373166336638356239383262343464366161 Oct 2 19:11:05.689000 audit[6198]: AVC avc: denied { bpf } for pid=6198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.689000 audit[6198]: AVC avc: denied { bpf } for pid=6198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.689000 audit[6198]: AVC avc: denied { bpf } for pid=6198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.689000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.689000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.689000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.689000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.689000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.689000 audit[6198]: AVC avc: denied { bpf } for pid=6198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.689000 audit[6198]: AVC avc: denied { bpf } for pid=6198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.689000 audit: BPF prog-id=200 op=LOAD Oct 2 19:11:05.689000 audit[6198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000303300 items=0 ppid=2350 pid=6198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:11:05.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365386464643962623134373166336638356239383262343464366161 Oct 2 19:11:05.690000 audit[6198]: AVC avc: denied { bpf } for pid=6198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.690000 audit[6198]: AVC avc: denied { bpf } for pid=6198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.690000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.690000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.690000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.690000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.690000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.690000 audit[6198]: AVC avc: denied { bpf } for pid=6198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.690000 audit[6198]: AVC avc: denied { bpf } for pid=6198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.690000 audit: BPF prog-id=201 op=LOAD Oct 2 19:11:05.690000 audit[6198]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000303348 items=0 ppid=2350 pid=6198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:11:05.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365386464643962623134373166336638356239383262343464366161 Oct 2 19:11:05.691000 audit: BPF prog-id=201 op=UNLOAD Oct 2 19:11:05.691000 audit: BPF prog-id=200 op=UNLOAD Oct 2 19:11:05.691000 audit[6198]: AVC avc: denied { bpf } for pid=6198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.691000 audit[6198]: AVC avc: denied { bpf } for pid=6198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.691000 audit[6198]: AVC avc: denied { bpf } for pid=6198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.691000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.691000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.691000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.691000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.691000 audit[6198]: AVC avc: denied { perfmon } for pid=6198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.691000 audit[6198]: AVC avc: denied { bpf } for pid=6198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.691000 audit[6198]: AVC avc: denied { bpf } for pid=6198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:11:05.691000 audit: BPF prog-id=202 op=LOAD Oct 2 19:11:05.691000 audit[6198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000303758 items=0 ppid=2350 pid=6198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:11:05.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365386464643962623134373166336638356239383262343464366161 Oct 2 19:11:05.744972 env[1629]: time="2023-10-02T19:11:05.744854010Z" level=info msg="StartContainer for \"ce8ddd9bb1471f3f85b982b44d6aa5f4ec89b1912f17e8d44ca5377b973c86e6\" returns successfully" Oct 2 19:11:06.116407 systemd[1]: run-containerd-runc-k8s.io-ce8ddd9bb1471f3f85b982b44d6aa5f4ec89b1912f17e8d44ca5377b973c86e6-runc.jgtvde.mount: Deactivated successfully. Oct 2 19:11:07.629647 systemd[1]: run-containerd-runc-k8s.io-bafed02af36894ab4793e078b0c497d98d72569336fcbeff720dcbf9b95f7b55-runc.dX0Yuo.mount: Deactivated successfully. Oct 2 19:11:10.691479 kubelet[2903]: E1002 19:11:10.691458 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-wcmgn" podUID="ade4b6df-b8e6-4e5c-8373-7c3c92757aec" Oct 2 19:11:10.693400 kubelet[2903]: E1002 19:11:10.693353 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-bd7wb" podUID="b6868c13-5bca-4cb2-9e28-81bafb52f718" Oct 2 19:11:11.708872 kubelet[2903]: E1002 19:11:11.708842 2903 controller.go:193] "Failed to update lease" err="Put \"https://172.31.27.110:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-27-110?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 19:11:11.951017 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.nMgypx.mount: Deactivated successfully. Oct 2 19:11:12.034697 systemd[1]: run-containerd-runc-k8s.io-d2c21a18ffbaf7c70066d6c84c1a4a1c3807e47e1e5407a60431f076a0ce280c-runc.wqo48w.mount: Deactivated successfully. Oct 2 19:11:17.637941 systemd[1]: run-containerd-runc-k8s.io-bafed02af36894ab4793e078b0c497d98d72569336fcbeff720dcbf9b95f7b55-runc.IICYhF.mount: Deactivated successfully. Oct 2 19:11:18.689796 kubelet[2903]: E1002 19:11:18.689766 2903 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7f859d5f9d-fxhq2" podUID="44598139-27c6-4881-91a3-2a8dabdec898"