Oct 2 19:13:46.028014 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:13:46.028038 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:13:46.028047 kernel: BIOS-provided physical RAM map: Oct 2 19:13:46.028055 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Oct 2 19:13:46.028061 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Oct 2 19:13:46.028066 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Oct 2 19:13:46.028078 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Oct 2 19:13:46.028084 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Oct 2 19:13:46.028090 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Oct 2 19:13:46.028098 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Oct 2 19:13:46.028105 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Oct 2 19:13:46.028110 kernel: printk: bootconsole [earlyser0] enabled Oct 2 19:13:46.028116 kernel: NX (Execute Disable) protection: active Oct 2 19:13:46.028126 kernel: efi: EFI v2.70 by Microsoft Oct 2 19:13:46.028135 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c9a98 RNG=0x3ffd1018 Oct 2 19:13:46.028143 kernel: random: crng init done Oct 2 19:13:46.028151 kernel: SMBIOS 3.1.0 present. Oct 2 19:13:46.028157 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022 Oct 2 19:13:46.028164 kernel: Hypervisor detected: Microsoft Hyper-V Oct 2 19:13:46.028173 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Oct 2 19:13:46.028179 kernel: Hyper-V Host Build:20348-10.0-1-0.1462 Oct 2 19:13:46.028185 kernel: Hyper-V: Nested features: 0x1e0101 Oct 2 19:13:46.028196 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Oct 2 19:13:46.028203 kernel: Hyper-V: Using hypercall for remote TLB flush Oct 2 19:13:46.028212 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Oct 2 19:13:46.028219 kernel: tsc: Marking TSC unstable due to running on Hyper-V Oct 2 19:13:46.028229 kernel: tsc: Detected 2593.906 MHz processor Oct 2 19:13:46.028236 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:13:46.028245 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:13:46.028252 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Oct 2 19:13:46.028260 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:13:46.028268 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Oct 2 19:13:46.028278 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Oct 2 19:13:46.028284 kernel: Using GB pages for direct mapping Oct 2 19:13:46.028292 kernel: Secure boot disabled Oct 2 19:13:46.028300 kernel: ACPI: Early table checksum verification disabled Oct 2 19:13:46.028307 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Oct 2 19:13:46.028314 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:13:46.028323 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:13:46.028329 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Oct 2 19:13:46.028344 kernel: ACPI: FACS 0x000000003FFFE000 000040 Oct 2 19:13:46.028351 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:13:46.028358 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:13:46.028366 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:13:46.028375 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:13:46.028382 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:13:46.028393 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:13:46.028401 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:13:46.028408 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Oct 2 19:13:46.028419 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Oct 2 19:13:46.028426 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Oct 2 19:13:46.028433 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Oct 2 19:13:46.028443 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Oct 2 19:13:46.028450 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Oct 2 19:13:46.028460 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Oct 2 19:13:46.028469 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Oct 2 19:13:46.028476 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Oct 2 19:13:46.028484 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Oct 2 19:13:46.028493 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:13:46.028500 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:13:46.028508 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Oct 2 19:13:46.028516 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Oct 2 19:13:46.028523 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Oct 2 19:13:46.028535 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Oct 2 19:13:46.028542 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Oct 2 19:13:46.028549 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Oct 2 19:13:46.028559 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Oct 2 19:13:46.028566 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Oct 2 19:13:46.028573 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Oct 2 19:13:46.028583 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Oct 2 19:13:46.028591 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Oct 2 19:13:46.028597 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Oct 2 19:13:46.028616 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Oct 2 19:13:46.028624 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Oct 2 19:13:46.028634 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Oct 2 19:13:46.028641 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Oct 2 19:13:46.028651 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Oct 2 19:13:46.028659 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Oct 2 19:13:46.028669 kernel: Zone ranges: Oct 2 19:13:46.028677 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:13:46.028687 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 2 19:13:46.040310 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Oct 2 19:13:46.040325 kernel: Movable zone start for each node Oct 2 19:13:46.040336 kernel: Early memory node ranges Oct 2 19:13:46.040343 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Oct 2 19:13:46.040352 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Oct 2 19:13:46.040361 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Oct 2 19:13:46.040368 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Oct 2 19:13:46.040376 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Oct 2 19:13:46.040385 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:13:46.040400 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Oct 2 19:13:46.040407 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Oct 2 19:13:46.040417 kernel: ACPI: PM-Timer IO Port: 0x408 Oct 2 19:13:46.040425 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Oct 2 19:13:46.040435 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Oct 2 19:13:46.040443 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:13:46.040451 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:13:46.040461 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Oct 2 19:13:46.040468 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:13:46.040479 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Oct 2 19:13:46.040488 kernel: Booting paravirtualized kernel on Hyper-V Oct 2 19:13:46.040495 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:13:46.040505 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:13:46.040513 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:13:46.040520 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:13:46.040530 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:13:46.040537 kernel: Hyper-V: PV spinlocks enabled Oct 2 19:13:46.040544 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:13:46.040556 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Oct 2 19:13:46.040563 kernel: Policy zone: Normal Oct 2 19:13:46.040573 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:13:46.040582 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:13:46.040589 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Oct 2 19:13:46.040596 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 19:13:46.040606 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:13:46.040621 kernel: Memory: 8073740K/8387460K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 313460K reserved, 0K cma-reserved) Oct 2 19:13:46.040633 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:13:46.040640 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:13:46.040657 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:13:46.040667 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:13:46.040678 kernel: rcu: RCU event tracing is enabled. Oct 2 19:13:46.040686 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:13:46.040693 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:13:46.040704 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:13:46.040711 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:13:46.040720 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:13:46.040729 kernel: Using NULL legacy PIC Oct 2 19:13:46.040738 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Oct 2 19:13:46.040749 kernel: Console: colour dummy device 80x25 Oct 2 19:13:46.040756 kernel: printk: console [tty1] enabled Oct 2 19:13:46.040764 kernel: printk: console [ttyS0] enabled Oct 2 19:13:46.040774 kernel: printk: bootconsole [earlyser0] disabled Oct 2 19:13:46.040783 kernel: ACPI: Core revision 20210730 Oct 2 19:13:46.040794 kernel: Failed to register legacy timer interrupt Oct 2 19:13:46.040802 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:13:46.040809 kernel: Hyper-V: Using IPI hypercalls Oct 2 19:13:46.040820 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906) Oct 2 19:13:46.040829 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:13:46.040839 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:13:46.040848 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:13:46.040857 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:13:46.040866 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:13:46.040876 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:13:46.040885 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Oct 2 19:13:46.040896 kernel: RETBleed: Vulnerable Oct 2 19:13:46.040903 kernel: Speculative Store Bypass: Vulnerable Oct 2 19:13:46.040910 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:13:46.040920 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:13:46.040928 kernel: GDS: Unknown: Dependent on hypervisor status Oct 2 19:13:46.040935 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:13:46.040944 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:13:46.040954 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:13:46.040964 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Oct 2 19:13:46.040974 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Oct 2 19:13:46.040981 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Oct 2 19:13:46.040990 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:13:46.040999 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Oct 2 19:13:46.041006 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Oct 2 19:13:46.041016 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Oct 2 19:13:46.041024 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Oct 2 19:13:46.041031 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:13:46.041041 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:13:46.041048 kernel: LSM: Security Framework initializing Oct 2 19:13:46.041056 kernel: SELinux: Initializing. Oct 2 19:13:46.041068 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:13:46.041075 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:13:46.041086 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Oct 2 19:13:46.041094 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Oct 2 19:13:46.041101 kernel: signal: max sigframe size: 3632 Oct 2 19:13:46.041111 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:13:46.041119 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:13:46.041127 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:13:46.041136 kernel: x86: Booting SMP configuration: Oct 2 19:13:46.041144 kernel: .... node #0, CPUs: #1 Oct 2 19:13:46.041156 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Oct 2 19:13:46.041165 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:13:46.041173 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:13:46.041182 kernel: smpboot: Max logical packages: 1 Oct 2 19:13:46.041190 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Oct 2 19:13:46.041199 kernel: devtmpfs: initialized Oct 2 19:13:46.041208 kernel: x86/mm: Memory block size: 128MB Oct 2 19:13:46.041215 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Oct 2 19:13:46.041228 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:13:46.041235 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:13:46.041243 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:13:46.041253 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:13:46.041262 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:13:46.041271 kernel: audit: type=2000 audit(1696274025.023:1): state=initialized audit_enabled=0 res=1 Oct 2 19:13:46.041280 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:13:46.041289 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:13:46.041299 kernel: cpuidle: using governor menu Oct 2 19:13:46.041309 kernel: ACPI: bus type PCI registered Oct 2 19:13:46.041318 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:13:46.041329 kernel: dca service started, version 1.12.1 Oct 2 19:13:46.041336 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:13:46.041345 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:13:46.041355 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:13:46.041362 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:13:46.041371 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:13:46.041379 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:13:46.041389 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:13:46.041399 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:13:46.041407 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:13:46.041417 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:13:46.041426 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 19:13:46.041438 kernel: ACPI: Interpreter enabled Oct 2 19:13:46.041445 kernel: ACPI: PM: (supports S0 S5) Oct 2 19:13:46.041457 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:13:46.041466 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:13:46.041478 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Oct 2 19:13:46.041488 kernel: iommu: Default domain type: Translated Oct 2 19:13:46.041497 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:13:46.041506 kernel: vgaarb: loaded Oct 2 19:13:46.041515 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:13:46.041524 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it> Oct 2 19:13:46.041534 kernel: PTP clock support registered Oct 2 19:13:46.041542 kernel: Registered efivars operations Oct 2 19:13:46.041551 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:13:46.041561 kernel: PCI: System does not support PCI Oct 2 19:13:46.041571 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Oct 2 19:13:46.041578 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:13:46.041589 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:13:46.041597 kernel: pnp: PnP ACPI init Oct 2 19:13:46.041606 kernel: pnp: PnP ACPI: found 3 devices Oct 2 19:13:46.041628 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:13:46.041637 kernel: NET: Registered PF_INET protocol family Oct 2 19:13:46.041649 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:13:46.041662 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Oct 2 19:13:46.041670 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:13:46.041679 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:13:46.041686 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 2 19:13:46.041694 kernel: TCP: Hash tables configured (established 65536 bind 65536) Oct 2 19:13:46.041701 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:13:46.041708 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:13:46.041716 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:13:46.041723 kernel: NET: Registered PF_XDP protocol family Oct 2 19:13:46.041732 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:13:46.041739 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 2 19:13:46.041747 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Oct 2 19:13:46.041757 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:13:46.041765 kernel: Initialise system trusted keyrings Oct 2 19:13:46.041774 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Oct 2 19:13:46.041783 kernel: Key type asymmetric registered Oct 2 19:13:46.041792 kernel: Asymmetric key parser 'x509' registered Oct 2 19:13:46.041800 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:13:46.041812 kernel: io scheduler mq-deadline registered Oct 2 19:13:46.041820 kernel: io scheduler kyber registered Oct 2 19:13:46.041830 kernel: io scheduler bfq registered Oct 2 19:13:46.041839 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:13:46.041850 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:13:46.041858 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:13:46.041869 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Oct 2 19:13:46.041880 kernel: i8042: PNP: No PS/2 controller found. Oct 2 19:13:46.042034 kernel: rtc_cmos 00:02: registered as rtc0 Oct 2 19:13:46.042128 kernel: rtc_cmos 00:02: setting system clock to 2023-10-02T19:13:45 UTC (1696274025) Oct 2 19:13:46.042209 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Oct 2 19:13:46.042220 kernel: fail to initialize ptp_kvm Oct 2 19:13:46.042228 kernel: intel_pstate: CPU model not supported Oct 2 19:13:46.042238 kernel: efifb: probing for efifb Oct 2 19:13:46.042246 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Oct 2 19:13:46.042256 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Oct 2 19:13:46.042263 kernel: efifb: scrolling: redraw Oct 2 19:13:46.042277 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Oct 2 19:13:46.042284 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 19:13:46.042295 kernel: fb0: EFI VGA frame buffer device Oct 2 19:13:46.042302 kernel: pstore: Registered efi as persistent store backend Oct 2 19:13:46.042311 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:13:46.042320 kernel: Segment Routing with IPv6 Oct 2 19:13:46.042330 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:13:46.042338 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:13:46.042346 kernel: Key type dns_resolver registered Oct 2 19:13:46.042358 kernel: IPI shorthand broadcast: enabled Oct 2 19:13:46.042366 kernel: sched_clock: Marking stable (779374300, 22929700)->(1011059700, -208755700) Oct 2 19:13:46.042375 kernel: registered taskstats version 1 Oct 2 19:13:46.042383 kernel: Loading compiled-in X.509 certificates Oct 2 19:13:46.042392 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:13:46.042400 kernel: Key type .fscrypt registered Oct 2 19:13:46.042409 kernel: Key type fscrypt-provisioning registered Oct 2 19:13:46.042418 kernel: pstore: Using crash dump compression: deflate Oct 2 19:13:46.042428 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:13:46.042438 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:13:46.042446 kernel: ima: No architecture policies found Oct 2 19:13:46.042456 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:13:46.042463 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:13:46.042473 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:13:46.042482 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:13:46.042492 kernel: Run /init as init process Oct 2 19:13:46.042499 kernel: with arguments: Oct 2 19:13:46.042507 kernel: /init Oct 2 19:13:46.042519 kernel: with environment: Oct 2 19:13:46.042528 kernel: HOME=/ Oct 2 19:13:46.042536 kernel: TERM=linux Oct 2 19:13:46.042543 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:13:46.042555 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:13:46.042567 systemd[1]: Detected virtualization microsoft. Oct 2 19:13:46.042576 systemd[1]: Detected architecture x86-64. Oct 2 19:13:46.042586 systemd[1]: Running in initrd. Oct 2 19:13:46.042596 systemd[1]: No hostname configured, using default hostname. Oct 2 19:13:46.042605 systemd[1]: Hostname set to <localhost>. Oct 2 19:13:46.042629 systemd[1]: Initializing machine ID from random generator. Oct 2 19:13:46.042638 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:13:46.042648 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:13:46.042657 systemd[1]: Reached target cryptsetup.target. Oct 2 19:13:46.042665 systemd[1]: Reached target paths.target. Oct 2 19:13:46.042675 systemd[1]: Reached target slices.target. Oct 2 19:13:46.042687 systemd[1]: Reached target swap.target. Oct 2 19:13:46.042696 systemd[1]: Reached target timers.target. Oct 2 19:13:46.042704 systemd[1]: Listening on iscsid.socket. Oct 2 19:13:46.042715 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:13:46.042724 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:13:46.042733 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:13:46.042741 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:13:46.042754 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:13:46.042763 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:13:46.042772 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:13:46.042780 systemd[1]: Reached target sockets.target. Oct 2 19:13:46.042792 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:13:46.042800 systemd[1]: Finished network-cleanup.service. Oct 2 19:13:46.042811 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:13:46.042818 systemd[1]: Starting systemd-journald.service... Oct 2 19:13:46.042828 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:13:46.042839 systemd[1]: Starting systemd-resolved.service... Oct 2 19:13:46.042850 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:13:46.042858 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:13:46.042867 kernel: audit: type=1130 audit(1696274026.041:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.042880 systemd-journald[183]: Journal started Oct 2 19:13:46.042929 systemd-journald[183]: Runtime Journal (/run/log/journal/b8f433bcc85b40adae6924cfff56e5f5) is 8.0M, max 159.0M, 151.0M free. Oct 2 19:13:46.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.056933 systemd[1]: Started systemd-journald.service. Oct 2 19:13:46.056952 systemd-modules-load[184]: Inserted module 'overlay' Oct 2 19:13:46.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.088628 kernel: audit: type=1130 audit(1696274026.075:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.088846 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:13:46.101491 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:13:46.101525 kernel: Bridge firewalling registered Oct 2 19:13:46.092389 systemd-resolved[185]: Positive Trust Anchors: Oct 2 19:13:46.092398 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:13:46.092432 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:13:46.155369 kernel: SCSI subsystem initialized Oct 2 19:13:46.155416 kernel: audit: type=1130 audit(1696274026.103:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.095058 systemd-resolved[185]: Defaulting to hostname 'linux'. Oct 2 19:13:46.192220 kernel: audit: type=1130 audit(1696274026.106:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.192242 kernel: audit: type=1130 audit(1696274026.106:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.102074 systemd-modules-load[184]: Inserted module 'br_netfilter' Oct 2 19:13:46.203061 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:13:46.203087 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:13:46.104514 systemd[1]: Started systemd-resolved.service. Oct 2 19:13:46.209622 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:13:46.107065 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:13:46.109545 systemd[1]: Reached target nss-lookup.target. Oct 2 19:13:46.112957 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:13:46.137026 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:13:46.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.180566 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:13:46.249339 kernel: audit: type=1130 audit(1696274026.217:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.249360 kernel: audit: type=1130 audit(1696274026.233:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.214124 systemd-modules-load[184]: Inserted module 'dm_multipath' Oct 2 19:13:46.218879 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:13:46.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.233709 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:13:46.269967 kernel: audit: type=1130 audit(1696274026.251:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.265176 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:13:46.288837 dracut-cmdline[202]: dracut-dracut-053 Oct 2 19:13:46.288837 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Oct 2 19:13:46.288837 dracut-cmdline[202]: BEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:13:46.300280 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:13:46.302857 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:13:46.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.330627 kernel: audit: type=1130 audit(1696274026.316:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.361626 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:13:46.374629 kernel: iscsi: registered transport (tcp) Oct 2 19:13:46.399262 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:13:46.399319 kernel: QLogic iSCSI HBA Driver Oct 2 19:13:46.428124 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:13:46.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.433596 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:13:46.483634 kernel: raid6: avx512x4 gen() 18650 MB/s Oct 2 19:13:46.503627 kernel: raid6: avx512x4 xor() 8093 MB/s Oct 2 19:13:46.523623 kernel: raid6: avx512x2 gen() 18612 MB/s Oct 2 19:13:46.543628 kernel: raid6: avx512x2 xor() 29829 MB/s Oct 2 19:13:46.563622 kernel: raid6: avx512x1 gen() 18521 MB/s Oct 2 19:13:46.583624 kernel: raid6: avx512x1 xor() 26977 MB/s Oct 2 19:13:46.605621 kernel: raid6: avx2x4 gen() 18487 MB/s Oct 2 19:13:46.625622 kernel: raid6: avx2x4 xor() 7952 MB/s Oct 2 19:13:46.645621 kernel: raid6: avx2x2 gen() 18486 MB/s Oct 2 19:13:46.666626 kernel: raid6: avx2x2 xor() 22249 MB/s Oct 2 19:13:46.686620 kernel: raid6: avx2x1 gen() 14049 MB/s Oct 2 19:13:46.706623 kernel: raid6: avx2x1 xor() 19437 MB/s Oct 2 19:13:46.727618 kernel: raid6: sse2x4 gen() 11734 MB/s Oct 2 19:13:46.747621 kernel: raid6: sse2x4 xor() 7286 MB/s Oct 2 19:13:46.767623 kernel: raid6: sse2x2 gen() 12905 MB/s Oct 2 19:13:46.787626 kernel: raid6: sse2x2 xor() 7725 MB/s Oct 2 19:13:46.807623 kernel: raid6: sse2x1 gen() 11629 MB/s Oct 2 19:13:46.831252 kernel: raid6: sse2x1 xor() 5927 MB/s Oct 2 19:13:46.831279 kernel: raid6: using algorithm avx512x4 gen() 18650 MB/s Oct 2 19:13:46.831292 kernel: raid6: .... xor() 8093 MB/s, rmw enabled Oct 2 19:13:46.837798 kernel: raid6: using avx512x2 recovery algorithm Oct 2 19:13:46.853636 kernel: xor: automatically using best checksumming function avx Oct 2 19:13:46.947636 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:13:46.956059 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:13:46.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.960000 audit: BPF prog-id=7 op=LOAD Oct 2 19:13:46.960000 audit: BPF prog-id=8 op=LOAD Oct 2 19:13:46.961366 systemd[1]: Starting systemd-udevd.service... Oct 2 19:13:46.975662 systemd-udevd[383]: Using default interface naming scheme 'v252'. Oct 2 19:13:46.980329 systemd[1]: Started systemd-udevd.service. Oct 2 19:13:46.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:46.986388 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:13:47.004624 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation Oct 2 19:13:47.034318 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:13:47.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.037429 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:13:47.074909 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:13:47.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:47.119633 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:13:47.147839 kernel: hv_vmbus: Vmbus version:5.2 Oct 2 19:13:47.151630 kernel: hv_vmbus: registering driver hyperv_keyboard Oct 2 19:13:47.152633 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Oct 2 19:13:47.162652 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:13:47.162695 kernel: AES CTR mode by8 optimization enabled Oct 2 19:13:47.165630 kernel: hv_vmbus: registering driver hv_netvsc Oct 2 19:13:47.178641 kernel: hv_vmbus: registering driver hv_storvsc Oct 2 19:13:47.181791 kernel: scsi host0: storvsc_host_t Oct 2 19:13:47.182766 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Oct 2 19:13:47.183625 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Oct 2 19:13:47.183680 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 19:13:47.183702 kernel: scsi host1: storvsc_host_t Oct 2 19:13:47.231630 kernel: hv_vmbus: registering driver hid_hyperv Oct 2 19:13:47.235632 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Oct 2 19:13:47.235677 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Oct 2 19:13:47.262634 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Oct 2 19:13:47.262859 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 2 19:13:47.274221 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Oct 2 19:13:47.274425 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Oct 2 19:13:47.274548 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 2 19:13:47.281558 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Oct 2 19:13:47.281802 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Oct 2 19:13:47.282633 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Oct 2 19:13:47.288628 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:13:47.292627 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 2 19:13:47.401252 kernel: hv_netvsc 002248a4-768d-0022-48a4-768d002248a4 eth0: VF slot 1 added Oct 2 19:13:47.411724 kernel: hv_vmbus: registering driver hv_pci Oct 2 19:13:47.417625 kernel: hv_pci dc06534c-6813-4eb4-b850-db5bfb6a5e2d: PCI VMBus probing: Using version 0x10004 Oct 2 19:13:47.429746 kernel: hv_pci dc06534c-6813-4eb4-b850-db5bfb6a5e2d: PCI host bridge to bus 6813:00 Oct 2 19:13:47.429913 kernel: pci_bus 6813:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Oct 2 19:13:47.430048 kernel: pci_bus 6813:00: No busn resource found for root bus, will use [bus 00-ff] Oct 2 19:13:47.440950 kernel: pci 6813:00:02.0: [15b3:1016] type 00 class 0x020000 Oct 2 19:13:47.448678 kernel: pci 6813:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Oct 2 19:13:47.471419 kernel: pci 6813:00:02.0: enabling Extended Tags Oct 2 19:13:47.486625 kernel: pci 6813:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 6813:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Oct 2 19:13:47.486860 kernel: pci_bus 6813:00: busn_res: [bus 00-ff] end is updated to 00 Oct 2 19:13:47.495891 kernel: pci 6813:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Oct 2 19:13:47.594665 kernel: mlx5_core 6813:00:02.0: firmware version: 14.30.1224 Oct 2 19:13:47.652732 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:13:47.665628 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (435) Oct 2 19:13:47.686184 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:13:47.765632 kernel: mlx5_core 6813:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Oct 2 19:13:47.872323 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:13:47.875237 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:13:47.889336 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:13:47.895446 systemd[1]: Starting disk-uuid.service... Oct 2 19:13:47.915632 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:13:47.929251 kernel: mlx5_core 6813:00:02.0: Supported tc offload range - chains: 1, prios: 1 Oct 2 19:13:47.929462 kernel: mlx5_core 6813:00:02.0: mlx5e_tc_post_act_init:40:(pid 7): firmware level support is missing Oct 2 19:13:47.929588 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:13:47.949349 kernel: hv_netvsc 002248a4-768d-0022-48a4-768d002248a4 eth0: VF registering: eth1 Oct 2 19:13:47.949516 kernel: mlx5_core 6813:00:02.0 eth1: joined to eth0 Oct 2 19:13:47.962637 kernel: mlx5_core 6813:00:02.0 enP26643s1: renamed from eth1 Oct 2 19:13:48.926636 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:13:48.928272 disk-uuid[552]: The operation has completed successfully. Oct 2 19:13:49.002785 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:13:49.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:49.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:49.002887 systemd[1]: Finished disk-uuid.service. Oct 2 19:13:49.014265 systemd[1]: Starting verity-setup.service... Oct 2 19:13:49.050634 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:13:49.329816 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:13:49.334324 systemd[1]: Finished verity-setup.service. Oct 2 19:13:49.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:49.344422 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:13:49.424625 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:13:49.424871 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:13:49.428765 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:13:49.433247 systemd[1]: Starting ignition-setup.service... Oct 2 19:13:49.438366 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:13:49.459672 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:13:49.459726 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:13:49.459745 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:13:49.506381 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:13:49.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:49.510000 audit: BPF prog-id=9 op=LOAD Oct 2 19:13:49.512197 systemd[1]: Starting systemd-networkd.service... Oct 2 19:13:49.521382 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:13:49.539543 systemd-networkd[797]: lo: Link UP Oct 2 19:13:49.539552 systemd-networkd[797]: lo: Gained carrier Oct 2 19:13:49.543685 systemd-networkd[797]: Enumeration completed Oct 2 19:13:49.543778 systemd[1]: Started systemd-networkd.service. Oct 2 19:13:49.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:49.549808 systemd[1]: Reached target network.target. Oct 2 19:13:49.550940 systemd-networkd[797]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:13:49.557836 systemd[1]: Starting iscsiuio.service... Oct 2 19:13:49.566434 systemd[1]: Started iscsiuio.service. Oct 2 19:13:49.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:49.569940 systemd[1]: Starting iscsid.service... Oct 2 19:13:49.575570 iscsid[803]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:13:49.575570 iscsid[803]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier]. Oct 2 19:13:49.575570 iscsid[803]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:13:49.575570 iscsid[803]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:13:49.575570 iscsid[803]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:13:49.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:49.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:49.613700 iscsid[803]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:13:49.577156 systemd[1]: Started iscsid.service. Oct 2 19:13:49.581784 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:13:49.596326 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:13:49.600762 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:13:49.634041 kernel: mlx5_core 6813:00:02.0 enP26643s1: Link up Oct 2 19:13:49.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:49.606125 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:13:49.611598 systemd[1]: Reached target remote-fs.target. Oct 2 19:13:49.614626 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:13:49.626469 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:13:49.647025 systemd[1]: Finished ignition-setup.service. Oct 2 19:13:49.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:49.651870 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:13:49.713772 kernel: hv_netvsc 002248a4-768d-0022-48a4-768d002248a4 eth0: Data path switched to VF: enP26643s1 Oct 2 19:13:49.714062 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:13:49.714434 systemd-networkd[797]: enP26643s1: Link UP Oct 2 19:13:49.714693 systemd-networkd[797]: eth0: Link UP Oct 2 19:13:49.714846 systemd-networkd[797]: eth0: Gained carrier Oct 2 19:13:49.724762 systemd-networkd[797]: enP26643s1: Gained carrier Oct 2 19:13:49.751707 systemd-networkd[797]: eth0: DHCPv4 address 10.200.8.37/24, gateway 10.200.8.1 acquired from 168.63.129.16 Oct 2 19:13:51.366864 systemd-networkd[797]: eth0: Gained IPv6LL Oct 2 19:13:52.913920 ignition[819]: Ignition 2.14.0 Oct 2 19:13:52.913936 ignition[819]: Stage: fetch-offline Oct 2 19:13:52.914036 ignition[819]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:13:52.914100 ignition[819]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:13:53.133329 ignition[819]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:13:53.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:53.134770 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:13:53.158900 kernel: kauditd_printk_skb: 18 callbacks suppressed Oct 2 19:13:53.158932 kernel: audit: type=1130 audit(1696274033.139:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:53.133533 ignition[819]: parsed url from cmdline: "" Oct 2 19:13:53.140843 systemd[1]: Starting ignition-fetch.service... Oct 2 19:13:53.133537 ignition[819]: no config URL provided Oct 2 19:13:53.133542 ignition[819]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:13:53.133550 ignition[819]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:13:53.133556 ignition[819]: failed to fetch config: resource requires networking Oct 2 19:13:53.133892 ignition[819]: Ignition finished successfully Oct 2 19:13:53.148884 ignition[825]: Ignition 2.14.0 Oct 2 19:13:53.148891 ignition[825]: Stage: fetch Oct 2 19:13:53.148985 ignition[825]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:13:53.149009 ignition[825]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:13:53.152444 ignition[825]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:13:53.153462 ignition[825]: parsed url from cmdline: "" Oct 2 19:13:53.153469 ignition[825]: no config URL provided Oct 2 19:13:53.153488 ignition[825]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:13:53.153499 ignition[825]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:13:53.153542 ignition[825]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Oct 2 19:13:53.184486 ignition[825]: GET result: OK Oct 2 19:13:53.187113 ignition[825]: config has been read from IMDS userdata Oct 2 19:13:53.193698 ignition[825]: parsing config with SHA512: f42fbc834f09b1cb481c8bfd63dc9edb017f29260d73d278f6546ba8ceb04e5beadaa0a17dd85aacb6253e2bedb885ae51f1e6ab060a22bd9ea245d82fc9cedb Oct 2 19:13:53.213119 unknown[825]: fetched base config from "system" Oct 2 19:13:53.213134 unknown[825]: fetched base config from "system" Oct 2 19:13:53.213656 ignition[825]: fetch: fetch complete Oct 2 19:13:53.213143 unknown[825]: fetched user config from "azure" Oct 2 19:13:53.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:53.213661 ignition[825]: fetch: fetch passed Oct 2 19:13:53.241796 kernel: audit: type=1130 audit(1696274033.221:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:53.218857 systemd[1]: Finished ignition-fetch.service. Oct 2 19:13:53.213700 ignition[825]: Ignition finished successfully Oct 2 19:13:53.222848 systemd[1]: Starting ignition-kargs.service... Oct 2 19:13:53.253054 ignition[831]: Ignition 2.14.0 Oct 2 19:13:53.253065 ignition[831]: Stage: kargs Oct 2 19:13:53.253184 ignition[831]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:13:53.253210 ignition[831]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:13:53.257991 ignition[831]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:13:53.260174 ignition[831]: kargs: kargs passed Oct 2 19:13:53.262446 systemd[1]: Finished ignition-kargs.service. Oct 2 19:13:53.260220 ignition[831]: Ignition finished successfully Oct 2 19:13:53.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:53.265369 systemd[1]: Starting ignition-disks.service... Oct 2 19:13:53.286418 kernel: audit: type=1130 audit(1696274033.263:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:53.285163 ignition[837]: Ignition 2.14.0 Oct 2 19:13:53.285168 ignition[837]: Stage: disks Oct 2 19:13:53.285259 ignition[837]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:13:53.285276 ignition[837]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:13:53.293110 systemd[1]: Finished ignition-disks.service. Oct 2 19:13:53.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:53.289902 ignition[837]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:13:53.314690 kernel: audit: type=1130 audit(1696274033.294:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:53.295581 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:13:53.291383 ignition[837]: disks: disks passed Oct 2 19:13:53.309973 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:13:53.291419 ignition[837]: Ignition finished successfully Oct 2 19:13:53.314768 systemd[1]: Reached target local-fs.target. Oct 2 19:13:53.319025 systemd[1]: Reached target sysinit.target. Oct 2 19:13:53.323564 systemd[1]: Reached target basic.target. Oct 2 19:13:53.328067 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:13:53.392665 systemd-fsck[845]: ROOT: clean, 603/7326000 files, 481068/7359488 blocks Oct 2 19:13:53.404284 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:13:53.423434 kernel: audit: type=1130 audit(1696274033.405:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:53.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:53.407346 systemd[1]: Mounting sysroot.mount... Oct 2 19:13:53.442628 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:13:53.442948 systemd[1]: Mounted sysroot.mount. Oct 2 19:13:53.446791 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:13:53.484088 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:13:53.489651 systemd[1]: Starting flatcar-metadata-hostname.service... Oct 2 19:13:53.494406 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:13:53.494442 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:13:53.501979 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:13:53.543528 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:13:53.550073 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:13:53.565628 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (856) Oct 2 19:13:53.565666 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:13:53.574309 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:13:53.574339 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:13:53.583138 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:13:53.588411 initrd-setup-root[861]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:13:53.609197 initrd-setup-root[887]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:13:53.640945 initrd-setup-root[895]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:13:53.650031 initrd-setup-root[903]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:13:54.073261 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:13:54.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:54.079011 systemd[1]: Starting ignition-mount.service... Oct 2 19:13:54.095573 kernel: audit: type=1130 audit(1696274034.077:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:54.093515 systemd[1]: Starting sysroot-boot.service... Oct 2 19:13:54.100499 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:13:54.100660 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:13:54.120513 systemd[1]: Finished sysroot-boot.service. Oct 2 19:13:54.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:54.134128 ignition[922]: INFO : Ignition 2.14.0 Oct 2 19:13:54.134128 ignition[922]: INFO : Stage: mount Oct 2 19:13:54.134128 ignition[922]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:13:54.134128 ignition[922]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:13:54.165127 kernel: audit: type=1130 audit(1696274034.124:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:54.165151 kernel: audit: type=1130 audit(1696274034.149:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:54.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:54.144441 systemd[1]: Finished ignition-mount.service. Oct 2 19:13:54.167369 ignition[922]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:13:54.167369 ignition[922]: INFO : mount: mount passed Oct 2 19:13:54.167369 ignition[922]: INFO : Ignition finished successfully Oct 2 19:13:54.886336 coreos-metadata[855]: Oct 02 19:13:54.886 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Oct 2 19:13:54.902739 coreos-metadata[855]: Oct 02 19:13:54.902 INFO Fetch successful Oct 2 19:13:54.939661 coreos-metadata[855]: Oct 02 19:13:54.939 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Oct 2 19:13:54.957593 coreos-metadata[855]: Oct 02 19:13:54.957 INFO Fetch successful Oct 2 19:13:54.972760 coreos-metadata[855]: Oct 02 19:13:54.972 INFO wrote hostname ci-3510.3.0-a-e4b0ec5c33 to /sysroot/etc/hostname Oct 2 19:13:54.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:54.974793 systemd[1]: Finished flatcar-metadata-hostname.service. Oct 2 19:13:54.996924 kernel: audit: type=1130 audit(1696274034.979:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:13:54.980947 systemd[1]: Starting ignition-files.service... Oct 2 19:13:55.000132 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:13:55.013633 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (935) Oct 2 19:13:55.013664 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:13:55.022182 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:13:55.022203 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:13:55.031912 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:13:55.045453 ignition[954]: INFO : Ignition 2.14.0 Oct 2 19:13:55.045453 ignition[954]: INFO : Stage: files Oct 2 19:13:55.049276 ignition[954]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:13:55.049276 ignition[954]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:13:55.061511 ignition[954]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:13:55.082483 ignition[954]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:13:55.085789 ignition[954]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:13:55.085789 ignition[954]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:13:55.150663 ignition[954]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:13:55.157574 ignition[954]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:13:55.171379 unknown[954]: wrote ssh authorized keys file for user: core Oct 2 19:13:55.174340 ignition[954]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:13:55.178342 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:13:55.183392 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Oct 2 19:13:55.853816 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 19:13:56.030595 ignition[954]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Oct 2 19:13:56.038806 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:13:56.038806 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Oct 2 19:13:56.038806 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:13:56.150899 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 19:13:56.235426 ignition[954]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Oct 2 19:13:56.244986 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Oct 2 19:13:56.244986 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:13:56.244986 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:13:56.420528 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 19:13:58.327663 ignition[954]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Oct 2 19:13:58.335629 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:13:58.335629 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:13:58.335629 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:13:58.457576 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 19:14:02.471652 ignition[954]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Oct 2 19:14:02.481521 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:14:02.481521 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:14:02.481521 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:14:02.603828 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 19:14:04.585522 ignition[954]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Oct 2 19:14:04.594516 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:14:04.594516 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:14:04.594516 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:14:04.594516 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:14:04.611860 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:14:04.611860 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:14:04.611860 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:14:04.625535 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 19:14:04.625535 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:14:04.644112 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2551007971" Oct 2 19:14:04.649100 ignition[954]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2551007971": device or resource busy Oct 2 19:14:04.649100 ignition[954]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2551007971", trying btrfs: device or resource busy Oct 2 19:14:04.649100 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2551007971" Oct 2 19:14:04.672599 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (958) Oct 2 19:14:04.674455 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2551007971" Oct 2 19:14:04.682107 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem2551007971" Oct 2 19:14:04.687548 systemd[1]: mnt-oem2551007971.mount: Deactivated successfully. Oct 2 19:14:04.690391 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem2551007971" Oct 2 19:14:04.694443 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 19:14:04.699071 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:14:04.703883 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:14:04.713018 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2474896686" Oct 2 19:14:04.717970 ignition[954]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2474896686": device or resource busy Oct 2 19:14:04.717970 ignition[954]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2474896686", trying btrfs: device or resource busy Oct 2 19:14:04.717970 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2474896686" Oct 2 19:14:04.734481 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2474896686" Oct 2 19:14:04.739666 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem2474896686" Oct 2 19:14:04.745867 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem2474896686" Oct 2 19:14:04.745867 ignition[954]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(13): [started] processing unit "waagent.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(13): [finished] processing unit "waagent.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(14): [started] processing unit "nvidia.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(14): [finished] processing unit "nvidia.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(19): [started] setting preset to enabled for "waagent.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(19): [finished] setting preset to enabled for "waagent.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(1a): [started] setting preset to enabled for "nvidia.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(1a): [finished] setting preset to enabled for "nvidia.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:14:04.745867 ignition[954]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:14:04.837523 kernel: audit: type=1130 audit(1696274044.802:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:04.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:04.741220 systemd[1]: mnt-oem2474896686.mount: Deactivated successfully. Oct 2 19:14:04.840129 ignition[954]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:14:04.840129 ignition[954]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:14:04.840129 ignition[954]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:14:04.840129 ignition[954]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:14:04.840129 ignition[954]: INFO : files: files passed Oct 2 19:14:04.840129 ignition[954]: INFO : Ignition finished successfully Oct 2 19:14:04.905143 kernel: audit: type=1130 audit(1696274044.865:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:04.905178 kernel: audit: type=1131 audit(1696274044.876:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:04.905203 kernel: audit: type=1130 audit(1696274044.889:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:04.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:04.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:04.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:04.795053 systemd[1]: Finished ignition-files.service. Oct 2 19:14:04.816506 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:14:04.912545 initrd-setup-root-after-ignition[979]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:14:04.846409 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:14:04.847208 systemd[1]: Starting ignition-quench.service... Oct 2 19:14:04.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:04.856961 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:14:04.955359 kernel: audit: type=1130 audit(1696274044.924:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:04.955391 kernel: audit: type=1131 audit(1696274044.926:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:04.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:04.857052 systemd[1]: Finished ignition-quench.service. Oct 2 19:14:04.877576 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:14:04.890218 systemd[1]: Reached target ignition-complete.target. Oct 2 19:14:04.905955 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:14:04.922679 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:14:04.922763 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:14:04.926896 systemd[1]: Reached target initrd-fs.target. Oct 2 19:14:04.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:04.950844 systemd[1]: Reached target initrd.target. Oct 2 19:14:04.992377 kernel: audit: type=1130 audit(1696274044.975:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:04.955402 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:14:04.960503 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:14:04.973348 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:14:04.976835 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:14:05.008184 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:14:05.012785 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:14:05.017356 systemd[1]: Stopped target timers.target. Oct 2 19:14:05.021399 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:14:05.023877 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:14:05.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.038648 systemd[1]: Stopped target initrd.target. Oct 2 19:14:05.043105 kernel: audit: type=1131 audit(1696274045.025:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.043294 systemd[1]: Stopped target basic.target. Oct 2 19:14:05.047209 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:14:05.051953 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:14:05.056484 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:14:05.061094 systemd[1]: Stopped target remote-fs.target. Oct 2 19:14:05.065230 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:14:05.069777 systemd[1]: Stopped target sysinit.target. Oct 2 19:14:05.073982 systemd[1]: Stopped target local-fs.target. Oct 2 19:14:05.078096 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:14:05.084421 systemd[1]: Stopped target swap.target. Oct 2 19:14:05.088175 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:14:05.090682 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:14:05.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.095011 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:14:05.112159 kernel: audit: type=1131 audit(1696274045.094:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.112226 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:14:05.114691 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:14:05.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.119057 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:14:05.136065 kernel: audit: type=1131 audit(1696274045.118:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.119165 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:14:05.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.138490 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:14:05.140896 systemd[1]: Stopped ignition-files.service. Oct 2 19:14:05.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.145101 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Oct 2 19:14:05.147860 systemd[1]: Stopped flatcar-metadata-hostname.service. Oct 2 19:14:05.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.160676 iscsid[803]: iscsid shutting down. Oct 2 19:14:05.153502 systemd[1]: Stopping ignition-mount.service... Oct 2 19:14:05.164369 ignition[992]: INFO : Ignition 2.14.0 Oct 2 19:14:05.164369 ignition[992]: INFO : Stage: umount Oct 2 19:14:05.164369 ignition[992]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:14:05.164369 ignition[992]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:14:05.158543 systemd[1]: Stopping iscsid.service... Oct 2 19:14:05.179182 ignition[992]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:14:05.179182 ignition[992]: INFO : umount: umount passed Oct 2 19:14:05.179182 ignition[992]: INFO : Ignition finished successfully Oct 2 19:14:05.179758 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:14:05.190066 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:14:05.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.190263 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:14:05.194512 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:14:05.194682 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:14:05.198141 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:14:05.198666 systemd[1]: Stopped iscsid.service. Oct 2 19:14:05.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.212048 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:14:05.212234 systemd[1]: Stopped ignition-mount.service. Oct 2 19:14:05.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.218926 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:14:05.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.219062 systemd[1]: Stopped ignition-disks.service. Oct 2 19:14:05.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.221356 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:14:05.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.221406 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:14:05.226046 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:14:05.226095 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:14:05.228379 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:14:05.228425 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:14:05.235666 systemd[1]: Stopped target paths.target. Oct 2 19:14:05.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.238621 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:14:05.243644 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:14:05.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.248234 systemd[1]: Stopped target slices.target. Oct 2 19:14:05.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.250093 systemd[1]: Stopped target sockets.target. Oct 2 19:14:05.252056 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:14:05.252100 systemd[1]: Closed iscsid.socket. Oct 2 19:14:05.256092 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:14:05.256138 systemd[1]: Stopped ignition-setup.service. Oct 2 19:14:05.262350 systemd[1]: Stopping iscsiuio.service... Oct 2 19:14:05.264904 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:14:05.264995 systemd[1]: Stopped iscsiuio.service. Oct 2 19:14:05.270098 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:14:05.270531 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:14:05.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.270624 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:14:05.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.273986 systemd[1]: Stopped target network.target. Oct 2 19:14:05.277189 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:14:05.277227 systemd[1]: Closed iscsiuio.socket. Oct 2 19:14:05.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.279132 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:14:05.317000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:14:05.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.281396 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:14:05.289030 systemd-networkd[797]: eth0: DHCPv6 lease lost Oct 2 19:14:05.328000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:14:05.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.293635 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:14:05.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.293733 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:14:05.305963 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:14:05.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.306061 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:14:05.312359 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:14:05.312453 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:14:05.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.318541 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:14:05.318576 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:14:05.322563 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:14:05.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.322618 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:14:05.326824 systemd[1]: Stopping network-cleanup.service... Oct 2 19:14:05.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.328855 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:14:05.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.328926 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:14:05.333211 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:14:05.333269 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:14:05.335651 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:14:05.335694 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:14:05.340519 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:14:05.344605 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:14:05.344743 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:14:05.349698 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:14:05.349754 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:14:05.355711 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:14:05.355804 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:14:05.357989 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:14:05.358029 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:14:05.434374 kernel: hv_netvsc 002248a4-768d-0022-48a4-768d002248a4 eth0: Data path switched from VF: enP26643s1 Oct 2 19:14:05.362021 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:14:05.362071 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:14:05.364098 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:14:05.364142 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:14:05.367104 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:14:05.375977 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 19:14:05.376027 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 19:14:05.378473 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:14:05.378522 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:14:05.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:05.385364 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:14:05.385413 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:14:05.387945 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:14:05.388034 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:14:05.456222 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:14:05.456326 systemd[1]: Stopped network-cleanup.service. Oct 2 19:14:05.460307 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:14:05.465688 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:14:05.479059 systemd[1]: Switching root. Oct 2 19:14:05.504678 systemd-journald[183]: Journal stopped Oct 2 19:14:18.736132 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Oct 2 19:14:18.736173 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:14:18.736191 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:14:18.736206 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:14:18.736219 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:14:18.736232 kernel: SELinux: policy capability open_perms=1 Oct 2 19:14:18.736249 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:14:18.736266 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:14:18.736279 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:14:18.736290 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:14:18.736302 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:14:18.736316 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:14:18.736330 systemd[1]: Successfully loaded SELinux policy in 355.421ms. Oct 2 19:14:18.736346 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.875ms. Oct 2 19:14:18.736367 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:14:18.736384 systemd[1]: Detected virtualization microsoft. Oct 2 19:14:18.736399 systemd[1]: Detected architecture x86-64. Oct 2 19:14:18.736415 systemd[1]: Detected first boot. Oct 2 19:14:18.736434 systemd[1]: Hostname set to <ci-3510.3.0-a-e4b0ec5c33>. Oct 2 19:14:18.736450 systemd[1]: Initializing machine ID from random generator. Oct 2 19:14:18.736464 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:14:18.736480 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:14:18.736495 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:14:18.736511 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:14:18.736528 kernel: kauditd_printk_skb: 42 callbacks suppressed Oct 2 19:14:18.736545 kernel: audit: type=1334 audit(1696274058.173:90): prog-id=12 op=LOAD Oct 2 19:14:18.736564 kernel: audit: type=1334 audit(1696274058.173:91): prog-id=3 op=UNLOAD Oct 2 19:14:18.736580 kernel: audit: type=1334 audit(1696274058.184:92): prog-id=13 op=LOAD Oct 2 19:14:18.736596 kernel: audit: type=1334 audit(1696274058.193:93): prog-id=14 op=LOAD Oct 2 19:14:18.736635 kernel: audit: type=1334 audit(1696274058.193:94): prog-id=4 op=UNLOAD Oct 2 19:14:18.736652 kernel: audit: type=1334 audit(1696274058.193:95): prog-id=5 op=UNLOAD Oct 2 19:14:18.736666 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:14:18.736682 kernel: audit: type=1131 audit(1696274058.194:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.736702 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:14:18.736719 kernel: audit: type=1130 audit(1696274058.236:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.736734 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:14:18.736751 kernel: audit: type=1131 audit(1696274058.236:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.736766 kernel: audit: type=1334 audit(1696274058.268:99): prog-id=12 op=UNLOAD Oct 2 19:14:18.736782 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:14:18.736801 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:14:18.736819 systemd[1]: Created slice system-getty.slice. Oct 2 19:14:18.736838 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:14:18.736856 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:14:18.736874 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:14:18.736892 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:14:18.736909 systemd[1]: Created slice user.slice. Oct 2 19:14:18.736926 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:14:18.736943 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:14:18.736959 systemd[1]: Set up automount boot.automount. Oct 2 19:14:18.736979 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:14:18.736996 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:14:18.737013 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:14:18.737029 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:14:18.737045 systemd[1]: Reached target integritysetup.target. Oct 2 19:14:18.737064 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:14:18.737081 systemd[1]: Reached target remote-fs.target. Oct 2 19:14:18.737100 systemd[1]: Reached target slices.target. Oct 2 19:14:18.737117 systemd[1]: Reached target swap.target. Oct 2 19:14:18.737134 systemd[1]: Reached target torcx.target. Oct 2 19:14:18.737150 systemd[1]: Reached target veritysetup.target. Oct 2 19:14:18.737167 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:14:18.737184 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:14:18.737201 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:14:18.737222 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:14:18.737241 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:14:18.737257 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:14:18.737274 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:14:18.737291 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:14:18.737308 systemd[1]: Mounting media.mount... Oct 2 19:14:18.737326 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:14:18.737346 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:14:18.737364 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:14:18.737381 systemd[1]: Mounting tmp.mount... Oct 2 19:14:18.737398 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:14:18.737416 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:14:18.737435 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:14:18.737452 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:14:18.737468 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:14:18.737485 systemd[1]: Starting modprobe@drm.service... Oct 2 19:14:18.737505 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:14:18.737523 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:14:18.737539 systemd[1]: Starting modprobe@loop.service... Oct 2 19:14:18.737558 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:14:18.737575 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:14:18.737594 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:14:18.737623 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:14:18.737640 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:14:18.737661 systemd[1]: Stopped systemd-journald.service. Oct 2 19:14:18.737677 systemd[1]: Starting systemd-journald.service... Oct 2 19:14:18.737695 kernel: loop: module loaded Oct 2 19:14:18.737711 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:14:18.737728 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:14:18.737745 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:14:18.737763 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:14:18.737780 kernel: fuse: init (API version 7.34) Oct 2 19:14:18.737796 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:14:18.737816 systemd[1]: Stopped verity-setup.service. Oct 2 19:14:18.737836 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:14:18.737853 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:14:18.737869 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:14:18.737885 systemd[1]: Mounted media.mount. Oct 2 19:14:18.737903 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:14:18.737920 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:14:18.737944 systemd-journald[1123]: Journal started Oct 2 19:14:18.738013 systemd-journald[1123]: Runtime Journal (/run/log/journal/fbdf4143f308436287d96f9ed77da498) is 8.0M, max 159.0M, 151.0M free. Oct 2 19:14:07.820000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:14:08.641000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:14:08.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:14:08.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:14:08.657000 audit: BPF prog-id=10 op=LOAD Oct 2 19:14:08.657000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:14:08.657000 audit: BPF prog-id=11 op=LOAD Oct 2 19:14:08.657000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:14:18.173000 audit: BPF prog-id=12 op=LOAD Oct 2 19:14:18.173000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:14:18.184000 audit: BPF prog-id=13 op=LOAD Oct 2 19:14:18.193000 audit: BPF prog-id=14 op=LOAD Oct 2 19:14:18.193000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:14:18.193000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:14:18.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.268000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:14:18.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.607000 audit: BPF prog-id=15 op=LOAD Oct 2 19:14:18.607000 audit: BPF prog-id=16 op=LOAD Oct 2 19:14:18.607000 audit: BPF prog-id=17 op=LOAD Oct 2 19:14:18.607000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:14:18.607000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:14:18.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.733000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:14:18.733000 audit[1123]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffee0c03430 a2=4000 a3=7ffee0c034cc items=0 ppid=1 pid=1123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:18.733000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:14:18.172308 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:14:09.910848 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:14:18.195300 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:14:09.911307 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:14:09.911329 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:14:09.911368 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:14:09.911379 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:14:09.911429 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:14:09.911444 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:14:09.911686 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:14:09.911742 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:14:09.911760 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:14:09.912197 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:14:09.912236 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:14:09.912257 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:14:18.744950 systemd[1]: Started systemd-journald.service. Oct 2 19:14:18.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:09.912274 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:14:09.912293 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:14:09.912309 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:14:17.003038 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:17Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:14:18.745378 systemd[1]: Mounted tmp.mount. Oct 2 19:14:17.003286 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:17Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:14:17.003411 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:17Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:14:17.003578 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:17Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:14:17.003650 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:17Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:14:18.747686 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:14:18.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:17.003709 /usr/lib/systemd/system-generators/torcx-generator[1025]: time="2023-10-02T19:14:17Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:14:18.750118 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:14:18.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.752490 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:14:18.752684 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:14:18.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.755340 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:14:18.755471 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:14:18.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.758164 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:14:18.758292 systemd[1]: Finished modprobe@drm.service. Oct 2 19:14:18.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.760978 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:14:18.761103 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:14:18.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.764042 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:14:18.764142 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:14:18.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.766553 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:14:18.766693 systemd[1]: Finished modprobe@loop.service. Oct 2 19:14:18.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.769183 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:14:18.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.771921 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:14:18.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.774546 systemd[1]: Reached target network-pre.target. Oct 2 19:14:18.778130 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:14:18.785841 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:14:18.788092 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:14:18.802602 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:14:18.805931 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:14:18.808293 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:14:18.809517 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:14:18.811720 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:14:18.813690 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:14:18.819359 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:14:18.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.821946 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:14:18.824799 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:14:18.828224 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:14:18.851035 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:14:18.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.853969 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:14:18.871375 systemd-journald[1123]: Time spent on flushing to /var/log/journal/fbdf4143f308436287d96f9ed77da498 is 25.452ms for 1158 entries. Oct 2 19:14:18.871375 systemd-journald[1123]: System Journal (/var/log/journal/fbdf4143f308436287d96f9ed77da498) is 8.0M, max 2.6G, 2.6G free. Oct 2 19:14:18.948646 systemd-journald[1123]: Received client request to flush runtime journal. Oct 2 19:14:18.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:18.880603 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:14:18.884170 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:14:18.953206 udevadm[1149]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:14:18.920125 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:14:18.949701 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:14:19.321737 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:14:19.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:19.325547 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:14:19.673644 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:14:19.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:20.106088 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:14:20.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:20.108000 audit: BPF prog-id=18 op=LOAD Oct 2 19:14:20.108000 audit: BPF prog-id=19 op=LOAD Oct 2 19:14:20.108000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:14:20.108000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:14:20.110163 systemd[1]: Starting systemd-udevd.service... Oct 2 19:14:20.128544 systemd-udevd[1154]: Using default interface naming scheme 'v252'. Oct 2 19:14:20.378276 systemd[1]: Started systemd-udevd.service. Oct 2 19:14:20.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:20.381000 audit: BPF prog-id=20 op=LOAD Oct 2 19:14:20.383513 systemd[1]: Starting systemd-networkd.service... Oct 2 19:14:20.425363 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:14:20.492957 kernel: hv_utils: Registering HyperV Utility Driver Oct 2 19:14:20.493045 kernel: hv_vmbus: registering driver hv_utils Oct 2 19:14:21.805498 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:14:21.805589 kernel: hv_utils: Heartbeat IC version 3.0 Oct 2 19:14:21.805617 kernel: hv_utils: TimeSync IC version 4.0 Oct 2 19:14:21.805641 kernel: hv_utils: Shutdown IC version 3.2 Oct 2 19:14:20.498000 audit: BPF prog-id=21 op=LOAD Oct 2 19:14:20.498000 audit: BPF prog-id=22 op=LOAD Oct 2 19:14:20.498000 audit: BPF prog-id=23 op=LOAD Oct 2 19:14:20.500327 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:14:20.509000 audit[1159]: AVC avc: denied { confidentiality } for pid=1159 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:14:21.841967 kernel: hv_vmbus: registering driver hyperv_fb Oct 2 19:14:21.865209 systemd[1]: Started systemd-userdbd.service. Oct 2 19:14:21.871848 kernel: hv_vmbus: registering driver hv_balloon Oct 2 19:14:21.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:21.892590 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Oct 2 19:14:21.892674 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Oct 2 19:14:21.893363 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Oct 2 19:14:21.902898 kernel: Console: switching to colour dummy device 80x25 Oct 2 19:14:21.911310 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 19:14:20.509000 audit[1159]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556364370710 a1=f884 a2=7ff517ba7bc5 a3=5 items=10 ppid=1154 pid=1159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:20.509000 audit: CWD cwd="/" Oct 2 19:14:20.509000 audit: PATH item=0 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:20.509000 audit: PATH item=1 name=(null) inode=14701 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:20.509000 audit: PATH item=2 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:20.509000 audit: PATH item=3 name=(null) inode=14702 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:20.509000 audit: PATH item=4 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:20.509000 audit: PATH item=5 name=(null) inode=14703 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:20.509000 audit: PATH item=6 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:20.509000 audit: PATH item=7 name=(null) inode=14704 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:20.509000 audit: PATH item=8 name=(null) inode=14700 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:20.509000 audit: PATH item=9 name=(null) inode=14705 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:14:20.509000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:14:22.117970 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1162) Oct 2 19:14:22.161973 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Oct 2 19:14:22.174887 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:14:22.218321 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:14:22.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:22.222367 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:14:22.234843 systemd-networkd[1165]: lo: Link UP Oct 2 19:14:22.234854 systemd-networkd[1165]: lo: Gained carrier Oct 2 19:14:22.235438 systemd-networkd[1165]: Enumeration completed Oct 2 19:14:22.235612 systemd[1]: Started systemd-networkd.service. Oct 2 19:14:22.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:22.241181 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:14:22.262424 systemd-networkd[1165]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:14:22.315964 kernel: mlx5_core 6813:00:02.0 enP26643s1: Link up Oct 2 19:14:22.357972 kernel: hv_netvsc 002248a4-768d-0022-48a4-768d002248a4 eth0: Data path switched to VF: enP26643s1 Oct 2 19:14:22.358858 systemd-networkd[1165]: enP26643s1: Link UP Oct 2 19:14:22.359144 systemd-networkd[1165]: eth0: Link UP Oct 2 19:14:22.359222 systemd-networkd[1165]: eth0: Gained carrier Oct 2 19:14:22.364270 systemd-networkd[1165]: enP26643s1: Gained carrier Oct 2 19:14:22.398075 systemd-networkd[1165]: eth0: DHCPv4 address 10.200.8.37/24, gateway 10.200.8.1 acquired from 168.63.129.16 Oct 2 19:14:23.265024 lvm[1231]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:14:23.295079 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:14:23.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:23.298126 systemd[1]: Reached target cryptsetup.target. Oct 2 19:14:23.301911 systemd[1]: Starting lvm2-activation.service... Oct 2 19:14:23.308211 lvm[1233]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:14:23.328962 systemd[1]: Finished lvm2-activation.service. Oct 2 19:14:23.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:23.331784 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:14:23.334220 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:14:23.334251 systemd[1]: Reached target local-fs.target. Oct 2 19:14:23.336362 systemd[1]: Reached target machines.target. Oct 2 19:14:23.339578 systemd[1]: Starting ldconfig.service... Oct 2 19:14:23.354334 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:14:23.354458 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:14:23.356058 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:14:23.359979 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:14:23.364633 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:14:23.367363 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:14:23.367465 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:14:23.368594 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:14:23.395200 systemd-tmpfiles[1238]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:14:23.408543 systemd-tmpfiles[1238]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:14:23.409473 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:14:23.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:23.419915 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1235 (bootctl) Oct 2 19:14:23.421154 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:14:23.437964 systemd-tmpfiles[1238]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:14:24.017129 systemd-networkd[1165]: eth0: Gained IPv6LL Oct 2 19:14:24.018868 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:14:24.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:24.157610 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:14:24.158168 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:14:24.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:24.769091 systemd-fsck[1243]: fsck.fat 4.2 (2021-01-31) Oct 2 19:14:24.769091 systemd-fsck[1243]: /dev/sda1: 789 files, 115069/258078 clusters Oct 2 19:14:24.771749 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:14:24.780093 kernel: kauditd_printk_skb: 69 callbacks suppressed Oct 2 19:14:24.780175 kernel: audit: type=1130 audit(1696274064.774:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:24.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:24.776535 systemd[1]: Mounting boot.mount... Oct 2 19:14:24.796166 systemd[1]: Mounted boot.mount. Oct 2 19:14:24.810358 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:14:24.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:24.825058 kernel: audit: type=1130 audit(1696274064.812:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:26.040074 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:14:26.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:26.044513 systemd[1]: Starting audit-rules.service... Oct 2 19:14:26.057168 kernel: audit: type=1130 audit(1696274066.042:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:26.058299 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:14:26.065000 audit: BPF prog-id=24 op=LOAD Oct 2 19:14:26.062156 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:14:26.067088 systemd[1]: Starting systemd-resolved.service... Oct 2 19:14:26.072995 kernel: audit: type=1334 audit(1696274066.065:157): prog-id=24 op=LOAD Oct 2 19:14:26.073000 audit: BPF prog-id=25 op=LOAD Oct 2 19:14:26.075130 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:14:26.079961 kernel: audit: type=1334 audit(1696274066.073:158): prog-id=25 op=LOAD Oct 2 19:14:26.083035 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:14:26.135000 audit[1255]: SYSTEM_BOOT pid=1255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:14:26.149486 kernel: audit: type=1127 audit(1696274066.135:159): pid=1255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:14:26.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:26.152855 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:14:26.169378 kernel: audit: type=1130 audit(1696274066.154:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:26.180309 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:14:26.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:26.183233 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:14:26.195131 kernel: audit: type=1130 audit(1696274066.182:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:26.226223 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:14:26.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:26.229286 systemd[1]: Reached target time-set.target. Oct 2 19:14:26.244463 kernel: audit: type=1130 audit(1696274066.228:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:26.286827 systemd-timesyncd[1253]: Contacted time server 88.81.100.130:123 (0.flatcar.pool.ntp.org). Oct 2 19:14:26.286901 systemd-timesyncd[1253]: Initial clock synchronization to Mon 2023-10-02 19:14:26.287219 UTC. Oct 2 19:14:26.292368 systemd-resolved[1252]: Positive Trust Anchors: Oct 2 19:14:26.292388 systemd-resolved[1252]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:14:26.292429 systemd-resolved[1252]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:14:26.310906 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:14:26.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:26.329004 kernel: audit: type=1130 audit(1696274066.313:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:14:26.392000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:14:26.392000 audit[1270]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff130f7ce0 a2=420 a3=0 items=0 ppid=1249 pid=1270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:14:26.392000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:14:26.394240 augenrules[1270]: No rules Oct 2 19:14:26.394668 systemd[1]: Finished audit-rules.service. Oct 2 19:14:26.430283 systemd-resolved[1252]: Using system hostname 'ci-3510.3.0-a-e4b0ec5c33'. Oct 2 19:14:26.431801 systemd[1]: Started systemd-resolved.service. Oct 2 19:14:26.435200 systemd[1]: Reached target network.target. Oct 2 19:14:26.437282 systemd[1]: Reached target network-online.target. Oct 2 19:14:26.439641 systemd[1]: Reached target nss-lookup.target. Oct 2 19:14:31.400994 ldconfig[1234]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:14:31.412756 systemd[1]: Finished ldconfig.service. Oct 2 19:14:31.417145 systemd[1]: Starting systemd-update-done.service... Oct 2 19:14:31.440681 systemd[1]: Finished systemd-update-done.service. Oct 2 19:14:31.444082 systemd[1]: Reached target sysinit.target. Oct 2 19:14:31.446613 systemd[1]: Started motdgen.path. Oct 2 19:14:31.448728 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:14:31.452034 systemd[1]: Started logrotate.timer. Oct 2 19:14:31.453974 systemd[1]: Started mdadm.timer. Oct 2 19:14:31.455795 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:14:31.458077 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:14:31.458120 systemd[1]: Reached target paths.target. Oct 2 19:14:31.460017 systemd[1]: Reached target timers.target. Oct 2 19:14:31.462239 systemd[1]: Listening on dbus.socket. Oct 2 19:14:31.465087 systemd[1]: Starting docker.socket... Oct 2 19:14:31.483153 systemd[1]: Listening on sshd.socket. Oct 2 19:14:31.485702 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:14:31.486273 systemd[1]: Listening on docker.socket. Oct 2 19:14:31.490937 systemd[1]: Reached target sockets.target. Oct 2 19:14:31.493319 systemd[1]: Reached target basic.target. Oct 2 19:14:31.495473 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:14:31.495508 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:14:31.496520 systemd[1]: Starting containerd.service... Oct 2 19:14:31.499499 systemd[1]: Starting dbus.service... Oct 2 19:14:31.502327 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:14:31.505971 systemd[1]: Starting extend-filesystems.service... Oct 2 19:14:31.508017 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:14:31.509253 systemd[1]: Starting motdgen.service... Oct 2 19:14:31.512344 systemd[1]: Started nvidia.service. Oct 2 19:14:31.515776 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:14:31.519179 systemd[1]: Starting prepare-critools.service... Oct 2 19:14:31.522635 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:14:31.526085 systemd[1]: Starting sshd-keygen.service... Oct 2 19:14:31.531280 systemd[1]: Starting systemd-logind.service... Oct 2 19:14:31.533490 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:14:31.533575 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:14:31.534092 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:14:31.534863 systemd[1]: Starting update-engine.service... Oct 2 19:14:31.538238 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:14:31.544405 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:14:31.544632 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:14:31.600518 jq[1292]: true Oct 2 19:14:31.600868 jq[1280]: false Oct 2 19:14:31.602117 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:14:31.602344 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:14:31.618534 extend-filesystems[1281]: Found sda Oct 2 19:14:31.622443 extend-filesystems[1281]: Found sda1 Oct 2 19:14:31.625407 extend-filesystems[1281]: Found sda2 Oct 2 19:14:31.625407 extend-filesystems[1281]: Found sda3 Oct 2 19:14:31.625407 extend-filesystems[1281]: Found usr Oct 2 19:14:31.625407 extend-filesystems[1281]: Found sda4 Oct 2 19:14:31.625407 extend-filesystems[1281]: Found sda6 Oct 2 19:14:31.637369 extend-filesystems[1281]: Found sda7 Oct 2 19:14:31.637369 extend-filesystems[1281]: Found sda9 Oct 2 19:14:31.637369 extend-filesystems[1281]: Checking size of /dev/sda9 Oct 2 19:14:31.628036 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:14:31.643911 jq[1306]: true Oct 2 19:14:31.628221 systemd[1]: Finished motdgen.service. Oct 2 19:14:31.679114 tar[1294]: ./ Oct 2 19:14:31.679114 tar[1294]: ./macvlan Oct 2 19:14:31.683742 tar[1296]: crictl Oct 2 19:14:31.695561 systemd-logind[1290]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:14:31.703972 systemd-logind[1290]: New seat seat0. Oct 2 19:14:31.754529 extend-filesystems[1281]: Old size kept for /dev/sda9 Oct 2 19:14:31.760241 extend-filesystems[1281]: Found sr0 Oct 2 19:14:31.755105 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:14:31.755262 systemd[1]: Finished extend-filesystems.service. Oct 2 19:14:31.799601 env[1311]: time="2023-10-02T19:14:31.799549240Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:14:31.827662 bash[1329]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:14:31.828704 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:14:31.840311 tar[1294]: ./static Oct 2 19:14:31.849745 dbus-daemon[1279]: [system] SELinux support is enabled Oct 2 19:14:31.850612 systemd[1]: Started dbus.service. Oct 2 19:14:31.856396 dbus-daemon[1279]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:14:31.855837 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:14:31.855864 systemd[1]: Reached target system-config.target. Oct 2 19:14:31.858887 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:14:31.858909 systemd[1]: Reached target user-config.target. Oct 2 19:14:31.861595 systemd[1]: Started systemd-logind.service. Oct 2 19:14:31.911024 tar[1294]: ./vlan Oct 2 19:14:31.935218 env[1311]: time="2023-10-02T19:14:31.935126289Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:14:31.935336 env[1311]: time="2023-10-02T19:14:31.935284993Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:14:31.936836 env[1311]: time="2023-10-02T19:14:31.936793728Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:14:31.936836 env[1311]: time="2023-10-02T19:14:31.936833729Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:14:31.937138 env[1311]: time="2023-10-02T19:14:31.937108435Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:14:31.937206 env[1311]: time="2023-10-02T19:14:31.937140436Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:14:31.937206 env[1311]: time="2023-10-02T19:14:31.937158936Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:14:31.937206 env[1311]: time="2023-10-02T19:14:31.937172836Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:14:31.937318 env[1311]: time="2023-10-02T19:14:31.937268739Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:14:31.937547 env[1311]: time="2023-10-02T19:14:31.937519545Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:14:31.937741 env[1311]: time="2023-10-02T19:14:31.937712849Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:14:31.937795 env[1311]: time="2023-10-02T19:14:31.937742950Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:14:31.937836 env[1311]: time="2023-10-02T19:14:31.937810151Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:14:31.937836 env[1311]: time="2023-10-02T19:14:31.937826552Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:14:31.939620 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 19:14:31.958883 env[1311]: time="2023-10-02T19:14:31.958854840Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:14:31.958979 env[1311]: time="2023-10-02T19:14:31.958892741Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:14:31.958979 env[1311]: time="2023-10-02T19:14:31.958920042Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:14:31.961076 env[1311]: time="2023-10-02T19:14:31.961050291Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:14:31.961146 env[1311]: time="2023-10-02T19:14:31.961081192Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:14:31.961198 env[1311]: time="2023-10-02T19:14:31.961140693Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:14:31.961198 env[1311]: time="2023-10-02T19:14:31.961159294Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:14:31.961198 env[1311]: time="2023-10-02T19:14:31.961179194Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:14:31.961301 env[1311]: time="2023-10-02T19:14:31.961199395Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:14:31.961301 env[1311]: time="2023-10-02T19:14:31.961218195Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:14:31.961301 env[1311]: time="2023-10-02T19:14:31.961237795Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:14:31.961301 env[1311]: time="2023-10-02T19:14:31.961254996Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:14:31.961440 env[1311]: time="2023-10-02T19:14:31.961367498Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:14:31.961479 env[1311]: time="2023-10-02T19:14:31.961455901Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:14:31.961870 env[1311]: time="2023-10-02T19:14:31.961845210Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:14:31.961960 env[1311]: time="2023-10-02T19:14:31.961895811Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:14:31.961960 env[1311]: time="2023-10-02T19:14:31.961916711Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:14:31.962048 env[1311]: time="2023-10-02T19:14:31.961997313Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:14:31.962048 env[1311]: time="2023-10-02T19:14:31.962017714Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:14:31.962120 env[1311]: time="2023-10-02T19:14:31.962097815Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:14:31.962157 env[1311]: time="2023-10-02T19:14:31.962116616Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:14:31.962157 env[1311]: time="2023-10-02T19:14:31.962133516Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:14:31.962230 env[1311]: time="2023-10-02T19:14:31.962153117Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:14:31.962230 env[1311]: time="2023-10-02T19:14:31.962176817Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:14:31.962230 env[1311]: time="2023-10-02T19:14:31.962194018Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:14:31.962230 env[1311]: time="2023-10-02T19:14:31.962213218Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:14:31.962385 env[1311]: time="2023-10-02T19:14:31.962361022Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:14:31.962425 env[1311]: time="2023-10-02T19:14:31.962381722Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:14:31.962425 env[1311]: time="2023-10-02T19:14:31.962398322Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:14:31.962425 env[1311]: time="2023-10-02T19:14:31.962415523Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:14:31.962527 env[1311]: time="2023-10-02T19:14:31.962437723Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:14:31.962527 env[1311]: time="2023-10-02T19:14:31.962453724Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:14:31.962527 env[1311]: time="2023-10-02T19:14:31.962477324Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:14:31.962527 env[1311]: time="2023-10-02T19:14:31.962516825Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:14:31.963457 env[1311]: time="2023-10-02T19:14:31.963381345Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.963469347Z" level=info msg="Connect containerd service" Oct 2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.963513548Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.964854579Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965049484Z" level=info msg="Start subscribing containerd event" Oct 2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965093085Z" level=info msg="Start recovering state" Oct 2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965151686Z" level=info msg="Start event monitor" Oct 2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965165887Z" level=info msg="Start snapshots syncer" Oct 2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965178587Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965189287Z" level=info msg="Start streaming server" Oct 2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965523495Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:14:31.995919 env[1311]: time="2023-10-02T19:14:31.965592197Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:14:31.965744 systemd[1]: Started containerd.service. Oct 2 19:14:31.998127 env[1311]: time="2023-10-02T19:14:31.998085951Z" level=info msg="containerd successfully booted in 0.212007s" Oct 2 19:14:32.019468 tar[1294]: ./portmap Oct 2 19:14:32.111882 tar[1294]: ./host-local Oct 2 19:14:32.177960 tar[1294]: ./vrf Oct 2 19:14:32.250118 tar[1294]: ./bridge Oct 2 19:14:32.338160 tar[1294]: ./tuning Oct 2 19:14:32.411162 tar[1294]: ./firewall Oct 2 19:14:32.493477 tar[1294]: ./host-device Oct 2 19:14:32.498966 update_engine[1291]: I1002 19:14:32.481910 1291 main.cc:92] Flatcar Update Engine starting Oct 2 19:14:32.549741 systemd[1]: Started update-engine.service. Oct 2 19:14:32.558491 update_engine[1291]: I1002 19:14:32.558105 1291 update_check_scheduler.cc:74] Next update check in 2m20s Oct 2 19:14:32.554919 systemd[1]: Started locksmithd.service. Oct 2 19:14:32.560732 systemd[1]: Finished prepare-critools.service. Oct 2 19:14:32.574927 tar[1294]: ./sbr Oct 2 19:14:32.608360 tar[1294]: ./loopback Oct 2 19:14:32.642835 tar[1294]: ./dhcp Oct 2 19:14:32.713602 sshd_keygen[1302]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:14:32.740529 systemd[1]: Finished sshd-keygen.service. Oct 2 19:14:32.753220 tar[1294]: ./ptp Oct 2 19:14:32.745296 systemd[1]: Starting issuegen.service... Oct 2 19:14:32.749195 systemd[1]: Started waagent.service. Oct 2 19:14:32.760280 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:14:32.760487 systemd[1]: Finished issuegen.service. Oct 2 19:14:32.764493 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:14:32.789536 tar[1294]: ./ipvlan Oct 2 19:14:32.790530 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:14:32.794651 systemd[1]: Started getty@tty1.service. Oct 2 19:14:32.798459 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:14:32.801100 systemd[1]: Reached target getty.target. Oct 2 19:14:32.828967 tar[1294]: ./bandwidth Oct 2 19:14:32.901524 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:14:32.904560 systemd[1]: Reached target multi-user.target. Oct 2 19:14:32.908250 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:14:32.918002 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:14:32.918139 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:14:32.920902 systemd[1]: Startup finished in 974ms (firmware) + 25.612s (loader) + 934ms (kernel) + 21.535s (initrd) + 24.382s (userspace) = 1min 13.439s. Oct 2 19:14:33.308267 login[1400]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Oct 2 19:14:33.308754 login[1399]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:14:33.334672 systemd[1]: Created slice user-500.slice. Oct 2 19:14:33.336122 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:14:33.339062 systemd-logind[1290]: New session 2 of user core. Oct 2 19:14:33.362681 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:14:33.364476 systemd[1]: Starting user@500.service... Oct 2 19:14:33.367704 (systemd)[1409]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:14:33.525067 systemd[1409]: Queued start job for default target default.target. Oct 2 19:14:33.525765 systemd[1409]: Reached target paths.target. Oct 2 19:14:33.525802 systemd[1409]: Reached target sockets.target. Oct 2 19:14:33.525824 systemd[1409]: Reached target timers.target. Oct 2 19:14:33.525843 systemd[1409]: Reached target basic.target. Oct 2 19:14:33.526001 systemd[1]: Started user@500.service. Oct 2 19:14:33.527438 systemd[1]: Started session-2.scope. Oct 2 19:14:33.528130 systemd[1409]: Reached target default.target. Oct 2 19:14:33.528357 systemd[1409]: Startup finished in 154ms. Oct 2 19:14:33.966744 locksmithd[1385]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:14:34.310041 login[1400]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:14:34.314853 systemd[1]: Started session-1.scope. Oct 2 19:14:34.315373 systemd-logind[1290]: New session 1 of user core. Oct 2 19:14:39.342845 waagent[1394]: 2023-10-02T19:14:39.342729Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Oct 2 19:14:39.357106 waagent[1394]: 2023-10-02T19:14:39.344415Z INFO Daemon Daemon OS: flatcar 3510.3.0 Oct 2 19:14:39.357106 waagent[1394]: 2023-10-02T19:14:39.345490Z INFO Daemon Daemon Python: 3.9.16 Oct 2 19:14:39.357106 waagent[1394]: 2023-10-02T19:14:39.346727Z INFO Daemon Daemon Run daemon Oct 2 19:14:39.357106 waagent[1394]: 2023-10-02T19:14:39.348034Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.0' Oct 2 19:14:39.363758 waagent[1394]: 2023-10-02T19:14:39.363636Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 19:14:39.372194 waagent[1394]: 2023-10-02T19:14:39.372082Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 19:14:39.377264 waagent[1394]: 2023-10-02T19:14:39.377195Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 19:14:39.380198 waagent[1394]: 2023-10-02T19:14:39.380138Z INFO Daemon Daemon Using waagent for provisioning Oct 2 19:14:39.383435 waagent[1394]: 2023-10-02T19:14:39.383375Z INFO Daemon Daemon Activate resource disk Oct 2 19:14:39.386037 waagent[1394]: 2023-10-02T19:14:39.385981Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Oct 2 19:14:39.396438 waagent[1394]: 2023-10-02T19:14:39.396367Z INFO Daemon Daemon Found device: None Oct 2 19:14:39.399071 waagent[1394]: 2023-10-02T19:14:39.399012Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Oct 2 19:14:39.405145 waagent[1394]: 2023-10-02T19:14:39.405082Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Oct 2 19:14:39.411563 waagent[1394]: 2023-10-02T19:14:39.411501Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 19:14:39.414931 waagent[1394]: 2023-10-02T19:14:39.414870Z INFO Daemon Daemon Running default provisioning handler Oct 2 19:14:39.425537 waagent[1394]: 2023-10-02T19:14:39.425414Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 19:14:39.432463 waagent[1394]: 2023-10-02T19:14:39.432361Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 19:14:39.437517 waagent[1394]: 2023-10-02T19:14:39.437458Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 19:14:39.440370 waagent[1394]: 2023-10-02T19:14:39.440312Z INFO Daemon Daemon Copying ovf-env.xml Oct 2 19:14:39.529591 waagent[1394]: 2023-10-02T19:14:39.528330Z INFO Daemon Daemon Successfully mounted dvd Oct 2 19:14:39.631449 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Oct 2 19:14:39.650665 waagent[1394]: 2023-10-02T19:14:39.650533Z INFO Daemon Daemon Detect protocol endpoint Oct 2 19:14:39.666143 waagent[1394]: 2023-10-02T19:14:39.651006Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 19:14:39.666143 waagent[1394]: 2023-10-02T19:14:39.652350Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Oct 2 19:14:39.666143 waagent[1394]: 2023-10-02T19:14:39.653368Z INFO Daemon Daemon Test for route to 168.63.129.16 Oct 2 19:14:39.666143 waagent[1394]: 2023-10-02T19:14:39.654469Z INFO Daemon Daemon Route to 168.63.129.16 exists Oct 2 19:14:39.666143 waagent[1394]: 2023-10-02T19:14:39.655200Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Oct 2 19:14:39.775032 waagent[1394]: 2023-10-02T19:14:39.774936Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Oct 2 19:14:39.779104 waagent[1394]: 2023-10-02T19:14:39.779058Z INFO Daemon Daemon Wire protocol version:2012-11-30 Oct 2 19:14:39.781986 waagent[1394]: 2023-10-02T19:14:39.781915Z INFO Daemon Daemon Server preferred version:2015-04-05 Oct 2 19:14:40.039116 waagent[1394]: 2023-10-02T19:14:40.038876Z INFO Daemon Daemon Initializing goal state during protocol detection Oct 2 19:14:40.049474 waagent[1394]: 2023-10-02T19:14:40.049388Z INFO Daemon Daemon Forcing an update of the goal state.. Oct 2 19:14:40.055353 waagent[1394]: 2023-10-02T19:14:40.049827Z INFO Daemon Daemon Fetching goal state [incarnation 1] Oct 2 19:14:40.134644 waagent[1394]: 2023-10-02T19:14:40.134512Z INFO Daemon Daemon Found private key matching thumbprint 0243B914BF72F5FA761597FC9665DDFDBF6B0C48 Oct 2 19:14:40.145442 waagent[1394]: 2023-10-02T19:14:40.135153Z INFO Daemon Daemon Certificate with thumbprint F6E16FA69B1CCBBF0B06F392B672016E0D52A94A has no matching private key. Oct 2 19:14:40.145442 waagent[1394]: 2023-10-02T19:14:40.136259Z INFO Daemon Daemon Fetch goal state completed Oct 2 19:14:40.180768 waagent[1394]: 2023-10-02T19:14:40.180672Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: ee498198-d8fe-4826-a1ef-cc525e003f3d New eTag: 14191338123858362813] Oct 2 19:14:40.189702 waagent[1394]: 2023-10-02T19:14:40.182402Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 19:14:40.195569 waagent[1394]: 2023-10-02T19:14:40.195505Z INFO Daemon Daemon Starting provisioning Oct 2 19:14:40.202552 waagent[1394]: 2023-10-02T19:14:40.195829Z INFO Daemon Daemon Handle ovf-env.xml. Oct 2 19:14:40.202552 waagent[1394]: 2023-10-02T19:14:40.196787Z INFO Daemon Daemon Set hostname [ci-3510.3.0-a-e4b0ec5c33] Oct 2 19:14:40.213967 waagent[1394]: 2023-10-02T19:14:40.213856Z INFO Daemon Daemon Publish hostname [ci-3510.3.0-a-e4b0ec5c33] Oct 2 19:14:40.221899 waagent[1394]: 2023-10-02T19:14:40.214560Z INFO Daemon Daemon Examine /proc/net/route for primary interface Oct 2 19:14:40.221899 waagent[1394]: 2023-10-02T19:14:40.215567Z INFO Daemon Daemon Primary interface is [eth0] Oct 2 19:14:40.228518 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Oct 2 19:14:40.228771 systemd[1]: Stopped systemd-networkd-wait-online.service. Oct 2 19:14:40.228845 systemd[1]: Stopping systemd-networkd-wait-online.service... Oct 2 19:14:40.229191 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:14:40.233002 systemd-networkd[1165]: eth0: DHCPv6 lease lost Oct 2 19:14:40.234514 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:14:40.234674 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:14:40.237084 systemd[1]: Starting systemd-networkd.service... Oct 2 19:14:40.266976 systemd-networkd[1452]: enP26643s1: Link UP Oct 2 19:14:40.266985 systemd-networkd[1452]: enP26643s1: Gained carrier Oct 2 19:14:40.268284 systemd-networkd[1452]: eth0: Link UP Oct 2 19:14:40.268293 systemd-networkd[1452]: eth0: Gained carrier Oct 2 19:14:40.268711 systemd-networkd[1452]: lo: Link UP Oct 2 19:14:40.268720 systemd-networkd[1452]: lo: Gained carrier Oct 2 19:14:40.269127 systemd-networkd[1452]: eth0: Gained IPv6LL Oct 2 19:14:40.269731 systemd-networkd[1452]: Enumeration completed Oct 2 19:14:40.269911 systemd[1]: Started systemd-networkd.service. Oct 2 19:14:40.274498 waagent[1394]: 2023-10-02T19:14:40.270933Z INFO Daemon Daemon Create user account if not exists Oct 2 19:14:40.272520 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:14:40.278005 waagent[1394]: 2023-10-02T19:14:40.275765Z INFO Daemon Daemon User core already exists, skip useradd Oct 2 19:14:40.279875 waagent[1394]: 2023-10-02T19:14:40.279799Z INFO Daemon Daemon Configure sudoer Oct 2 19:14:40.280980 waagent[1394]: 2023-10-02T19:14:40.280901Z INFO Daemon Daemon Configure sshd Oct 2 19:14:40.283980 waagent[1394]: 2023-10-02T19:14:40.283917Z INFO Daemon Daemon Deploy ssh public key. Oct 2 19:14:40.289578 systemd-networkd[1452]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:14:40.327053 systemd-networkd[1452]: eth0: DHCPv4 address 10.200.8.37/24, gateway 10.200.8.1 acquired from 168.63.129.16 Oct 2 19:14:40.330646 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:14:41.579495 waagent[1394]: 2023-10-02T19:14:41.579393Z INFO Daemon Daemon Provisioning complete Oct 2 19:14:41.598345 waagent[1394]: 2023-10-02T19:14:41.598270Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Oct 2 19:14:41.607515 waagent[1394]: 2023-10-02T19:14:41.607434Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Oct 2 19:14:41.613276 waagent[1394]: 2023-10-02T19:14:41.613208Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Oct 2 19:14:41.877224 waagent[1461]: 2023-10-02T19:14:41.877123Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Oct 2 19:14:41.878006 waagent[1461]: 2023-10-02T19:14:41.877925Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:14:41.878168 waagent[1461]: 2023-10-02T19:14:41.878113Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:14:41.888771 waagent[1461]: 2023-10-02T19:14:41.888696Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Oct 2 19:14:41.888933 waagent[1461]: 2023-10-02T19:14:41.888879Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Oct 2 19:14:41.949464 waagent[1461]: 2023-10-02T19:14:41.949339Z INFO ExtHandler ExtHandler Found private key matching thumbprint 0243B914BF72F5FA761597FC9665DDFDBF6B0C48 Oct 2 19:14:41.949687 waagent[1461]: 2023-10-02T19:14:41.949624Z INFO ExtHandler ExtHandler Certificate with thumbprint F6E16FA69B1CCBBF0B06F392B672016E0D52A94A has no matching private key. Oct 2 19:14:41.949923 waagent[1461]: 2023-10-02T19:14:41.949872Z INFO ExtHandler ExtHandler Fetch goal state completed Oct 2 19:14:41.963929 waagent[1461]: 2023-10-02T19:14:41.963869Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: a1f2d03e-573a-4095-b07f-6256534699ba New eTag: 14191338123858362813] Oct 2 19:14:41.964511 waagent[1461]: 2023-10-02T19:14:41.964456Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 19:14:42.054844 waagent[1461]: 2023-10-02T19:14:42.054671Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 19:14:42.064933 waagent[1461]: 2023-10-02T19:14:42.064838Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1461 Oct 2 19:14:42.068403 waagent[1461]: 2023-10-02T19:14:42.068333Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 19:14:42.069624 waagent[1461]: 2023-10-02T19:14:42.069564Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 19:14:42.144053 waagent[1461]: 2023-10-02T19:14:42.143914Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 19:14:42.144423 waagent[1461]: 2023-10-02T19:14:42.144358Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 19:14:42.152417 waagent[1461]: 2023-10-02T19:14:42.152359Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 19:14:42.152874 waagent[1461]: 2023-10-02T19:14:42.152817Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 19:14:42.153915 waagent[1461]: 2023-10-02T19:14:42.153851Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Oct 2 19:14:42.155203 waagent[1461]: 2023-10-02T19:14:42.155142Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 19:14:42.155939 waagent[1461]: 2023-10-02T19:14:42.155883Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 19:14:42.156068 waagent[1461]: 2023-10-02T19:14:42.156004Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:14:42.156665 waagent[1461]: 2023-10-02T19:14:42.156611Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:14:42.156894 waagent[1461]: 2023-10-02T19:14:42.156839Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 19:14:42.157151 waagent[1461]: 2023-10-02T19:14:42.157100Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 19:14:42.157920 waagent[1461]: 2023-10-02T19:14:42.157865Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 19:14:42.158035 waagent[1461]: 2023-10-02T19:14:42.157975Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:14:42.159278 waagent[1461]: 2023-10-02T19:14:42.159220Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 19:14:42.159511 waagent[1461]: 2023-10-02T19:14:42.159445Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 19:14:42.159638 waagent[1461]: 2023-10-02T19:14:42.159582Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 19:14:42.159638 waagent[1461]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 19:14:42.159638 waagent[1461]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 19:14:42.159638 waagent[1461]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 19:14:42.159638 waagent[1461]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:14:42.159638 waagent[1461]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:14:42.159638 waagent[1461]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:14:42.160126 waagent[1461]: 2023-10-02T19:14:42.160072Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:14:42.161494 waagent[1461]: 2023-10-02T19:14:42.161443Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 19:14:42.167056 waagent[1461]: 2023-10-02T19:14:42.166997Z INFO EnvHandler ExtHandler Configure routes Oct 2 19:14:42.170313 waagent[1461]: 2023-10-02T19:14:42.170242Z INFO EnvHandler ExtHandler Gateway:None Oct 2 19:14:42.171276 waagent[1461]: 2023-10-02T19:14:42.171218Z INFO EnvHandler ExtHandler Routes:None Oct 2 19:14:42.172595 waagent[1461]: 2023-10-02T19:14:42.172547Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Oct 2 19:14:42.173865 waagent[1461]: 2023-10-02T19:14:42.173819Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 19:14:42.178875 waagent[1461]: 2023-10-02T19:14:42.178735Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Oct 2 19:14:42.193248 waagent[1461]: 2023-10-02T19:14:42.192881Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1452' Oct 2 19:14:42.222604 waagent[1461]: 2023-10-02T19:14:42.222529Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Oct 2 19:14:42.299477 waagent[1461]: 2023-10-02T19:14:42.298346Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 19:14:42.299477 waagent[1461]: Executing ['ip', '-a', '-o', 'link']: Oct 2 19:14:42.299477 waagent[1461]: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 19:14:42.299477 waagent[1461]: 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:a4:76:8d brd ff:ff:ff:ff:ff:ff Oct 2 19:14:42.299477 waagent[1461]: 3: enP26643s1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:a4:76:8d brd ff:ff:ff:ff:ff:ff\ altname enP26643p0s2 Oct 2 19:14:42.299477 waagent[1461]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 19:14:42.299477 waagent[1461]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 19:14:42.299477 waagent[1461]: 2: eth0 inet 10.200.8.37/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 19:14:42.299477 waagent[1461]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 19:14:42.299477 waagent[1461]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 19:14:42.299477 waagent[1461]: 2: eth0 inet6 fe80::222:48ff:fea4:768d/64 scope link \ valid_lft forever preferred_lft forever Oct 2 19:14:42.537624 waagent[1461]: 2023-10-02T19:14:42.537459Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Oct 2 19:14:42.542716 waagent[1461]: 2023-10-02T19:14:42.542598Z INFO EnvHandler ExtHandler Firewall rules: Oct 2 19:14:42.542716 waagent[1461]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:14:42.542716 waagent[1461]: pkts bytes target prot opt in out source destination Oct 2 19:14:42.542716 waagent[1461]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:14:42.542716 waagent[1461]: pkts bytes target prot opt in out source destination Oct 2 19:14:42.542716 waagent[1461]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:14:42.542716 waagent[1461]: pkts bytes target prot opt in out source destination Oct 2 19:14:42.542716 waagent[1461]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 19:14:42.542716 waagent[1461]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 19:14:42.544400 waagent[1461]: 2023-10-02T19:14:42.544339Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Oct 2 19:14:42.740199 waagent[1461]: 2023-10-02T19:14:42.740120Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.10.0.3 -- exiting Oct 2 19:14:43.618084 waagent[1394]: 2023-10-02T19:14:43.617872Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Oct 2 19:14:43.624507 waagent[1394]: 2023-10-02T19:14:43.624441Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.10.0.3 to be the latest agent Oct 2 19:14:44.607184 waagent[1500]: 2023-10-02T19:14:44.607068Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.10.0.3) Oct 2 19:14:44.607883 waagent[1500]: 2023-10-02T19:14:44.607816Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.0 Oct 2 19:14:44.608044 waagent[1500]: 2023-10-02T19:14:44.607989Z INFO ExtHandler ExtHandler Python: 3.9.16 Oct 2 19:14:44.617426 waagent[1500]: 2023-10-02T19:14:44.617313Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 19:14:44.617840 waagent[1500]: 2023-10-02T19:14:44.617778Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:14:44.618018 waagent[1500]: 2023-10-02T19:14:44.617968Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:14:44.629731 waagent[1500]: 2023-10-02T19:14:44.629652Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Oct 2 19:14:44.637825 waagent[1500]: 2023-10-02T19:14:44.637757Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Oct 2 19:14:44.638753 waagent[1500]: 2023-10-02T19:14:44.638692Z INFO ExtHandler Oct 2 19:14:44.638903 waagent[1500]: 2023-10-02T19:14:44.638850Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 50b3eaa0-46be-4ca5-9e53-4b2c95ee455d eTag: 14191338123858362813 source: Fabric] Oct 2 19:14:44.639599 waagent[1500]: 2023-10-02T19:14:44.639541Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Oct 2 19:14:44.640678 waagent[1500]: 2023-10-02T19:14:44.640618Z INFO ExtHandler Oct 2 19:14:44.640811 waagent[1500]: 2023-10-02T19:14:44.640759Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Oct 2 19:14:44.647231 waagent[1500]: 2023-10-02T19:14:44.647179Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Oct 2 19:14:44.647665 waagent[1500]: 2023-10-02T19:14:44.647615Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 19:14:44.669127 waagent[1500]: 2023-10-02T19:14:44.669057Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Oct 2 19:14:44.735003 waagent[1500]: 2023-10-02T19:14:44.734857Z INFO ExtHandler Downloaded certificate {'thumbprint': 'F6E16FA69B1CCBBF0B06F392B672016E0D52A94A', 'hasPrivateKey': False} Oct 2 19:14:44.735971 waagent[1500]: 2023-10-02T19:14:44.735895Z INFO ExtHandler Downloaded certificate {'thumbprint': '0243B914BF72F5FA761597FC9665DDFDBF6B0C48', 'hasPrivateKey': True} Oct 2 19:14:44.736950 waagent[1500]: 2023-10-02T19:14:44.736879Z INFO ExtHandler Fetch goal state completed Oct 2 19:14:44.760116 waagent[1500]: 2023-10-02T19:14:44.760035Z INFO ExtHandler ExtHandler WALinuxAgent-2.10.0.3 running as process 1500 Oct 2 19:14:44.763475 waagent[1500]: 2023-10-02T19:14:44.763406Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 19:14:44.764935 waagent[1500]: 2023-10-02T19:14:44.764875Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 19:14:44.769841 waagent[1500]: 2023-10-02T19:14:44.769788Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 19:14:44.770244 waagent[1500]: 2023-10-02T19:14:44.770188Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 19:14:44.777994 waagent[1500]: 2023-10-02T19:14:44.777922Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 19:14:44.778457 waagent[1500]: 2023-10-02T19:14:44.778400Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 19:14:44.801007 waagent[1500]: 2023-10-02T19:14:44.800884Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Oct 2 19:14:44.803721 waagent[1500]: 2023-10-02T19:14:44.803624Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Oct 2 19:14:44.809053 waagent[1500]: 2023-10-02T19:14:44.808990Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Oct 2 19:14:44.810431 waagent[1500]: 2023-10-02T19:14:44.810373Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 19:14:44.810835 waagent[1500]: 2023-10-02T19:14:44.810779Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:14:44.811015 waagent[1500]: 2023-10-02T19:14:44.810954Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:14:44.811690 waagent[1500]: 2023-10-02T19:14:44.811633Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:14:44.812262 waagent[1500]: 2023-10-02T19:14:44.812203Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 19:14:44.812340 waagent[1500]: 2023-10-02T19:14:44.812287Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 19:14:44.812784 waagent[1500]: 2023-10-02T19:14:44.812722Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 19:14:44.813050 waagent[1500]: 2023-10-02T19:14:44.812995Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 19:14:44.813435 waagent[1500]: 2023-10-02T19:14:44.813383Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:14:44.813795 waagent[1500]: 2023-10-02T19:14:44.813742Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 19:14:44.813795 waagent[1500]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 19:14:44.813795 waagent[1500]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 19:14:44.813795 waagent[1500]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 19:14:44.813795 waagent[1500]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:14:44.813795 waagent[1500]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:14:44.813795 waagent[1500]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:14:44.814240 waagent[1500]: 2023-10-02T19:14:44.814162Z INFO EnvHandler ExtHandler Configure routes Oct 2 19:14:44.819039 waagent[1500]: 2023-10-02T19:14:44.818959Z INFO EnvHandler ExtHandler Gateway:None Oct 2 19:14:44.819913 waagent[1500]: 2023-10-02T19:14:44.819856Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 19:14:44.820016 waagent[1500]: 2023-10-02T19:14:44.819965Z INFO EnvHandler ExtHandler Routes:None Oct 2 19:14:44.820531 waagent[1500]: 2023-10-02T19:14:44.820476Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 19:14:44.822215 waagent[1500]: 2023-10-02T19:14:44.822159Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 19:14:44.832386 waagent[1500]: 2023-10-02T19:14:44.832321Z INFO ExtHandler ExtHandler Downloading agent manifest Oct 2 19:14:44.844391 waagent[1500]: 2023-10-02T19:14:44.844325Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 19:14:44.844391 waagent[1500]: Executing ['ip', '-a', '-o', 'link']: Oct 2 19:14:44.844391 waagent[1500]: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 19:14:44.844391 waagent[1500]: 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:a4:76:8d brd ff:ff:ff:ff:ff:ff Oct 2 19:14:44.844391 waagent[1500]: 3: enP26643s1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:a4:76:8d brd ff:ff:ff:ff:ff:ff\ altname enP26643p0s2 Oct 2 19:14:44.844391 waagent[1500]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 19:14:44.844391 waagent[1500]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 19:14:44.844391 waagent[1500]: 2: eth0 inet 10.200.8.37/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 19:14:44.844391 waagent[1500]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 19:14:44.844391 waagent[1500]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 19:14:44.844391 waagent[1500]: 2: eth0 inet6 fe80::222:48ff:fea4:768d/64 scope link \ valid_lft forever preferred_lft forever Oct 2 19:14:44.851071 waagent[1500]: 2023-10-02T19:14:44.851009Z INFO ExtHandler ExtHandler Oct 2 19:14:44.855621 waagent[1500]: 2023-10-02T19:14:44.855526Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 4d891c23-b738-4748-859f-a651b5e9f338 correlation 28507787-d291-4294-a005-c0ca963fb4fc created: 2023-10-02T19:13:07.285156Z] Oct 2 19:14:44.860642 waagent[1500]: 2023-10-02T19:14:44.860547Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Oct 2 19:14:44.864715 waagent[1500]: 2023-10-02T19:14:44.864660Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 13 ms] Oct 2 19:14:44.888922 waagent[1500]: 2023-10-02T19:14:44.888843Z INFO ExtHandler ExtHandler Looking for existing remote access users. Oct 2 19:14:44.917585 waagent[1500]: 2023-10-02T19:14:44.917468Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.10.0.3 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 07209E6E-58C4-4200-85BE-32B2BF2B0D77;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Oct 2 19:14:44.935731 waagent[1500]: 2023-10-02T19:14:44.935660Z INFO EnvHandler ExtHandler Current Firewall rules: Oct 2 19:14:44.935731 waagent[1500]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:14:44.935731 waagent[1500]: pkts bytes target prot opt in out source destination Oct 2 19:14:44.935731 waagent[1500]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:14:44.935731 waagent[1500]: pkts bytes target prot opt in out source destination Oct 2 19:14:44.935731 waagent[1500]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:14:44.935731 waagent[1500]: pkts bytes target prot opt in out source destination Oct 2 19:14:44.935731 waagent[1500]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Oct 2 19:14:44.935731 waagent[1500]: 15 1572 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 19:14:44.935731 waagent[1500]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 19:15:10.012721 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Oct 2 19:15:14.094860 systemd[1]: Created slice system-sshd.slice. Oct 2 19:15:14.096745 systemd[1]: Started sshd@0-10.200.8.37:22-10.200.12.6:51990.service. Oct 2 19:15:14.946474 sshd[1539]: Accepted publickey for core from 10.200.12.6 port 51990 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:15:14.947868 sshd[1539]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:15:14.952019 systemd-logind[1290]: New session 3 of user core. Oct 2 19:15:14.952821 systemd[1]: Started session-3.scope. Oct 2 19:15:15.496708 systemd[1]: Started sshd@1-10.200.8.37:22-10.200.12.6:52006.service. Oct 2 19:15:16.109242 sshd[1544]: Accepted publickey for core from 10.200.12.6 port 52006 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:15:16.110910 sshd[1544]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:15:16.116492 systemd[1]: Started session-4.scope. Oct 2 19:15:16.117070 systemd-logind[1290]: New session 4 of user core. Oct 2 19:15:16.550087 sshd[1544]: pam_unix(sshd:session): session closed for user core Oct 2 19:15:16.553316 systemd[1]: sshd@1-10.200.8.37:22-10.200.12.6:52006.service: Deactivated successfully. Oct 2 19:15:16.554332 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:15:16.555095 systemd-logind[1290]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:15:16.556013 systemd-logind[1290]: Removed session 4. Oct 2 19:15:16.665452 systemd[1]: Started sshd@2-10.200.8.37:22-10.200.12.6:52012.service. Oct 2 19:15:17.285041 sshd[1550]: Accepted publickey for core from 10.200.12.6 port 52012 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:15:17.286662 sshd[1550]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:15:17.292095 systemd[1]: Started session-5.scope. Oct 2 19:15:17.292542 systemd-logind[1290]: New session 5 of user core. Oct 2 19:15:17.720204 sshd[1550]: pam_unix(sshd:session): session closed for user core Oct 2 19:15:17.723413 systemd[1]: sshd@2-10.200.8.37:22-10.200.12.6:52012.service: Deactivated successfully. Oct 2 19:15:17.724402 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:15:17.725168 systemd-logind[1290]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:15:17.726072 systemd-logind[1290]: Removed session 5. Oct 2 19:15:17.824795 systemd[1]: Started sshd@3-10.200.8.37:22-10.200.12.6:36400.service. Oct 2 19:15:18.069924 update_engine[1291]: I1002 19:15:18.069411 1291 update_attempter.cc:505] Updating boot flags... Oct 2 19:15:18.440773 sshd[1556]: Accepted publickey for core from 10.200.12.6 port 36400 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:15:18.442382 sshd[1556]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:15:18.448016 systemd[1]: Started session-6.scope. Oct 2 19:15:18.448754 systemd-logind[1290]: New session 6 of user core. Oct 2 19:15:18.881622 sshd[1556]: pam_unix(sshd:session): session closed for user core Oct 2 19:15:18.884858 systemd[1]: sshd@3-10.200.8.37:22-10.200.12.6:36400.service: Deactivated successfully. Oct 2 19:15:18.885877 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:15:18.886685 systemd-logind[1290]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:15:18.887646 systemd-logind[1290]: Removed session 6. Oct 2 19:15:18.987584 systemd[1]: Started sshd@4-10.200.8.37:22-10.200.12.6:36412.service. Oct 2 19:15:19.608492 sshd[1628]: Accepted publickey for core from 10.200.12.6 port 36412 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:15:19.610137 sshd[1628]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:15:19.614821 systemd[1]: Started session-7.scope. Oct 2 19:15:19.615421 systemd-logind[1290]: New session 7 of user core. Oct 2 19:15:20.254732 sudo[1631]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:15:20.255092 sudo[1631]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:15:20.276151 dbus-daemon[1279]: \xd0m2X\u0013V: received setenforce notice (enforcing=675341952) Oct 2 19:15:20.277936 sudo[1631]: pam_unix(sudo:session): session closed for user root Oct 2 19:15:20.559924 sshd[1628]: pam_unix(sshd:session): session closed for user core Oct 2 19:15:20.563811 systemd[1]: sshd@4-10.200.8.37:22-10.200.12.6:36412.service: Deactivated successfully. Oct 2 19:15:20.564929 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:15:20.565754 systemd-logind[1290]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:15:20.566739 systemd-logind[1290]: Removed session 7. Oct 2 19:15:20.766900 systemd[1]: Started sshd@5-10.200.8.37:22-10.200.12.6:36416.service. Oct 2 19:15:21.471801 sshd[1635]: Accepted publickey for core from 10.200.12.6 port 36416 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:15:21.473477 sshd[1635]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:15:21.478585 systemd[1]: Started session-8.scope. Oct 2 19:15:21.479059 systemd-logind[1290]: New session 8 of user core. Oct 2 19:15:21.812464 sudo[1642]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:15:21.813040 sudo[1642]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:15:21.815631 sudo[1642]: pam_unix(sudo:session): session closed for user root Oct 2 19:15:21.820238 sudo[1641]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:15:21.820491 sudo[1641]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:15:21.828919 systemd[1]: Stopping audit-rules.service... Oct 2 19:15:21.829000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:15:21.830763 auditctl[1645]: No rules Oct 2 19:15:21.833680 kernel: kauditd_printk_skb: 3 callbacks suppressed Oct 2 19:15:21.833749 kernel: audit: type=1305 audit(1696274121.829:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:15:21.831193 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:15:21.831354 systemd[1]: Stopped audit-rules.service. Oct 2 19:15:21.833426 systemd[1]: Starting audit-rules.service... Oct 2 19:15:21.829000 audit[1645]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd17e40d90 a2=420 a3=0 items=0 ppid=1 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:21.854531 augenrules[1662]: No rules Oct 2 19:15:21.829000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:15:21.855280 systemd[1]: Finished audit-rules.service. Oct 2 19:15:21.856253 sudo[1641]: pam_unix(sudo:session): session closed for user root Oct 2 19:15:21.861847 kernel: audit: type=1300 audit(1696274121.829:165): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd17e40d90 a2=420 a3=0 items=0 ppid=1 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:21.861985 kernel: audit: type=1327 audit(1696274121.829:165): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:15:21.862039 kernel: audit: type=1131 audit(1696274121.830:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:21.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:21.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:21.884115 kernel: audit: type=1130 audit(1696274121.854:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:21.884172 kernel: audit: type=1106 audit(1696274121.855:168): pid=1641 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:15:21.855000 audit[1641]: USER_END pid=1641 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:15:21.855000 audit[1641]: CRED_DISP pid=1641 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:15:21.907924 kernel: audit: type=1104 audit(1696274121.855:169): pid=1641 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:15:21.955538 sshd[1635]: pam_unix(sshd:session): session closed for user core Oct 2 19:15:21.956000 audit[1635]: USER_END pid=1635 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:15:21.959171 systemd[1]: sshd@5-10.200.8.37:22-10.200.12.6:36416.service: Deactivated successfully. Oct 2 19:15:21.960135 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:15:21.961493 systemd-logind[1290]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:15:21.962552 systemd-logind[1290]: Removed session 8. Oct 2 19:15:21.956000 audit[1635]: CRED_DISP pid=1635 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:15:21.973961 kernel: audit: type=1106 audit(1696274121.956:170): pid=1635 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:15:21.974013 kernel: audit: type=1104 audit(1696274121.956:171): pid=1635 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:15:21.985956 kernel: audit: type=1131 audit(1696274121.956:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.37:22-10.200.12.6:36416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:21.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.37:22-10.200.12.6:36416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:22.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.37:22-10.200.12.6:36422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:22.061543 systemd[1]: Started sshd@6-10.200.8.37:22-10.200.12.6:36422.service. Oct 2 19:15:22.903000 audit[1668]: USER_ACCT pid=1668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:15:22.904358 sshd[1668]: Accepted publickey for core from 10.200.12.6 port 36422 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:15:22.904000 audit[1668]: CRED_ACQ pid=1668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:15:22.904000 audit[1668]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed34db100 a2=3 a3=0 items=0 ppid=1 pid=1668 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:22.904000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:15:22.906013 sshd[1668]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:15:22.911571 systemd[1]: Started session-9.scope. Oct 2 19:15:22.912443 systemd-logind[1290]: New session 9 of user core. Oct 2 19:15:22.915000 audit[1668]: USER_START pid=1668 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:15:22.917000 audit[1670]: CRED_ACQ pid=1670 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:15:23.246000 audit[1671]: USER_ACCT pid=1671 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:15:23.247000 audit[1671]: CRED_REFR pid=1671 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:15:23.248023 sudo[1671]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:15:23.248357 sudo[1671]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:15:23.249000 audit[1671]: USER_START pid=1671 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:15:24.308719 systemd[1]: Starting docker.service... Oct 2 19:15:24.345732 env[1686]: time="2023-10-02T19:15:24.345667714Z" level=info msg="Starting up" Oct 2 19:15:24.347111 env[1686]: time="2023-10-02T19:15:24.347082216Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:15:24.347229 env[1686]: time="2023-10-02T19:15:24.347217316Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:15:24.347289 env[1686]: time="2023-10-02T19:15:24.347278416Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock <nil> 0 <nil>}] <nil> <nil>}" module=grpc Oct 2 19:15:24.347329 env[1686]: time="2023-10-02T19:15:24.347320916Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:15:24.349062 env[1686]: time="2023-10-02T19:15:24.349034817Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:15:24.349062 env[1686]: time="2023-10-02T19:15:24.349051517Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:15:24.349217 env[1686]: time="2023-10-02T19:15:24.349074317Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock <nil> 0 <nil>}] <nil> <nil>}" module=grpc Oct 2 19:15:24.349217 env[1686]: time="2023-10-02T19:15:24.349086517Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:15:24.461862 env[1686]: time="2023-10-02T19:15:24.461820403Z" level=info msg="Loading containers: start." Oct 2 19:15:24.498000 audit[1713]: NETFILTER_CFG table=nat:6 family=2 entries=2 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.498000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff20785df0 a2=0 a3=7fff20785ddc items=0 ppid=1686 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.498000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:15:24.500000 audit[1715]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.500000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd1be20280 a2=0 a3=7ffd1be2026c items=0 ppid=1686 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.500000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:15:24.502000 audit[1717]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.502000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd00ee1fa0 a2=0 a3=7ffd00ee1f8c items=0 ppid=1686 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.502000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:15:24.503000 audit[1719]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.503000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe8e1713e0 a2=0 a3=7ffe8e1713cc items=0 ppid=1686 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.503000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:15:24.505000 audit[1721]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.505000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe457dfad0 a2=0 a3=7ffe457dfabc items=0 ppid=1686 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.505000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:15:24.507000 audit[1723]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.507000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe9820dfd0 a2=0 a3=7ffe9820dfbc items=0 ppid=1686 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.507000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:15:24.524000 audit[1725]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.524000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffab517d80 a2=0 a3=7fffab517d6c items=0 ppid=1686 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.524000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:15:24.526000 audit[1727]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.526000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe16855680 a2=0 a3=7ffe1685566c items=0 ppid=1686 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.526000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:15:24.528000 audit[1729]: NETFILTER_CFG table=filter:14 family=2 entries=2 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.528000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe2f143930 a2=0 a3=7ffe2f14391c items=0 ppid=1686 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.528000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:15:24.544000 audit[1733]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_unregister_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.544000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff0109b3c0 a2=0 a3=7fff0109b3ac items=0 ppid=1686 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.544000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:15:24.545000 audit[1734]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.545000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffbce9e1f0 a2=0 a3=7fffbce9e1dc items=0 ppid=1686 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.545000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:15:24.598967 kernel: Initializing XFRM netlink socket Oct 2 19:15:24.654188 env[1686]: time="2023-10-02T19:15:24.654132649Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:15:24.717000 audit[1741]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.717000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffb1f76730 a2=0 a3=7fffb1f7671c items=0 ppid=1686 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.717000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:15:24.743000 audit[1744]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.743000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc3361cbd0 a2=0 a3=7ffc3361cbbc items=0 ppid=1686 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:15:24.747000 audit[1747]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.747000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffba10bc80 a2=0 a3=7fffba10bc6c items=0 ppid=1686 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.747000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:15:24.749000 audit[1749]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.749000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff9b38ae20 a2=0 a3=7fff9b38ae0c items=0 ppid=1686 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.749000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:15:24.751000 audit[1751]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.751000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd527d9230 a2=0 a3=7ffd527d921c items=0 ppid=1686 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.751000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:15:24.753000 audit[1753]: NETFILTER_CFG table=nat:22 family=2 entries=2 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.753000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd5235ae30 a2=0 a3=7ffd5235ae1c items=0 ppid=1686 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.753000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:15:24.755000 audit[1755]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.755000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff58e22980 a2=0 a3=7fff58e2296c items=0 ppid=1686 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.755000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:15:24.757000 audit[1757]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.757000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd522ea6e0 a2=0 a3=7ffd522ea6cc items=0 ppid=1686 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.757000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:15:24.759000 audit[1759]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.759000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc80fc6250 a2=0 a3=7ffc80fc623c items=0 ppid=1686 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.759000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:15:24.760000 audit[1761]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.760000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffea995d760 a2=0 a3=7ffea995d74c items=0 ppid=1686 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.760000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:15:24.762000 audit[1763]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.762000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffaadf9b50 a2=0 a3=7fffaadf9b3c items=0 ppid=1686 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.762000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:15:24.764278 systemd-networkd[1452]: docker0: Link UP Oct 2 19:15:24.782000 audit[1767]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_unregister_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.782000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc13c5fc00 a2=0 a3=7ffc13c5fbec items=0 ppid=1686 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.782000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:15:24.783000 audit[1768]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:24.783000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc9b5757b0 a2=0 a3=7ffc9b57579c items=0 ppid=1686 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:24.783000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:15:24.785086 env[1686]: time="2023-10-02T19:15:24.785054648Z" level=info msg="Loading containers: done." Oct 2 19:15:24.826141 env[1686]: time="2023-10-02T19:15:24.826091279Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:15:24.826411 env[1686]: time="2023-10-02T19:15:24.826353579Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:15:24.826522 env[1686]: time="2023-10-02T19:15:24.826497780Z" level=info msg="Daemon has completed initialization" Oct 2 19:15:24.855182 systemd[1]: Started docker.service. Oct 2 19:15:24.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:24.865257 env[1686]: time="2023-10-02T19:15:24.865189209Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:15:24.882638 systemd[1]: Reloading. Oct 2 19:15:24.970255 /usr/lib/systemd/system-generators/torcx-generator[1821]: time="2023-10-02T19:15:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:15:24.970720 /usr/lib/systemd/system-generators/torcx-generator[1821]: time="2023-10-02T19:15:24Z" level=info msg="torcx already run" Oct 2 19:15:25.051445 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:15:25.051467 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:15:25.069666 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:15:25.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.134000 audit: BPF prog-id=32 op=LOAD Oct 2 19:15:25.134000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:15:25.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit: BPF prog-id=33 op=LOAD Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.135000 audit: BPF prog-id=34 op=LOAD Oct 2 19:15:25.135000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:15:25.135000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:15:25.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.136000 audit: BPF prog-id=35 op=LOAD Oct 2 19:15:25.136000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit: BPF prog-id=36 op=LOAD Oct 2 19:15:25.137000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.138000 audit: BPF prog-id=37 op=LOAD Oct 2 19:15:25.138000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit: BPF prog-id=38 op=LOAD Oct 2 19:15:25.142000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit: BPF prog-id=39 op=LOAD Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.142000 audit: BPF prog-id=40 op=LOAD Oct 2 19:15:25.142000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:15:25.143000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit: BPF prog-id=41 op=LOAD Oct 2 19:15:25.144000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit: BPF prog-id=42 op=LOAD Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.144000 audit: BPF prog-id=43 op=LOAD Oct 2 19:15:25.144000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:15:25.144000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit: BPF prog-id=44 op=LOAD Oct 2 19:15:25.146000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit: BPF prog-id=45 op=LOAD Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:25.146000 audit: BPF prog-id=46 op=LOAD Oct 2 19:15:25.146000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:15:25.146000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:15:25.159119 systemd[1]: Started kubelet.service. Oct 2 19:15:25.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:25.230978 kubelet[1876]: E1002 19:15:25.230830 1876 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Oct 2 19:15:25.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:15:25.235614 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:15:25.235725 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:15:28.924385 env[1311]: time="2023-10-02T19:15:28.924322359Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.9\"" Oct 2 19:15:29.522279 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2794933138.mount: Deactivated successfully. Oct 2 19:15:31.561056 env[1311]: time="2023-10-02T19:15:31.561001707Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:31.569326 env[1311]: time="2023-10-02T19:15:31.569197362Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c52a40ca2c2b6ae662714743a505c761236790f8bfce772fc577c3c965462d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:31.575057 env[1311]: time="2023-10-02T19:15:31.574014687Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:31.582079 env[1311]: time="2023-10-02T19:15:31.582049831Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5f354253b464a8802ce01ffdd1bb8d0d17785daca4b6c8b84df06e9949e21449,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:31.582392 env[1311]: time="2023-10-02T19:15:31.582365652Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.9\" returns image reference \"sha256:6c52a40ca2c2b6ae662714743a505c761236790f8bfce772fc577c3c965462d2\"" Oct 2 19:15:31.593294 env[1311]: time="2023-10-02T19:15:31.593265489Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.9\"" Oct 2 19:15:33.532085 env[1311]: time="2023-10-02T19:15:33.532027848Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:33.540049 env[1311]: time="2023-10-02T19:15:33.540002057Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:139e76b0f613cb0698b528828be26fb99b86eb7374a2372b3ff41657e2e24c7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:33.544539 env[1311]: time="2023-10-02T19:15:33.544503645Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:33.548734 env[1311]: time="2023-10-02T19:15:33.548703013Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:27bf12cdfcccc8893cd66e4573044ec46fb05964a02f67b3e1a59f66db7ee101,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:33.549401 env[1311]: time="2023-10-02T19:15:33.549369056Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.9\" returns image reference \"sha256:139e76b0f613cb0698b528828be26fb99b86eb7374a2372b3ff41657e2e24c7c\"" Oct 2 19:15:33.561003 env[1311]: time="2023-10-02T19:15:33.560973798Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.9\"" Oct 2 19:15:34.943106 env[1311]: time="2023-10-02T19:15:34.943049883Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:34.950648 env[1311]: time="2023-10-02T19:15:34.950604053Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:93796172d009be2c7ea43f869773c64826626d7f09a926298e9a046781b30999,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:34.955002 env[1311]: time="2023-10-02T19:15:34.954969024Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:34.960208 env[1311]: time="2023-10-02T19:15:34.960173348Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:cf0312a97893a0ff42b2863cdb43243afc6397c77f2f2036a73708069e9af315,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:34.960814 env[1311]: time="2023-10-02T19:15:34.960781886Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.9\" returns image reference \"sha256:93796172d009be2c7ea43f869773c64826626d7f09a926298e9a046781b30999\"" Oct 2 19:15:34.970772 env[1311]: time="2023-10-02T19:15:34.970734204Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.9\"" Oct 2 19:15:35.373208 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:15:35.388260 kernel: kauditd_printk_skb: 258 callbacks suppressed Oct 2 19:15:35.390697 kernel: audit: type=1130 audit(1696274135.371:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:35.390761 kernel: audit: type=1131 audit(1696274135.371:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:35.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:35.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:35.373562 systemd[1]: Stopped kubelet.service. Oct 2 19:15:35.375614 systemd[1]: Started kubelet.service. Oct 2 19:15:35.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:35.415608 kernel: audit: type=1130 audit(1696274135.373:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:35.431923 kubelet[1911]: E1002 19:15:35.431880 1911 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Oct 2 19:15:35.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:15:35.435187 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:15:35.449598 kernel: audit: type=1131 audit(1696274135.433:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:15:35.435299 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:15:36.017719 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1938397338.mount: Deactivated successfully. Oct 2 19:15:36.499738 env[1311]: time="2023-10-02T19:15:36.499682567Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:36.507544 env[1311]: time="2023-10-02T19:15:36.507504727Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95433ef6ee1d55f93a09fe73299b8b95f623d791acd4da21a86bb749626df9ad,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:36.511245 env[1311]: time="2023-10-02T19:15:36.511208345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:36.514478 env[1311]: time="2023-10-02T19:15:36.514444835Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d8c8e3e8fe630c3f2d84a22722d4891343196483ac4cc02c1ba9345b1bfc8a3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:36.514899 env[1311]: time="2023-10-02T19:15:36.514867760Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.9\" returns image reference \"sha256:95433ef6ee1d55f93a09fe73299b8b95f623d791acd4da21a86bb749626df9ad\"" Oct 2 19:15:36.525086 env[1311]: time="2023-10-02T19:15:36.525059459Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:15:36.988911 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2921648312.mount: Deactivated successfully. Oct 2 19:15:37.011026 env[1311]: time="2023-10-02T19:15:37.010982015Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:37.018773 env[1311]: time="2023-10-02T19:15:37.018732658Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:37.022721 env[1311]: time="2023-10-02T19:15:37.022689584Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:37.027838 env[1311]: time="2023-10-02T19:15:37.027809077Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:37.028266 env[1311]: time="2023-10-02T19:15:37.028236702Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 19:15:37.037800 env[1311]: time="2023-10-02T19:15:37.037773347Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Oct 2 19:15:37.874123 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount240919566.mount: Deactivated successfully. Oct 2 19:15:42.022286 env[1311]: time="2023-10-02T19:15:42.022228748Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:42.030891 env[1311]: time="2023-10-02T19:15:42.030803175Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:42.036697 env[1311]: time="2023-10-02T19:15:42.036658568Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:42.041615 env[1311]: time="2023-10-02T19:15:42.041581113Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:42.043144 env[1311]: time="2023-10-02T19:15:42.043105289Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Oct 2 19:15:42.057659 env[1311]: time="2023-10-02T19:15:42.057619714Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Oct 2 19:15:42.592189 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2353984399.mount: Deactivated successfully. Oct 2 19:15:43.190736 env[1311]: time="2023-10-02T19:15:43.190678506Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:43.201334 env[1311]: time="2023-10-02T19:15:43.201240619Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:43.210129 env[1311]: time="2023-10-02T19:15:43.210094549Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:43.230813 env[1311]: time="2023-10-02T19:15:43.230761253Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:43.231570 env[1311]: time="2023-10-02T19:15:43.231526090Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Oct 2 19:15:45.419866 systemd[1]: Stopped kubelet.service. Oct 2 19:15:45.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:45.452529 kernel: audit: type=1130 audit(1696274145.419:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:45.452654 kernel: audit: type=1131 audit(1696274145.419:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:45.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:45.441938 systemd[1]: Reloading. Oct 2 19:15:45.522361 /usr/lib/systemd/system-generators/torcx-generator[2010]: time="2023-10-02T19:15:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:15:45.522396 /usr/lib/systemd/system-generators/torcx-generator[2010]: time="2023-10-02T19:15:45Z" level=info msg="torcx already run" Oct 2 19:15:45.621824 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:15:45.621844 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:15:45.639801 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:15:45.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.719385 kernel: audit: type=1400 audit(1696274145.703:387): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.745302 kernel: audit: type=1400 audit(1696274145.703:388): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.745391 kernel: audit: type=1400 audit(1696274145.704:389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.758680 kernel: audit: type=1400 audit(1696274145.704:390): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.774107 kernel: audit: type=1400 audit(1696274145.704:391): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.788116 kernel: audit: type=1400 audit(1696274145.704:392): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.788187 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:15:45.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.805638 kernel: audit: type=1400 audit(1696274145.704:393): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.717000 audit: BPF prog-id=47 op=LOAD Oct 2 19:15:45.717000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:15:45.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.717000 audit: BPF prog-id=48 op=LOAD Oct 2 19:15:45.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.731000 audit: BPF prog-id=49 op=LOAD Oct 2 19:15:45.731000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:15:45.731000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:15:45.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.744000 audit: BPF prog-id=50 op=LOAD Oct 2 19:15:45.744000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:15:45.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.757000 audit: BPF prog-id=51 op=LOAD Oct 2 19:15:45.757000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:15:45.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.773000 audit: BPF prog-id=52 op=LOAD Oct 2 19:15:45.773000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:15:45.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.805000 audit: BPF prog-id=53 op=LOAD Oct 2 19:15:45.805000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:15:45.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.805000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:15:45.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.806000 audit: BPF prog-id=56 op=LOAD Oct 2 19:15:45.806000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit: BPF prog-id=57 op=LOAD Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.807000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit: BPF prog-id=59 op=LOAD Oct 2 19:15:45.809000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit: BPF prog-id=60 op=LOAD Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:45.809000 audit: BPF prog-id=61 op=LOAD Oct 2 19:15:45.809000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:15:45.809000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:15:45.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:45.827452 systemd[1]: Started kubelet.service. Oct 2 19:15:45.880776 kubelet[2073]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:15:45.881125 kubelet[2073]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:15:45.881269 kubelet[2073]: I1002 19:15:45.881241 2073 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:15:45.882704 kubelet[2073]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:15:45.882794 kubelet[2073]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:15:46.226923 kubelet[2073]: I1002 19:15:46.226886 2073 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Oct 2 19:15:46.226923 kubelet[2073]: I1002 19:15:46.226912 2073 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:15:46.227204 kubelet[2073]: I1002 19:15:46.227184 2073 server.go:836] "Client rotation is on, will bootstrap in background" Oct 2 19:15:46.230167 kubelet[2073]: I1002 19:15:46.230146 2073 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:15:46.230498 kubelet[2073]: E1002 19:15:46.230482 2073 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.37:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:46.233620 kubelet[2073]: I1002 19:15:46.233587 2073 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:15:46.233881 kubelet[2073]: I1002 19:15:46.233863 2073 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:15:46.234004 kubelet[2073]: I1002 19:15:46.233989 2073 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>} {Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:15:46.234135 kubelet[2073]: I1002 19:15:46.234022 2073 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:15:46.234135 kubelet[2073]: I1002 19:15:46.234046 2073 container_manager_linux.go:308] "Creating device plugin manager" Oct 2 19:15:46.234227 kubelet[2073]: I1002 19:15:46.234144 2073 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:15:46.239738 kubelet[2073]: I1002 19:15:46.239719 2073 kubelet.go:398] "Attempting to sync node with API server" Oct 2 19:15:46.239826 kubelet[2073]: I1002 19:15:46.239745 2073 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:15:46.239826 kubelet[2073]: I1002 19:15:46.239770 2073 kubelet.go:297] "Adding apiserver pod source" Oct 2 19:15:46.239826 kubelet[2073]: I1002 19:15:46.239783 2073 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:15:46.240882 kubelet[2073]: W1002 19:15:46.240839 2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:46.240987 kubelet[2073]: E1002 19:15:46.240901 2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:46.241046 kubelet[2073]: W1002 19:15:46.240994 2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-e4b0ec5c33&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:46.241046 kubelet[2073]: E1002 19:15:46.241034 2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-e4b0ec5c33&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:46.241135 kubelet[2073]: I1002 19:15:46.241129 2073 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:15:46.241403 kubelet[2073]: W1002 19:15:46.241383 2073 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:15:46.241835 kubelet[2073]: I1002 19:15:46.241812 2073 server.go:1186] "Started kubelet" Oct 2 19:15:46.242000 audit[2073]: AVC avc: denied { mac_admin } for pid=2073 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:46.242000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:15:46.242000 audit[2073]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e4dad0 a1=c000e30b70 a2=c000e4daa0 a3=25 items=0 ppid=1 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.242000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:15:46.242000 audit[2073]: AVC avc: denied { mac_admin } for pid=2073 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:46.242000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:15:46.242000 audit[2073]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000209400 a1=c000e30b88 a2=c000e4db60 a3=25 items=0 ppid=1 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.242000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:15:46.243965 kubelet[2073]: I1002 19:15:46.243386 2073 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:15:46.243965 kubelet[2073]: I1002 19:15:46.243441 2073 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:15:46.243965 kubelet[2073]: I1002 19:15:46.243508 2073 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:15:46.245000 audit[2086]: NETFILTER_CFG table=mangle:30 family=2 entries=2 op=nft_register_chain pid=2086 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.245000 audit[2086]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdbb6110b0 a2=0 a3=7ffdbb61109c items=0 ppid=2073 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:15:46.246936 kubelet[2073]: I1002 19:15:46.246866 2073 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:15:46.247439 kubelet[2073]: E1002 19:15:46.247320 2073 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a6059486b8865", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 241775717, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 241775717, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.8.37:6443/api/v1/namespaces/default/events": dial tcp 10.200.8.37:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:15:46.247850 kubelet[2073]: E1002 19:15:46.247835 2073 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:15:46.247990 kubelet[2073]: E1002 19:15:46.247978 2073 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:15:46.248572 kubelet[2073]: I1002 19:15:46.248545 2073 server.go:451] "Adding debug handlers to kubelet server" Oct 2 19:15:46.249455 kubelet[2073]: I1002 19:15:46.249432 2073 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 19:15:46.249000 audit[2087]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2087 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.249000 audit[2087]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffca1ba290 a2=0 a3=7fffca1ba27c items=0 ppid=2073 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.249000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:15:46.251085 kubelet[2073]: I1002 19:15:46.251018 2073 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:15:46.251410 kubelet[2073]: E1002 19:15:46.251373 2073 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-e4b0ec5c33?timeout=10s": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:46.253246 kubelet[2073]: W1002 19:15:46.253211 2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:46.253368 kubelet[2073]: E1002 19:15:46.253358 2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:46.253000 audit[2089]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2089 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.253000 audit[2089]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff73fee0b0 a2=0 a3=7fff73fee09c items=0 ppid=2073 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:15:46.256000 audit[2091]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=2091 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.256000 audit[2091]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd09ae36c0 a2=0 a3=7ffd09ae36ac items=0 ppid=2073 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:15:46.297626 kubelet[2073]: I1002 19:15:46.297607 2073 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:15:46.297626 kubelet[2073]: I1002 19:15:46.297626 2073 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:15:46.297781 kubelet[2073]: I1002 19:15:46.297643 2073 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:15:46.303600 kubelet[2073]: I1002 19:15:46.303573 2073 policy_none.go:49] "None policy: Start" Oct 2 19:15:46.304134 kubelet[2073]: I1002 19:15:46.304115 2073 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:15:46.304134 kubelet[2073]: I1002 19:15:46.304141 2073 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:15:46.307000 audit[2094]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2094 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.307000 audit[2094]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc09749590 a2=0 a3=7ffc0974957c items=0 ppid=2073 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.307000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:15:46.312000 audit[2096]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2096 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.312000 audit[2096]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc5e3ef70 a2=0 a3=7ffcc5e3ef5c items=0 ppid=2073 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.312000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:15:46.312809 systemd[1]: Created slice kubepods.slice. Oct 2 19:15:46.330723 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:15:46.334119 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:15:46.340690 kubelet[2073]: I1002 19:15:46.340667 2073 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:15:46.339000 audit[2073]: AVC avc: denied { mac_admin } for pid=2073 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:46.339000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:15:46.339000 audit[2073]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000da5980 a1=c001069620 a2=c000da5950 a3=25 items=0 ppid=1 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.339000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:15:46.341062 kubelet[2073]: I1002 19:15:46.340766 2073 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:15:46.341062 kubelet[2073]: I1002 19:15:46.341000 2073 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:15:46.342741 kubelet[2073]: E1002 19:15:46.342589 2073 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.0-a-e4b0ec5c33\" not found" Oct 2 19:15:46.351621 kubelet[2073]: I1002 19:15:46.351602 2073 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:46.351925 kubelet[2073]: E1002 19:15:46.351907 2073 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.37:6443/api/v1/nodes\": dial tcp 10.200.8.37:6443: connect: connection refused" node="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:46.374000 audit[2099]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2099 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.374000 audit[2099]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc6a510cb0 a2=0 a3=7ffc6a510c9c items=0 ppid=2073 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.374000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:15:46.415000 audit[2102]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.415000 audit[2102]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fff950293e0 a2=0 a3=7fff950293cc items=0 ppid=2073 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.415000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:15:46.417000 audit[2103]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2103 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.417000 audit[2103]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe8e142190 a2=0 a3=7ffe8e14217c items=0 ppid=2073 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:15:46.418000 audit[2104]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.418000 audit[2104]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3cfdc150 a2=0 a3=7ffc3cfdc13c items=0 ppid=2073 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:15:46.421000 audit[2106]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.421000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe1593c100 a2=0 a3=7ffe1593c0ec items=0 ppid=2073 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:15:46.424000 audit[2108]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_rule pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.424000 audit[2108]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff91abe8a0 a2=0 a3=7fff91abe88c items=0 ppid=2073 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:15:46.426000 audit[2110]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_rule pid=2110 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.426000 audit[2110]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe040d7000 a2=0 a3=7ffe040d6fec items=0 ppid=2073 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:15:46.428000 audit[2112]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_rule pid=2112 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.428000 audit[2112]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffd9eb1f330 a2=0 a3=7ffd9eb1f31c items=0 ppid=2073 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:15:46.430000 audit[2114]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_rule pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.430000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7fff386ed890 a2=0 a3=7fff386ed87c items=0 ppid=2073 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:15:46.432131 kubelet[2073]: I1002 19:15:46.432110 2073 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:15:46.432000 audit[2115]: NETFILTER_CFG table=mangle:45 family=10 entries=2 op=nft_register_chain pid=2115 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:15:46.432000 audit[2115]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff4f282740 a2=0 a3=7fff4f28272c items=0 ppid=2073 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:15:46.432000 audit[2116]: NETFILTER_CFG table=mangle:46 family=2 entries=1 op=nft_register_chain pid=2116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.432000 audit[2116]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9be97630 a2=0 a3=7ffe9be9761c items=0 ppid=2073 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:15:46.433000 audit[2117]: NETFILTER_CFG table=nat:47 family=10 entries=2 op=nft_register_chain pid=2117 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:15:46.433000 audit[2117]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffebfa0ec60 a2=0 a3=7ffebfa0ec4c items=0 ppid=2073 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.433000 audit[2118]: NETFILTER_CFG table=nat:48 family=2 entries=1 op=nft_register_chain pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.433000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd299ce00 a2=0 a3=7ffcd299cdec items=0 ppid=2073 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:15:46.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:15:46.434000 audit[2119]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:15:46.434000 audit[2119]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1315a5c0 a2=0 a3=7fff1315a5ac items=0 ppid=2073 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:15:46.436000 audit[2121]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_rule pid=2121 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:15:46.436000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffce02864e0 a2=0 a3=7ffce02864cc items=0 ppid=2073 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:15:46.437000 audit[2122]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:15:46.437000 audit[2122]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffea3701f0 a2=0 a3=7fffea3701dc items=0 ppid=2073 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:15:46.439000 audit[2124]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2124 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:15:46.439000 audit[2124]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fff768b0e50 a2=0 a3=7fff768b0e3c items=0 ppid=2073 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:15:46.440000 audit[2125]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_chain pid=2125 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:15:46.440000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd185edee0 a2=0 a3=7ffd185edecc items=0 ppid=2073 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:15:46.441000 audit[2126]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_chain pid=2126 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:15:46.441000 audit[2126]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd55d09530 a2=0 a3=7ffd55d0951c items=0 ppid=2073 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:15:46.443000 audit[2128]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2128 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:15:46.443000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc4e545600 a2=0 a3=7ffc4e5455ec items=0 ppid=2073 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:15:46.445000 audit[2130]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:15:46.445000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffea3702140 a2=0 a3=7ffea370212c items=0 ppid=2073 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.445000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:15:46.447000 audit[2132]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_rule pid=2132 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:15:46.447000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffd1fbcaa70 a2=0 a3=7ffd1fbcaa5c items=0 ppid=2073 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:15:46.449000 audit[2134]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_rule pid=2134 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:15:46.449000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7fff77dae160 a2=0 a3=7fff77dae14c items=0 ppid=2073 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:15:46.451862 kubelet[2073]: E1002 19:15:46.451828 2073 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-e4b0ec5c33?timeout=10s": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:46.452000 audit[2136]: NETFILTER_CFG table=nat:59 family=10 entries=1 op=nft_register_rule pid=2136 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:15:46.452000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffd0ba863f0 a2=0 a3=7ffd0ba863dc items=0 ppid=2073 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.452000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:15:46.454308 kubelet[2073]: I1002 19:15:46.454272 2073 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:15:46.454395 kubelet[2073]: I1002 19:15:46.454319 2073 status_manager.go:176] "Starting to sync pod status with apiserver" Oct 2 19:15:46.454395 kubelet[2073]: I1002 19:15:46.454342 2073 kubelet.go:2113] "Starting kubelet main sync loop" Oct 2 19:15:46.454475 kubelet[2073]: E1002 19:15:46.454396 2073 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 19:15:46.455465 kubelet[2073]: W1002 19:15:46.455353 2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:46.455605 kubelet[2073]: E1002 19:15:46.455590 2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:46.460000 audit[2137]: NETFILTER_CFG table=mangle:60 family=10 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:15:46.460000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd75f46670 a2=0 a3=7ffd75f4665c items=0 ppid=2073 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:15:46.461000 audit[2138]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:15:46.461000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeeb73f2c0 a2=0 a3=7ffeeb73f2ac items=0 ppid=2073 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:15:46.462000 audit[2139]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:15:46.462000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd81348e90 a2=0 a3=7ffd81348e7c items=0 ppid=2073 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:46.462000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:15:46.557991 kubelet[2073]: I1002 19:15:46.553987 2073 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:46.557991 kubelet[2073]: E1002 19:15:46.554364 2073 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.37:6443/api/v1/nodes\": dial tcp 10.200.8.37:6443: connect: connection refused" node="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:46.557991 kubelet[2073]: I1002 19:15:46.554464 2073 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:15:46.559844 kubelet[2073]: I1002 19:15:46.559824 2073 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:15:46.561178 kubelet[2073]: I1002 19:15:46.561159 2073 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:15:46.562214 kubelet[2073]: I1002 19:15:46.562190 2073 status_manager.go:698] "Failed to get status for pod" podUID=4f2db13905ed6eb6a2edcb5348452af6 pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" err="Get \"https://10.200.8.37:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\": dial tcp 10.200.8.37:6443: connect: connection refused" Oct 2 19:15:46.563108 kubelet[2073]: I1002 19:15:46.562800 2073 status_manager.go:698] "Failed to get status for pod" podUID=9d26e32db3a020d8b883070061674906 pod="kube-system/kube-scheduler-ci-3510.3.0-a-e4b0ec5c33" err="Get \"https://10.200.8.37:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.0-a-e4b0ec5c33\": dial tcp 10.200.8.37:6443: connect: connection refused" Oct 2 19:15:46.564596 kubelet[2073]: I1002 19:15:46.564576 2073 status_manager.go:698] "Failed to get status for pod" podUID=0e9923d274f84de35f2a55d22e743214 pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33" err="Get \"https://10.200.8.37:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\": dial tcp 10.200.8.37:6443: connect: connection refused" Oct 2 19:15:46.567550 systemd[1]: Created slice kubepods-burstable-pod4f2db13905ed6eb6a2edcb5348452af6.slice. Oct 2 19:15:46.577244 systemd[1]: Created slice kubepods-burstable-pod9d26e32db3a020d8b883070061674906.slice. Oct 2 19:15:46.585713 systemd[1]: Created slice kubepods-burstable-pod0e9923d274f84de35f2a55d22e743214.slice. Oct 2 19:15:46.652838 kubelet[2073]: I1002 19:15:46.652798 2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:46.653066 kubelet[2073]: I1002 19:15:46.653044 2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0e9923d274f84de35f2a55d22e743214-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"0e9923d274f84de35f2a55d22e743214\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:46.653186 kubelet[2073]: I1002 19:15:46.653168 2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0e9923d274f84de35f2a55d22e743214-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"0e9923d274f84de35f2a55d22e743214\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:46.653186 kubelet[2073]: I1002 19:15:46.653255 2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:46.653186 kubelet[2073]: I1002 19:15:46.653413 2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:46.653853 kubelet[2073]: I1002 19:15:46.653508 2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:46.653853 kubelet[2073]: I1002 19:15:46.653662 2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9d26e32db3a020d8b883070061674906-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"9d26e32db3a020d8b883070061674906\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:46.653853 kubelet[2073]: I1002 19:15:46.653788 2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0e9923d274f84de35f2a55d22e743214-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"0e9923d274f84de35f2a55d22e743214\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:46.654030 kubelet[2073]: I1002 19:15:46.653929 2073 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:46.852651 kubelet[2073]: E1002 19:15:46.852521 2073 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-e4b0ec5c33?timeout=10s": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:46.876829 env[1311]: time="2023-10-02T19:15:46.876785096Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33,Uid:4f2db13905ed6eb6a2edcb5348452af6,Namespace:kube-system,Attempt:0,}" Oct 2 19:15:46.880369 env[1311]: time="2023-10-02T19:15:46.880329055Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-e4b0ec5c33,Uid:9d26e32db3a020d8b883070061674906,Namespace:kube-system,Attempt:0,}" Oct 2 19:15:46.888846 env[1311]: time="2023-10-02T19:15:46.888804335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-e4b0ec5c33,Uid:0e9923d274f84de35f2a55d22e743214,Namespace:kube-system,Attempt:0,}" Oct 2 19:15:46.956616 kubelet[2073]: I1002 19:15:46.956581 2073 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:46.957217 kubelet[2073]: E1002 19:15:46.957193 2073 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.37:6443/api/v1/nodes\": dial tcp 10.200.8.37:6443: connect: connection refused" node="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:47.254843 kubelet[2073]: W1002 19:15:47.254786 2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:47.254843 kubelet[2073]: E1002 19:15:47.254845 2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:47.305868 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1983845509.mount: Deactivated successfully. Oct 2 19:15:47.336628 env[1311]: time="2023-10-02T19:15:47.336572730Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:47.341353 env[1311]: time="2023-10-02T19:15:47.341262735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:47.358990 env[1311]: time="2023-10-02T19:15:47.358867404Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:47.367886 env[1311]: time="2023-10-02T19:15:47.367843996Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:47.371882 env[1311]: time="2023-10-02T19:15:47.371845571Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:47.383012 env[1311]: time="2023-10-02T19:15:47.382967656Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:47.386801 env[1311]: time="2023-10-02T19:15:47.386763222Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:47.390121 kubelet[2073]: W1002 19:15:47.390072 2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:47.390220 kubelet[2073]: E1002 19:15:47.390133 2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:47.394914 env[1311]: time="2023-10-02T19:15:47.394877677Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:47.403511 env[1311]: time="2023-10-02T19:15:47.403478452Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:47.407133 env[1311]: time="2023-10-02T19:15:47.407101411Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:47.417648 env[1311]: time="2023-10-02T19:15:47.417614170Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:47.425524 kubelet[2073]: W1002 19:15:47.425480 2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-e4b0ec5c33&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:47.425604 kubelet[2073]: E1002 19:15:47.425554 2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-e4b0ec5c33&limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:47.432373 env[1311]: time="2023-10-02T19:15:47.432334613Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:15:47.480616 env[1311]: time="2023-10-02T19:15:47.480546919Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:15:47.480784 env[1311]: time="2023-10-02T19:15:47.480621422Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:15:47.480784 env[1311]: time="2023-10-02T19:15:47.480659624Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:15:47.481038 env[1311]: time="2023-10-02T19:15:47.480932536Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7cfd20c37937a8d66ec1929030c7766ffdff3dd8f90e632aeb052fcbc3c6e703 pid=2148 runtime=io.containerd.runc.v2 Oct 2 19:15:47.502592 env[1311]: time="2023-10-02T19:15:47.502420974Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:15:47.502592 env[1311]: time="2023-10-02T19:15:47.502461976Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:15:47.502592 env[1311]: time="2023-10-02T19:15:47.502477877Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:15:47.502891 env[1311]: time="2023-10-02T19:15:47.502844093Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/41eab9d7fec589018a511777f98d420398c4fee6f7543b8fc333624aa63a3303 pid=2172 runtime=io.containerd.runc.v2 Oct 2 19:15:47.506387 systemd[1]: Started cri-containerd-7cfd20c37937a8d66ec1929030c7766ffdff3dd8f90e632aeb052fcbc3c6e703.scope. Oct 2 19:15:47.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.524000 audit: BPF prog-id=62 op=LOAD Oct 2 19:15:47.524000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.524000 audit[2158]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2148 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763666432306333373933376138643636656331393239303330633737 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2148 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763666432306333373933376138643636656331393239303330633737 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit: BPF prog-id=63 op=LOAD Oct 2 19:15:47.525000 audit[2158]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e49b0 items=0 ppid=2148 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763666432306333373933376138643636656331393239303330633737 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit: BPF prog-id=64 op=LOAD Oct 2 19:15:47.525000 audit[2158]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e49f8 items=0 ppid=2148 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763666432306333373933376138643636656331393239303330633737 Oct 2 19:15:47.525000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:15:47.525000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { perfmon } for pid=2158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit[2158]: AVC avc: denied { bpf } for pid=2158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.525000 audit: BPF prog-id=65 op=LOAD Oct 2 19:15:47.525000 audit[2158]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e4e08 items=0 ppid=2148 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763666432306333373933376138643636656331393239303330633737 Oct 2 19:15:47.529053 kubelet[2073]: W1002 19:15:47.528993 2073 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:47.529119 kubelet[2073]: E1002 19:15:47.529068 2073 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:47.536994 env[1311]: time="2023-10-02T19:15:47.535766931Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:15:47.536994 env[1311]: time="2023-10-02T19:15:47.535847034Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:15:47.536994 env[1311]: time="2023-10-02T19:15:47.535874536Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:15:47.536994 env[1311]: time="2023-10-02T19:15:47.536042143Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d7d62d01932c1f74bc63f89d5089ce7de3c2aea9dbad551d69f6e7bebcbccf73 pid=2205 runtime=io.containerd.runc.v2 Oct 2 19:15:47.542932 systemd[1]: Started cri-containerd-41eab9d7fec589018a511777f98d420398c4fee6f7543b8fc333624aa63a3303.scope. Oct 2 19:15:47.557208 systemd[1]: Started cri-containerd-d7d62d01932c1f74bc63f89d5089ce7de3c2aea9dbad551d69f6e7bebcbccf73.scope. Oct 2 19:15:47.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.580000 audit: BPF prog-id=66 op=LOAD Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2205 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437643632643031393332633166373462633633663839643530383963 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2205 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437643632643031393332633166373462633633663839643530383963 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit: BPF prog-id=67 op=LOAD Oct 2 19:15:47.581000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003c66f0 items=0 ppid=2205 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437643632643031393332633166373462633633663839643530383963 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit: BPF prog-id=68 op=LOAD Oct 2 19:15:47.581000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003c6738 items=0 ppid=2205 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437643632643031393332633166373462633633663839643530383963 Oct 2 19:15:47.581000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:15:47.581000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.581000 audit: BPF prog-id=69 op=LOAD Oct 2 19:15:47.581000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003c6b48 items=0 ppid=2205 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437643632643031393332633166373462633633663839643530383963 Oct 2 19:15:47.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.592000 audit: BPF prog-id=70 op=LOAD Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2172 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431656162396437666563353839303138613531313737376639386434 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2172 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431656162396437666563353839303138613531313737376639386434 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit: BPF prog-id=71 op=LOAD Oct 2 19:15:47.593000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ac770 items=0 ppid=2172 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431656162396437666563353839303138613531313737376639386434 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit: BPF prog-id=72 op=LOAD Oct 2 19:15:47.593000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ac7b8 items=0 ppid=2172 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431656162396437666563353839303138613531313737376639386434 Oct 2 19:15:47.593000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:15:47.593000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.593000 audit: BPF prog-id=73 op=LOAD Oct 2 19:15:47.593000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003acbc8 items=0 ppid=2172 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431656162396437666563353839303138613531313737376639386434 Oct 2 19:15:47.598013 env[1311]: time="2023-10-02T19:15:47.597939847Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33,Uid:4f2db13905ed6eb6a2edcb5348452af6,Namespace:kube-system,Attempt:0,} returns sandbox id \"7cfd20c37937a8d66ec1929030c7766ffdff3dd8f90e632aeb052fcbc3c6e703\"" Oct 2 19:15:47.602623 env[1311]: time="2023-10-02T19:15:47.602589250Z" level=info msg="CreateContainer within sandbox \"7cfd20c37937a8d66ec1929030c7766ffdff3dd8f90e632aeb052fcbc3c6e703\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:15:47.638364 env[1311]: time="2023-10-02T19:15:47.638322711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-e4b0ec5c33,Uid:9d26e32db3a020d8b883070061674906,Namespace:kube-system,Attempt:0,} returns sandbox id \"41eab9d7fec589018a511777f98d420398c4fee6f7543b8fc333624aa63a3303\"" Oct 2 19:15:47.640733 env[1311]: time="2023-10-02T19:15:47.640702915Z" level=info msg="CreateContainer within sandbox \"41eab9d7fec589018a511777f98d420398c4fee6f7543b8fc333624aa63a3303\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:15:47.650087 env[1311]: time="2023-10-02T19:15:47.650058623Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-e4b0ec5c33,Uid:0e9923d274f84de35f2a55d22e743214,Namespace:kube-system,Attempt:0,} returns sandbox id \"d7d62d01932c1f74bc63f89d5089ce7de3c2aea9dbad551d69f6e7bebcbccf73\"" Oct 2 19:15:47.652272 env[1311]: time="2023-10-02T19:15:47.651482186Z" level=info msg="CreateContainer within sandbox \"7cfd20c37937a8d66ec1929030c7766ffdff3dd8f90e632aeb052fcbc3c6e703\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324\"" Oct 2 19:15:47.652272 env[1311]: time="2023-10-02T19:15:47.652135714Z" level=info msg="StartContainer for \"2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324\"" Oct 2 19:15:47.653372 kubelet[2073]: E1002 19:15:47.653341 2073 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-e4b0ec5c33?timeout=10s": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:47.654030 env[1311]: time="2023-10-02T19:15:47.653989995Z" level=info msg="CreateContainer within sandbox \"d7d62d01932c1f74bc63f89d5089ce7de3c2aea9dbad551d69f6e7bebcbccf73\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:15:47.670423 systemd[1]: Started cri-containerd-2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324.scope. Oct 2 19:15:47.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.689000 audit: BPF prog-id=74 op=LOAD Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2148 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363631336632373737376664343866323766333634333130303433 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2148 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363631336632373737376664343866323766333634333130303433 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit: BPF prog-id=75 op=LOAD Oct 2 19:15:47.690000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024f20 items=0 ppid=2148 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363631336632373737376664343866323766333634333130303433 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit: BPF prog-id=76 op=LOAD Oct 2 19:15:47.690000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024f68 items=0 ppid=2148 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363631336632373737376664343866323766333634333130303433 Oct 2 19:15:47.690000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:15:47.690000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:47.690000 audit: BPF prog-id=77 op=LOAD Oct 2 19:15:47.690000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025378 items=0 ppid=2148 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:47.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265363631336632373737376664343866323766333634333130303433 Oct 2 19:15:47.758983 kubelet[2073]: I1002 19:15:47.758951 2073 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:47.759337 kubelet[2073]: E1002 19:15:47.759309 2073 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.37:6443/api/v1/nodes\": dial tcp 10.200.8.37:6443: connect: connection refused" node="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:48.225718 env[1311]: time="2023-10-02T19:15:48.225666613Z" level=info msg="StartContainer for \"2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324\" returns successfully" Oct 2 19:15:48.232131 env[1311]: time="2023-10-02T19:15:48.232083186Z" level=info msg="CreateContainer within sandbox \"d7d62d01932c1f74bc63f89d5089ce7de3c2aea9dbad551d69f6e7bebcbccf73\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"5eb4688744bfc7401cbeefb30ef7697a65bb0fecbfd443cdb56b6a9beb346ebe\"" Oct 2 19:15:48.232659 env[1311]: time="2023-10-02T19:15:48.232624609Z" level=info msg="StartContainer for \"5eb4688744bfc7401cbeefb30ef7697a65bb0fecbfd443cdb56b6a9beb346ebe\"" Oct 2 19:15:48.234569 env[1311]: time="2023-10-02T19:15:48.234533290Z" level=info msg="CreateContainer within sandbox \"41eab9d7fec589018a511777f98d420398c4fee6f7543b8fc333624aa63a3303\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966\"" Oct 2 19:15:48.235134 env[1311]: time="2023-10-02T19:15:48.235095914Z" level=info msg="StartContainer for \"92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966\"" Oct 2 19:15:48.258167 systemd[1]: Started cri-containerd-92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966.scope. Oct 2 19:15:48.273646 systemd[1]: Started cri-containerd-5eb4688744bfc7401cbeefb30ef7697a65bb0fecbfd443cdb56b6a9beb346ebe.scope. Oct 2 19:15:48.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.316000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.316000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.317000 audit: BPF prog-id=78 op=LOAD Oct 2 19:15:48.319007 kubelet[2073]: E1002 19:15:48.318981 2073 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.37:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.37:6443: connect: connection refused Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2205 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:48.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565623436383837343462666337343031636265656662333065663736 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2205 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:48.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565623436383837343462666337343031636265656662333065663736 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit: BPF prog-id=79 op=LOAD Oct 2 19:15:48.318000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003dc090 items=0 ppid=2205 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:48.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565623436383837343462666337343031636265656662333065663736 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit: BPF prog-id=80 op=LOAD Oct 2 19:15:48.318000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003dc0d8 items=0 ppid=2205 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:48.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565623436383837343462666337343031636265656662333065663736 Oct 2 19:15:48.318000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:15:48.318000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.318000 audit: BPF prog-id=81 op=LOAD Oct 2 19:15:48.318000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003dc4e8 items=0 ppid=2205 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:48.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565623436383837343462666337343031636265656662333065663736 Oct 2 19:15:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit: BPF prog-id=82 op=LOAD Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2172 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:48.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656130383063326665323335326232303439613262636461353865 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2172 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:48.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656130383063326665323335326232303439613262636461353865 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit: BPF prog-id=83 op=LOAD Oct 2 19:15:48.343000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000373720 items=0 ppid=2172 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:48.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656130383063326665323335326232303439613262636461353865 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit: BPF prog-id=84 op=LOAD Oct 2 19:15:48.343000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000373768 items=0 ppid=2172 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:48.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656130383063326665323335326232303439613262636461353865 Oct 2 19:15:48.343000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:15:48.343000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:48.343000 audit: BPF prog-id=85 op=LOAD Oct 2 19:15:48.343000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000373b78 items=0 ppid=2172 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:48.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932656130383063326665323335326232303439613262636461353865 Oct 2 19:15:48.364876 env[1311]: time="2023-10-02T19:15:48.364821734Z" level=info msg="StartContainer for \"5eb4688744bfc7401cbeefb30ef7697a65bb0fecbfd443cdb56b6a9beb346ebe\" returns successfully" Oct 2 19:15:48.416877 env[1311]: time="2023-10-02T19:15:48.416827047Z" level=info msg="StartContainer for \"92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966\" returns successfully" Oct 2 19:15:48.465481 kubelet[2073]: I1002 19:15:48.465444 2073 status_manager.go:698] "Failed to get status for pod" podUID=4f2db13905ed6eb6a2edcb5348452af6 pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" err="Get \"https://10.200.8.37:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\": dial tcp 10.200.8.37:6443: connect: connection refused" Oct 2 19:15:48.469283 kubelet[2073]: I1002 19:15:48.469251 2073 status_manager.go:698] "Failed to get status for pod" podUID=0e9923d274f84de35f2a55d22e743214 pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33" err="Get \"https://10.200.8.37:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\": dial tcp 10.200.8.37:6443: connect: connection refused" Oct 2 19:15:48.474203 kubelet[2073]: I1002 19:15:48.474179 2073 status_manager.go:698] "Failed to get status for pod" podUID=9d26e32db3a020d8b883070061674906 pod="kube-system/kube-scheduler-ci-3510.3.0-a-e4b0ec5c33" err="Get \"https://10.200.8.37:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.0-a-e4b0ec5c33\": dial tcp 10.200.8.37:6443: connect: connection refused" Oct 2 19:15:48.494000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:48.494000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001047560 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:15:48.494000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:48.499000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:48.499000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001087040 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:15:48.499000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:49.361959 kubelet[2073]: I1002 19:15:49.361912 2073 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:50.479956 kernel: kauditd_printk_skb: 672 callbacks suppressed Oct 2 19:15:50.480092 kernel: audit: type=1400 audit(1696274150.456:682): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:50.456000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:50.457000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:50.531960 kernel: audit: type=1400 audit(1696274150.457:683): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:50.457000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c004418060 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:15:50.583326 kernel: audit: type=1300 audit(1696274150.457:683): arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c004418060 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:15:50.583459 kernel: audit: type=1327 audit(1696274150.457:683): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:15:50.457000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:15:50.479000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:50.479000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c00445c300 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:15:50.628963 kernel: audit: type=1400 audit(1696274150.479:684): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:50.629042 kernel: audit: type=1300 audit(1696274150.479:684): arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c00445c300 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:15:50.629076 kernel: audit: type=1327 audit(1696274150.479:684): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:15:50.479000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:15:50.456000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00b7a4f60 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:15:50.456000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:15:50.691051 kernel: audit: type=1300 audit(1696274150.456:682): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00b7a4f60 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:15:50.691151 kernel: audit: type=1327 audit(1696274150.456:682): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:15:50.498000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:50.699524 kubelet[2073]: I1002 19:15:50.699503 2073 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:50.712521 kernel: audit: type=1400 audit(1696274150.498:685): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:50.498000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c000e3b920 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:15:50.498000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:15:50.550000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:50.550000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=85 a1=c0012aaf80 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:15:50.550000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:15:50.550000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:50.550000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=85 a1=c00b7a5830 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:15:50.550000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:15:50.751693 kubelet[2073]: E1002 19:15:50.751516 2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a6059486b8865", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 241775717, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 241775717, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:15:50.789097 kubelet[2073]: E1002 19:15:50.789066 2073 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: namespaces "kube-node-lease" not found Oct 2 19:15:50.815465 kubelet[2073]: E1002 19:15:50.815319 2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a605948c9fa0a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 247965194, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 247965194, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:15:50.870716 kubelet[2073]: E1002 19:15:50.870622 2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb68757", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297022295, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297022295, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:15:50.925014 kubelet[2073]: E1002 19:15:50.924880 2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb69cd3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297027795, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297027795, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:15:50.979559 kubelet[2073]: E1002 19:15:50.979461 2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb6c69f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297038495, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297038495, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:15:51.033883 kubelet[2073]: E1002 19:15:51.033695 2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594e6a8bb9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 342374329, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 342374329, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:15:51.089737 kubelet[2073]: E1002 19:15:51.089629 2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb68757", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297022295, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 351563741, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:15:51.145145 kubelet[2073]: E1002 19:15:51.145035 2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb69cd3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297027795, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 351572441, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:15:51.201369 kubelet[2073]: E1002 19:15:51.201262 2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb6c69f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297038495, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 351577341, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:15:51.243906 kubelet[2073]: I1002 19:15:51.243859 2073 apiserver.go:52] "Watching apiserver" Oct 2 19:15:51.251515 kubelet[2073]: I1002 19:15:51.251480 2073 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:15:51.286121 kubelet[2073]: I1002 19:15:51.285865 2073 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:15:51.406821 kubelet[2073]: E1002 19:15:51.406692 2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb68757", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297022295, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 553930916, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:15:51.813140 kubelet[2073]: E1002 19:15:51.813005 2073 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-e4b0ec5c33.178a60594bb69cd3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-e4b0ec5c33", UID:"ci-3510.3.0-a-e4b0ec5c33", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510.3.0-a-e4b0ec5c33 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 297027795, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 15, 46, 553937917, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 19:15:53.446140 systemd[1]: Reloading. Oct 2 19:15:53.579086 /usr/lib/systemd/system-generators/torcx-generator[2403]: time="2023-10-02T19:15:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:15:53.580217 /usr/lib/systemd/system-generators/torcx-generator[2403]: time="2023-10-02T19:15:53Z" level=info msg="torcx already run" Oct 2 19:15:53.599000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:53.600000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:53.600000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008d8520 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:15:53.600000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:53.599000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008d83e0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:15:53.599000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:53.601000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:53.601000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0008d8660 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:15:53.601000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:53.603000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:15:53.603000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c222e0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:15:53.603000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:53.710523 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:15:53.710543 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:15:53.733310 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:15:53.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.814000 audit: BPF prog-id=86 op=LOAD Oct 2 19:15:53.814000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit: BPF prog-id=87 op=LOAD Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.815000 audit: BPF prog-id=88 op=LOAD Oct 2 19:15:53.815000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:15:53.815000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:15:53.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.817000 audit: BPF prog-id=89 op=LOAD Oct 2 19:15:53.817000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:15:53.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.817000 audit: BPF prog-id=90 op=LOAD Oct 2 19:15:53.817000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:15:53.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.818000 audit: BPF prog-id=91 op=LOAD Oct 2 19:15:53.818000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:15:53.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.819000 audit: BPF prog-id=92 op=LOAD Oct 2 19:15:53.819000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:15:53.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.824000 audit: BPF prog-id=93 op=LOAD Oct 2 19:15:53.824000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit: BPF prog-id=94 op=LOAD Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.825000 audit: BPF prog-id=95 op=LOAD Oct 2 19:15:53.825000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:15:53.825000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:15:53.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.826000 audit: BPF prog-id=96 op=LOAD Oct 2 19:15:53.826000 audit: BPF prog-id=70 op=UNLOAD Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit: BPF prog-id=97 op=LOAD Oct 2 19:15:53.827000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit: BPF prog-id=98 op=LOAD Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.827000 audit: BPF prog-id=99 op=LOAD Oct 2 19:15:53.827000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:15:53.827000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:15:53.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.829000 audit: BPF prog-id=100 op=LOAD Oct 2 19:15:53.829000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:15:53.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.829000 audit: BPF prog-id=101 op=LOAD Oct 2 19:15:53.829000 audit: BPF prog-id=74 op=UNLOAD Oct 2 19:15:53.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.832000 audit: BPF prog-id=102 op=LOAD Oct 2 19:15:53.832000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:15:53.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.832000 audit: BPF prog-id=103 op=LOAD Oct 2 19:15:53.832000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:15:53.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit: BPF prog-id=104 op=LOAD Oct 2 19:15:53.834000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit: BPF prog-id=105 op=LOAD Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:53.834000 audit: BPF prog-id=106 op=LOAD Oct 2 19:15:53.834000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:15:53.834000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:15:53.852564 kubelet[2073]: I1002 19:15:53.852004 2073 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:15:53.852218 systemd[1]: Stopping kubelet.service... Oct 2 19:15:53.874313 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:15:53.874645 systemd[1]: Stopped kubelet.service. Oct 2 19:15:53.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:53.877302 systemd[1]: Started kubelet.service. Oct 2 19:15:53.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:15:53.976359 kubelet[2467]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:15:53.976710 kubelet[2467]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:15:53.976850 kubelet[2467]: I1002 19:15:53.976818 2467 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:15:53.978137 kubelet[2467]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:15:53.978213 kubelet[2467]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:15:53.981626 kubelet[2467]: I1002 19:15:53.981602 2467 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Oct 2 19:15:53.981626 kubelet[2467]: I1002 19:15:53.981621 2467 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:15:53.981854 kubelet[2467]: I1002 19:15:53.981834 2467 server.go:836] "Client rotation is on, will bootstrap in background" Oct 2 19:15:53.983077 kubelet[2467]: I1002 19:15:53.983054 2467 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:15:53.985162 kubelet[2467]: I1002 19:15:53.985141 2467 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:15:53.987183 kubelet[2467]: I1002 19:15:53.987164 2467 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:15:53.987406 kubelet[2467]: I1002 19:15:53.987389 2467 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:15:53.987478 kubelet[2467]: I1002 19:15:53.987468 2467 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:15:53.987655 kubelet[2467]: I1002 19:15:53.987497 2467 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:15:53.987655 kubelet[2467]: I1002 19:15:53.987512 2467 container_manager_linux.go:308] "Creating device plugin manager" Oct 2 19:15:53.987655 kubelet[2467]: I1002 19:15:53.987555 2467 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:15:53.990277 kubelet[2467]: I1002 19:15:53.990257 2467 kubelet.go:398] "Attempting to sync node with API server" Oct 2 19:15:53.990439 kubelet[2467]: I1002 19:15:53.990422 2467 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:15:53.990507 kubelet[2467]: I1002 19:15:53.990458 2467 kubelet.go:297] "Adding apiserver pod source" Oct 2 19:15:53.990507 kubelet[2467]: I1002 19:15:53.990478 2467 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:15:54.004104 kubelet[2467]: I1002 19:15:54.004087 2467 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:15:54.004670 kubelet[2467]: I1002 19:15:54.004654 2467 server.go:1186] "Started kubelet" Oct 2 19:15:54.005000 audit[2467]: AVC avc: denied { mac_admin } for pid=2467 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:54.005000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:15:54.005000 audit[2467]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005c24b0 a1=c000153ae8 a2=c0005c2480 a3=25 items=0 ppid=1 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:54.005000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:15:54.006984 kubelet[2467]: I1002 19:15:54.006970 2467 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:15:54.006000 audit[2467]: AVC avc: denied { mac_admin } for pid=2467 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:54.006000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:15:54.006000 audit[2467]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cdee40 a1=c000153b00 a2=c0005c2540 a3=25 items=0 ppid=1 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:54.006000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:15:54.007441 kubelet[2467]: I1002 19:15:54.007411 2467 apiserver.go:52] "Watching apiserver" Oct 2 19:15:54.007526 kubelet[2467]: I1002 19:15:54.007515 2467 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:15:54.007641 kubelet[2467]: I1002 19:15:54.007629 2467 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:15:54.009061 kubelet[2467]: E1002 19:15:54.009047 2467 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:15:54.009179 kubelet[2467]: E1002 19:15:54.009168 2467 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:15:54.012749 kubelet[2467]: I1002 19:15:54.012719 2467 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:15:54.014050 kubelet[2467]: I1002 19:15:54.014022 2467 server.go:451] "Adding debug handlers to kubelet server" Oct 2 19:15:54.017132 kubelet[2467]: I1002 19:15:54.016635 2467 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 19:15:54.017132 kubelet[2467]: I1002 19:15:54.016920 2467 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:15:54.078635 kubelet[2467]: I1002 19:15:54.078603 2467 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:15:54.095499 kubelet[2467]: I1002 19:15:54.095466 2467 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:15:54.095499 kubelet[2467]: I1002 19:15:54.095493 2467 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:15:54.095499 kubelet[2467]: I1002 19:15:54.095510 2467 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:15:54.095725 kubelet[2467]: I1002 19:15:54.095693 2467 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:15:54.095725 kubelet[2467]: I1002 19:15:54.095711 2467 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 19:15:54.095725 kubelet[2467]: I1002 19:15:54.095720 2467 policy_none.go:49] "None policy: Start" Oct 2 19:15:54.096533 kubelet[2467]: I1002 19:15:54.096510 2467 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:15:54.096533 kubelet[2467]: I1002 19:15:54.096536 2467 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:15:54.096710 kubelet[2467]: I1002 19:15:54.096692 2467 state_mem.go:75] "Updated machine memory state" Oct 2 19:15:54.101243 kubelet[2467]: I1002 19:15:54.101218 2467 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:15:54.100000 audit[2467]: AVC avc: denied { mac_admin } for pid=2467 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:15:54.100000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:15:54.100000 audit[2467]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0014a51d0 a1=c00150e3d8 a2=c0014a51a0 a3=25 items=0 ppid=1 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:15:54.100000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:15:54.101616 kubelet[2467]: I1002 19:15:54.101286 2467 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:15:54.101616 kubelet[2467]: I1002 19:15:54.101527 2467 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:15:54.122000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7170 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:15:54.122000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eda600 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:15:54.122000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:15:54.131818 kubelet[2467]: I1002 19:15:54.131544 2467 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:15:54.131818 kubelet[2467]: I1002 19:15:54.131566 2467 status_manager.go:176] "Starting to sync pod status with apiserver" Oct 2 19:15:54.131818 kubelet[2467]: I1002 19:15:54.131600 2467 kubelet.go:2113] "Starting kubelet main sync loop" Oct 2 19:15:54.131818 kubelet[2467]: E1002 19:15:54.131672 2467 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 19:15:54.132818 kubelet[2467]: I1002 19:15:54.132796 2467 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:54.147359 kubelet[2467]: I1002 19:15:54.147340 2467 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:54.147541 kubelet[2467]: I1002 19:15:54.147530 2467 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:54.231874 kubelet[2467]: I1002 19:15:54.231741 2467 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:15:54.234003 kubelet[2467]: I1002 19:15:54.233970 2467 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:15:54.234143 kubelet[2467]: I1002 19:15:54.234059 2467 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:15:54.243901 kubelet[2467]: E1002 19:15:54.243874 2467 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:54.317999 kubelet[2467]: I1002 19:15:54.317933 2467 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:15:54.319867 kubelet[2467]: I1002 19:15:54.319819 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9d26e32db3a020d8b883070061674906-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"9d26e32db3a020d8b883070061674906\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:54.320098 kubelet[2467]: I1002 19:15:54.320074 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0e9923d274f84de35f2a55d22e743214-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"0e9923d274f84de35f2a55d22e743214\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:54.320187 kubelet[2467]: I1002 19:15:54.320153 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:54.320321 kubelet[2467]: I1002 19:15:54.320301 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:54.320405 kubelet[2467]: I1002 19:15:54.320381 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:54.320497 kubelet[2467]: I1002 19:15:54.320474 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0e9923d274f84de35f2a55d22e743214-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"0e9923d274f84de35f2a55d22e743214\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:54.320595 kubelet[2467]: I1002 19:15:54.320580 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0e9923d274f84de35f2a55d22e743214-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"0e9923d274f84de35f2a55d22e743214\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:54.320743 kubelet[2467]: I1002 19:15:54.320685 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:54.320861 kubelet[2467]: I1002 19:15:54.320841 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f2db13905ed6eb6a2edcb5348452af6-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33\" (UID: \"4f2db13905ed6eb6a2edcb5348452af6\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:15:54.320934 kubelet[2467]: I1002 19:15:54.320887 2467 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:15:55.197956 kubelet[2467]: I1002 19:15:55.197916 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.0-a-e4b0ec5c33" podStartSLOduration=3.197849483 pod.CreationTimestamp="2023-10-02 19:15:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:15:54.80522814 +0000 UTC m=+0.920409981" watchObservedRunningTime="2023-10-02 19:15:55.197849483 +0000 UTC m=+1.313031224" Oct 2 19:15:55.603578 kubelet[2467]: I1002 19:15:55.603480 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.0-a-e4b0ec5c33" podStartSLOduration=1.603439609 pod.CreationTimestamp="2023-10-02 19:15:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:15:55.199384137 +0000 UTC m=+1.314565978" watchObservedRunningTime="2023-10-02 19:15:55.603439609 +0000 UTC m=+1.718621350" Oct 2 19:15:55.603856 kubelet[2467]: I1002 19:15:55.603834 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-e4b0ec5c33" podStartSLOduration=1.603796922 pod.CreationTimestamp="2023-10-02 19:15:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:15:55.602882389 +0000 UTC m=+1.718064130" watchObservedRunningTime="2023-10-02 19:15:55.603796922 +0000 UTC m=+1.718978663" Oct 2 19:16:01.519348 sudo[1671]: pam_unix(sudo:session): session closed for user root Oct 2 19:16:01.518000 audit[1671]: USER_END pid=1671 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:01.523988 kernel: kauditd_printk_skb: 281 callbacks suppressed Oct 2 19:16:01.524085 kernel: audit: type=1106 audit(1696274161.518:942): pid=1671 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:01.518000 audit[1671]: CRED_DISP pid=1671 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:01.553840 kernel: audit: type=1104 audit(1696274161.518:943): pid=1671 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:16:01.620069 sshd[1668]: pam_unix(sshd:session): session closed for user core Oct 2 19:16:01.620000 audit[1668]: USER_END pid=1668 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:16:01.623803 systemd[1]: sshd@6-10.200.8.37:22-10.200.12.6:36422.service: Deactivated successfully. Oct 2 19:16:01.624739 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:16:01.624925 systemd[1]: session-9.scope: Consumed 3.285s CPU time. Oct 2 19:16:01.626885 systemd-logind[1290]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:16:01.628173 systemd-logind[1290]: Removed session 9. Oct 2 19:16:01.621000 audit[1668]: CRED_DISP pid=1668 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:16:01.656559 kernel: audit: type=1106 audit(1696274161.620:944): pid=1668 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:16:01.656640 kernel: audit: type=1104 audit(1696274161.621:945): pid=1668 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:16:01.656663 kernel: audit: type=1131 audit(1696274161.623:946): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.37:22-10.200.12.6:36422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:01.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.37:22-10.200.12.6:36422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:16:06.502156 kubelet[2467]: I1002 19:16:06.502123 2467 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:16:06.502963 env[1311]: time="2023-10-02T19:16:06.502901677Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:16:06.503466 kubelet[2467]: I1002 19:16:06.503440 2467 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:16:07.248133 kubelet[2467]: I1002 19:16:07.248093 2467 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:16:07.255373 systemd[1]: Created slice kubepods-besteffort-pod6b32c327_783b_4d23_b98c_f638a336313e.slice. Oct 2 19:16:07.401824 kubelet[2467]: I1002 19:16:07.401777 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6b32c327-783b-4d23-b98c-f638a336313e-lib-modules\") pod \"kube-proxy-vxvdt\" (UID: \"6b32c327-783b-4d23-b98c-f638a336313e\") " pod="kube-system/kube-proxy-vxvdt" Oct 2 19:16:07.402038 kubelet[2467]: I1002 19:16:07.401832 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6b32c327-783b-4d23-b98c-f638a336313e-kube-proxy\") pod \"kube-proxy-vxvdt\" (UID: \"6b32c327-783b-4d23-b98c-f638a336313e\") " pod="kube-system/kube-proxy-vxvdt" Oct 2 19:16:07.402038 kubelet[2467]: I1002 19:16:07.401875 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6b32c327-783b-4d23-b98c-f638a336313e-xtables-lock\") pod \"kube-proxy-vxvdt\" (UID: \"6b32c327-783b-4d23-b98c-f638a336313e\") " pod="kube-system/kube-proxy-vxvdt" Oct 2 19:16:07.402038 kubelet[2467]: I1002 19:16:07.401900 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rf4h6\" (UniqueName: \"kubernetes.io/projected/6b32c327-783b-4d23-b98c-f638a336313e-kube-api-access-rf4h6\") pod \"kube-proxy-vxvdt\" (UID: \"6b32c327-783b-4d23-b98c-f638a336313e\") " pod="kube-system/kube-proxy-vxvdt" Oct 2 19:16:07.459092 kubelet[2467]: I1002 19:16:07.459045 2467 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:16:07.464831 systemd[1]: Created slice kubepods-besteffort-pod42aa5e79_06b0_4033_8d76_9173de3bf5ef.slice. Oct 2 19:16:07.567715 env[1311]: time="2023-10-02T19:16:07.567573892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vxvdt,Uid:6b32c327-783b-4d23-b98c-f638a336313e,Namespace:kube-system,Attempt:0,}" Oct 2 19:16:07.601186 env[1311]: time="2023-10-02T19:16:07.601118187Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:07.601186 env[1311]: time="2023-10-02T19:16:07.601155688Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:07.601415 env[1311]: time="2023-10-02T19:16:07.601381394Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:07.601717 env[1311]: time="2023-10-02T19:16:07.601647701Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d9b191ff2e0c30fc4482665ad069d951f8654b9340ebbe7e8659be02d21cace pid=2572 runtime=io.containerd.runc.v2 Oct 2 19:16:07.608620 kubelet[2467]: I1002 19:16:07.608467 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/42aa5e79-06b0-4033-8d76-9173de3bf5ef-var-lib-calico\") pod \"tigera-operator-54b47459dd-q86c9\" (UID: \"42aa5e79-06b0-4033-8d76-9173de3bf5ef\") " pod="tigera-operator/tigera-operator-54b47459dd-q86c9" Oct 2 19:16:07.608620 kubelet[2467]: I1002 19:16:07.608518 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6trtb\" (UniqueName: \"kubernetes.io/projected/42aa5e79-06b0-4033-8d76-9173de3bf5ef-kube-api-access-6trtb\") pod \"tigera-operator-54b47459dd-q86c9\" (UID: \"42aa5e79-06b0-4033-8d76-9173de3bf5ef\") " pod="tigera-operator/tigera-operator-54b47459dd-q86c9" Oct 2 19:16:07.624431 systemd[1]: run-containerd-runc-k8s.io-3d9b191ff2e0c30fc4482665ad069d951f8654b9340ebbe7e8659be02d21cace-runc.5oqI6N.mount: Deactivated successfully. Oct 2 19:16:07.626818 systemd[1]: Started cri-containerd-3d9b191ff2e0c30fc4482665ad069d951f8654b9340ebbe7e8659be02d21cace.scope. Oct 2 19:16:07.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.667623 kernel: audit: type=1400 audit(1696274167.639:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.667727 kernel: audit: type=1400 audit(1696274167.639:948): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.667758 kernel: audit: type=1400 audit(1696274167.639:949): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.694635 kernel: audit: type=1400 audit(1696274167.639:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.694712 kernel: audit: type=1400 audit(1696274167.639:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.722266 kernel: audit: type=1400 audit(1696274167.639:952): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.735763 kernel: audit: type=1400 audit(1696274167.639:953): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.736549 kernel: audit: type=1400 audit(1696274167.639:954): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.767967 kernel: audit: type=1400 audit(1696274167.639:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.768064 kernel: audit: type=1400 audit(1696274167.679:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.781695 env[1311]: time="2023-10-02T19:16:07.781654304Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-54b47459dd-q86c9,Uid:42aa5e79-06b0-4033-8d76-9173de3bf5ef,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:16:07.784289 env[1311]: time="2023-10-02T19:16:07.783471652Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vxvdt,Uid:6b32c327-783b-4d23-b98c-f638a336313e,Namespace:kube-system,Attempt:0,} returns sandbox id \"3d9b191ff2e0c30fc4482665ad069d951f8654b9340ebbe7e8659be02d21cace\"" Oct 2 19:16:07.679000 audit: BPF prog-id=107 op=LOAD Oct 2 19:16:07.680000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.680000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2572 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364396231393166663265306333306663343438323636356164303639 Oct 2 19:16:07.680000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.680000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2572 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364396231393166663265306333306663343438323636356164303639 Oct 2 19:16:07.680000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.680000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.786871 env[1311]: time="2023-10-02T19:16:07.786788241Z" level=info msg="CreateContainer within sandbox \"3d9b191ff2e0c30fc4482665ad069d951f8654b9340ebbe7e8659be02d21cace\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:16:07.680000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.680000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.680000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.680000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.680000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.680000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.680000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.680000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.680000 audit: BPF prog-id=108 op=LOAD Oct 2 19:16:07.680000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024370 items=0 ppid=2572 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364396231393166663265306333306663343438323636356164303639 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit: BPF prog-id=109 op=LOAD Oct 2 19:16:07.707000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0000243b8 items=0 ppid=2572 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364396231393166663265306333306663343438323636356164303639 Oct 2 19:16:07.707000 audit: BPF prog-id=109 op=UNLOAD Oct 2 19:16:07.707000 audit: BPF prog-id=108 op=UNLOAD Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.707000 audit: BPF prog-id=110 op=LOAD Oct 2 19:16:07.707000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0000247c8 items=0 ppid=2572 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364396231393166663265306333306663343438323636356164303639 Oct 2 19:16:07.830002 env[1311]: time="2023-10-02T19:16:07.828645157Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:07.830002 env[1311]: time="2023-10-02T19:16:07.828683458Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:07.830002 env[1311]: time="2023-10-02T19:16:07.828697559Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:07.830002 env[1311]: time="2023-10-02T19:16:07.828839563Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/47f7d670a8c840eae4ef74d5f911355a0a785190f677ac3d8dc3411c0f298b1a pid=2615 runtime=io.containerd.runc.v2 Oct 2 19:16:07.836918 env[1311]: time="2023-10-02T19:16:07.836870177Z" level=info msg="CreateContainer within sandbox \"3d9b191ff2e0c30fc4482665ad069d951f8654b9340ebbe7e8659be02d21cace\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"bd7e3bdd9aba0fea9ddb30898bd706bc9eccc2a1fc1d64939cdb68fdf00d0899\"" Oct 2 19:16:07.839050 env[1311]: time="2023-10-02T19:16:07.839015834Z" level=info msg="StartContainer for \"bd7e3bdd9aba0fea9ddb30898bd706bc9eccc2a1fc1d64939cdb68fdf00d0899\"" Oct 2 19:16:07.852558 systemd[1]: Started cri-containerd-47f7d670a8c840eae4ef74d5f911355a0a785190f677ac3d8dc3411c0f298b1a.scope. Oct 2 19:16:07.877405 systemd[1]: Started cri-containerd-bd7e3bdd9aba0fea9ddb30898bd706bc9eccc2a1fc1d64939cdb68fdf00d0899.scope. Oct 2 19:16:07.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.880000 audit: BPF prog-id=111 op=LOAD Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2615 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663764363730613863383430656165346566373464356639313133 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2615 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663764363730613863383430656165346566373464356639313133 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit: BPF prog-id=112 op=LOAD Oct 2 19:16:07.882000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002fd460 items=0 ppid=2615 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663764363730613863383430656165346566373464356639313133 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit: BPF prog-id=113 op=LOAD Oct 2 19:16:07.882000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002fd4a8 items=0 ppid=2615 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663764363730613863383430656165346566373464356639313133 Oct 2 19:16:07.882000 audit: BPF prog-id=113 op=UNLOAD Oct 2 19:16:07.882000 audit: BPF prog-id=112 op=UNLOAD Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.882000 audit: BPF prog-id=114 op=LOAD Oct 2 19:16:07.882000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002fd8b8 items=0 ppid=2615 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437663764363730613863383430656165346566373464356639313133 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2572 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376533626464396162613066656139646462333038393862643730 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit: BPF prog-id=115 op=LOAD Oct 2 19:16:07.909000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a0940 items=0 ppid=2572 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376533626464396162613066656139646462333038393862643730 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.909000 audit: BPF prog-id=116 op=LOAD Oct 2 19:16:07.909000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a0988 items=0 ppid=2572 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376533626464396162613066656139646462333038393862643730 Oct 2 19:16:07.910000 audit: BPF prog-id=116 op=UNLOAD Oct 2 19:16:07.910000 audit: BPF prog-id=115 op=UNLOAD Oct 2 19:16:07.910000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.910000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.910000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.910000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.910000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.910000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.910000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.910000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.910000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.910000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:07.910000 audit: BPF prog-id=117 op=LOAD Oct 2 19:16:07.910000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a0a18 items=0 ppid=2572 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264376533626464396162613066656139646462333038393862643730 Oct 2 19:16:07.926051 env[1311]: time="2023-10-02T19:16:07.926000455Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-54b47459dd-q86c9,Uid:42aa5e79-06b0-4033-8d76-9173de3bf5ef,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"47f7d670a8c840eae4ef74d5f911355a0a785190f677ac3d8dc3411c0f298b1a\"" Oct 2 19:16:07.930024 env[1311]: time="2023-10-02T19:16:07.929984661Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:16:07.949419 env[1311]: time="2023-10-02T19:16:07.949388679Z" level=info msg="StartContainer for \"bd7e3bdd9aba0fea9ddb30898bd706bc9eccc2a1fc1d64939cdb68fdf00d0899\" returns successfully" Oct 2 19:16:07.989000 audit[2702]: NETFILTER_CFG table=mangle:63 family=2 entries=1 op=nft_register_chain pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:07.989000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc13ef7e70 a2=0 a3=7ffc13ef7e5c items=0 ppid=2658 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:16:07.999000 audit[2704]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:07.999000 audit[2704]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4c690bb0 a2=0 a3=7fff4c690b9c items=0 ppid=2658 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:07.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:16:08.000000 audit[2703]: NETFILTER_CFG table=mangle:65 family=10 entries=1 op=nft_register_chain pid=2703 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.000000 audit[2703]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7f6cacf0 a2=0 a3=7ffc7f6cacdc items=0 ppid=2658 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.000000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:16:08.002000 audit[2706]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_chain pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.002000 audit[2706]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd98a17b20 a2=0 a3=7ffd98a17b0c items=0 ppid=2658 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:16:08.002000 audit[2707]: NETFILTER_CFG table=nat:67 family=10 entries=1 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.002000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddc98ec60 a2=0 a3=7ffddc98ec4c items=0 ppid=2658 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:16:08.003000 audit[2708]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.003000 audit[2708]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd13d71c40 a2=0 a3=7ffd13d71c2c items=0 ppid=2658 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.003000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:16:08.093000 audit[2709]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_chain pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.093000 audit[2709]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffef73ffbb0 a2=0 a3=7ffef73ffb9c items=0 ppid=2658 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:16:08.098000 audit[2711]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_rule pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.098000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd3068f850 a2=0 a3=7ffd3068f83c items=0 ppid=2658 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:16:08.102000 audit[2714]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.102000 audit[2714]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc9aee77d0 a2=0 a3=7ffc9aee77bc items=0 ppid=2658 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:16:08.103000 audit[2715]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_chain pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.103000 audit[2715]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffaf832480 a2=0 a3=7fffaf83246c items=0 ppid=2658 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:16:08.106000 audit[2717]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_rule pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.106000 audit[2717]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc7990ef0 a2=0 a3=7ffcc7990edc items=0 ppid=2658 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:16:08.107000 audit[2718]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_chain pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.107000 audit[2718]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe19f7ad30 a2=0 a3=7ffe19f7ad1c items=0 ppid=2658 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:16:08.109000 audit[2720]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_rule pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.109000 audit[2720]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe38aeb310 a2=0 a3=7ffe38aeb2fc items=0 ppid=2658 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:16:08.113000 audit[2723]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.113000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe416cda60 a2=0 a3=7ffe416cda4c items=0 ppid=2658 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:16:08.114000 audit[2724]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_chain pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.114000 audit[2724]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7d688ec0 a2=0 a3=7ffc7d688eac items=0 ppid=2658 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:16:08.117000 audit[2726]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.117000 audit[2726]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd60074590 a2=0 a3=7ffd6007457c items=0 ppid=2658 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:16:08.118000 audit[2727]: NETFILTER_CFG table=filter:79 family=2 entries=1 op=nft_register_chain pid=2727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.118000 audit[2727]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe243e54c0 a2=0 a3=7ffe243e54ac items=0 ppid=2658 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.118000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:16:08.121000 audit[2729]: NETFILTER_CFG table=filter:80 family=2 entries=1 op=nft_register_rule pid=2729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.121000 audit[2729]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7db471f0 a2=0 a3=7ffe7db471dc items=0 ppid=2658 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:16:08.125000 audit[2732]: NETFILTER_CFG table=filter:81 family=2 entries=1 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.125000 audit[2732]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe354be470 a2=0 a3=7ffe354be45c items=0 ppid=2658 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:16:08.128000 audit[2735]: NETFILTER_CFG table=filter:82 family=2 entries=1 op=nft_register_rule pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.128000 audit[2735]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa24f2660 a2=0 a3=7fffa24f264c items=0 ppid=2658 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:16:08.129000 audit[2736]: NETFILTER_CFG table=nat:83 family=2 entries=1 op=nft_register_chain pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.129000 audit[2736]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc7675ecd0 a2=0 a3=7ffc7675ecbc items=0 ppid=2658 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:16:08.134000 audit[2738]: NETFILTER_CFG table=nat:84 family=2 entries=1 op=nft_register_rule pid=2738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.134000 audit[2738]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd611e3a90 a2=0 a3=7ffd611e3a7c items=0 ppid=2658 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:16:08.137000 audit[2741]: NETFILTER_CFG table=nat:85 family=2 entries=1 op=nft_register_rule pid=2741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:16:08.137000 audit[2741]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcbd5d9110 a2=0 a3=7ffcbd5d90fc items=0 ppid=2658 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:16:08.170203 kubelet[2467]: I1002 19:16:08.170156 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-vxvdt" podStartSLOduration=1.170112667 pod.CreationTimestamp="2023-10-02 19:16:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:08.169768058 +0000 UTC m=+14.284949799" watchObservedRunningTime="2023-10-02 19:16:08.170112667 +0000 UTC m=+14.285294408" Oct 2 19:16:08.258000 audit[2745]: NETFILTER_CFG table=filter:86 family=2 entries=6 op=nft_register_rule pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:08.258000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffd3fed2530 a2=0 a3=7ffd3fed251c items=0 ppid=2658 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.258000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:08.314000 audit[2745]: NETFILTER_CFG table=nat:87 family=2 entries=17 op=nft_register_chain pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:08.314000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd3fed2530 a2=0 a3=7ffd3fed251c items=0 ppid=2658 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.314000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:08.315000 audit[2749]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_chain pid=2749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.315000 audit[2749]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff458fb7e0 a2=0 a3=7fff458fb7cc items=0 ppid=2658 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:16:08.318000 audit[2751]: NETFILTER_CFG table=filter:89 family=10 entries=2 op=nft_register_chain pid=2751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.318000 audit[2751]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffbc864010 a2=0 a3=7fffbc863ffc items=0 ppid=2658 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:16:08.322000 audit[2754]: NETFILTER_CFG table=filter:90 family=10 entries=2 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.322000 audit[2754]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd3608fe10 a2=0 a3=7ffd3608fdfc items=0 ppid=2658 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:16:08.323000 audit[2755]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_chain pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.323000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff289a5010 a2=0 a3=7fff289a4ffc items=0 ppid=2658 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:16:08.325000 audit[2757]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_rule pid=2757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.325000 audit[2757]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd5ff2ff70 a2=0 a3=7ffd5ff2ff5c items=0 ppid=2658 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:16:08.327000 audit[2758]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_chain pid=2758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.327000 audit[2758]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd26f082d0 a2=0 a3=7ffd26f082bc items=0 ppid=2658 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:16:08.329000 audit[2760]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.329000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe16009940 a2=0 a3=7ffe1600992c items=0 ppid=2658 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:16:08.333000 audit[2763]: NETFILTER_CFG table=filter:95 family=10 entries=2 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.333000 audit[2763]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffd502aae0 a2=0 a3=7fffd502aacc items=0 ppid=2658 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:16:08.334000 audit[2764]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_chain pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.334000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda6be3640 a2=0 a3=7ffda6be362c items=0 ppid=2658 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:16:08.336000 audit[2766]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=2766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.336000 audit[2766]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff0bd22920 a2=0 a3=7fff0bd2290c items=0 ppid=2658 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:16:08.337000 audit[2767]: NETFILTER_CFG table=filter:98 family=10 entries=1 op=nft_register_chain pid=2767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.337000 audit[2767]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9de03500 a2=0 a3=7ffd9de034ec items=0 ppid=2658 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.337000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:16:08.340000 audit[2769]: NETFILTER_CFG table=filter:99 family=10 entries=1 op=nft_register_rule pid=2769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.340000 audit[2769]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc82182740 a2=0 a3=7ffc8218272c items=0 ppid=2658 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.340000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:16:08.344000 audit[2772]: NETFILTER_CFG table=filter:100 family=10 entries=1 op=nft_register_rule pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.344000 audit[2772]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffcac7f670 a2=0 a3=7fffcac7f65c items=0 ppid=2658 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:16:08.349000 audit[2775]: NETFILTER_CFG table=filter:101 family=10 entries=1 op=nft_register_rule pid=2775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.349000 audit[2775]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1be31490 a2=0 a3=7fff1be3147c items=0 ppid=2658 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:16:08.350000 audit[2776]: NETFILTER_CFG table=nat:102 family=10 entries=1 op=nft_register_chain pid=2776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.350000 audit[2776]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff42f81330 a2=0 a3=7fff42f8131c items=0 ppid=2658 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:16:08.353000 audit[2778]: NETFILTER_CFG table=nat:103 family=10 entries=2 op=nft_register_chain pid=2778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.353000 audit[2778]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd5344eb20 a2=0 a3=7ffd5344eb0c items=0 ppid=2658 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:16:08.358000 audit[2781]: NETFILTER_CFG table=nat:104 family=10 entries=2 op=nft_register_chain pid=2781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:16:08.358000 audit[2781]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcb737d060 a2=0 a3=7ffcb737d04c items=0 ppid=2658 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:16:08.363000 audit[2785]: NETFILTER_CFG table=filter:105 family=10 entries=3 op=nft_register_rule pid=2785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:16:08.363000 audit[2785]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffed13831c0 a2=0 a3=7ffed13831ac items=0 ppid=2658 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.363000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:08.363000 audit[2785]: NETFILTER_CFG table=nat:106 family=10 entries=10 op=nft_register_chain pid=2785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:16:08.363000 audit[2785]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffed13831c0 a2=0 a3=7ffed13831ac items=0 ppid=2658 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:08.363000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:09.308966 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1838315639.mount: Deactivated successfully. Oct 2 19:16:10.576662 env[1311]: time="2023-10-02T19:16:10.576607197Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:10.584205 env[1311]: time="2023-10-02T19:16:10.584147485Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:10.588271 env[1311]: time="2023-10-02T19:16:10.588230587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:10.593034 env[1311]: time="2023-10-02T19:16:10.592997806Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:10.593748 env[1311]: time="2023-10-02T19:16:10.593709923Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:16:10.597407 env[1311]: time="2023-10-02T19:16:10.597360714Z" level=info msg="CreateContainer within sandbox \"47f7d670a8c840eae4ef74d5f911355a0a785190f677ac3d8dc3411c0f298b1a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:16:10.626907 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4042724631.mount: Deactivated successfully. Oct 2 19:16:10.633810 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1783706915.mount: Deactivated successfully. Oct 2 19:16:10.649617 env[1311]: time="2023-10-02T19:16:10.649563816Z" level=info msg="CreateContainer within sandbox \"47f7d670a8c840eae4ef74d5f911355a0a785190f677ac3d8dc3411c0f298b1a\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d\"" Oct 2 19:16:10.651922 env[1311]: time="2023-10-02T19:16:10.650311535Z" level=info msg="StartContainer for \"aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d\"" Oct 2 19:16:10.670822 systemd[1]: Started cri-containerd-aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d.scope. Oct 2 19:16:10.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.684000 audit: BPF prog-id=118 op=LOAD Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2615 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:10.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161616662373632656164633931396134356235393339396262373535 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2615 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:10.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161616662373632656164633931396134356235393339396262373535 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit: BPF prog-id=119 op=LOAD Oct 2 19:16:10.685000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c4b90 items=0 ppid=2615 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:10.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161616662373632656164633931396134356235393339396262373535 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit: BPF prog-id=120 op=LOAD Oct 2 19:16:10.685000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c4bd8 items=0 ppid=2615 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:10.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161616662373632656164633931396134356235393339396262373535 Oct 2 19:16:10.685000 audit: BPF prog-id=120 op=UNLOAD Oct 2 19:16:10.685000 audit: BPF prog-id=119 op=UNLOAD Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:10.685000 audit: BPF prog-id=121 op=LOAD Oct 2 19:16:10.685000 audit[2793]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c4fe8 items=0 ppid=2615 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:10.685000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161616662373632656164633931396134356235393339396262373535 Oct 2 19:16:10.708982 env[1311]: time="2023-10-02T19:16:10.706500636Z" level=info msg="StartContainer for \"aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d\" returns successfully" Oct 2 19:16:12.682000 audit[2848]: NETFILTER_CFG table=filter:107 family=2 entries=13 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:12.687971 kernel: kauditd_printk_skb: 336 callbacks suppressed Oct 2 19:16:12.688073 kernel: audit: type=1325 audit(1696274172.682:1051): table=filter:107 family=2 entries=13 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:12.682000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe097db640 a2=0 a3=7ffe097db62c items=0 ppid=2658 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:12.722853 kernel: audit: type=1300 audit(1696274172.682:1051): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe097db640 a2=0 a3=7ffe097db62c items=0 ppid=2658 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:12.723019 kernel: audit: type=1327 audit(1696274172.682:1051): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:12.682000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:12.682000 audit[2848]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:12.745836 kernel: audit: type=1325 audit(1696274172.682:1052): table=nat:108 family=2 entries=20 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:12.682000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe097db640 a2=0 a3=7ffe097db62c items=0 ppid=2658 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:12.682000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:12.776836 kernel: audit: type=1300 audit(1696274172.682:1052): arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe097db640 a2=0 a3=7ffe097db62c items=0 ppid=2658 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:12.776936 kernel: audit: type=1327 audit(1696274172.682:1052): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:12.776978 kernel: audit: type=1325 audit(1696274172.740:1053): table=filter:109 family=2 entries=14 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:12.740000 audit[2874]: NETFILTER_CFG table=filter:109 family=2 entries=14 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:12.740000 audit[2874]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe348e1420 a2=0 a3=7ffe348e140c items=0 ppid=2658 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:12.806202 kernel: audit: type=1300 audit(1696274172.740:1053): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe348e1420 a2=0 a3=7ffe348e140c items=0 ppid=2658 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:12.806293 kernel: audit: type=1327 audit(1696274172.740:1053): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:12.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:12.759000 audit[2874]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:12.759000 audit[2874]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe348e1420 a2=0 a3=7ffe348e140c items=0 ppid=2658 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:12.759000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:12.828965 kernel: audit: type=1325 audit(1696274172.759:1054): table=nat:110 family=2 entries=20 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:12.870526 kubelet[2467]: I1002 19:16:12.870482 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-54b47459dd-q86c9" podStartSLOduration=-9.223372030984352e+09 pod.CreationTimestamp="2023-10-02 19:16:07 +0000 UTC" firstStartedPulling="2023-10-02 19:16:07.92957425 +0000 UTC m=+14.044755991" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:11.175204231 +0000 UTC m=+17.290385972" watchObservedRunningTime="2023-10-02 19:16:12.870423428 +0000 UTC m=+18.985605169" Oct 2 19:16:12.871041 kubelet[2467]: I1002 19:16:12.870733 2467 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:16:12.876560 systemd[1]: Created slice kubepods-besteffort-pod688b660c_59dc_4b13_a0e0_1700293ef24f.slice. Oct 2 19:16:12.959343 kubelet[2467]: I1002 19:16:12.959213 2467 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:16:12.962574 kubelet[2467]: I1002 19:16:12.962551 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/688b660c-59dc-4b13-a0e0-1700293ef24f-tigera-ca-bundle\") pod \"calico-typha-5947df9844-mzrgg\" (UID: \"688b660c-59dc-4b13-a0e0-1700293ef24f\") " pod="calico-system/calico-typha-5947df9844-mzrgg" Oct 2 19:16:12.962763 kubelet[2467]: I1002 19:16:12.962750 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/688b660c-59dc-4b13-a0e0-1700293ef24f-typha-certs\") pod \"calico-typha-5947df9844-mzrgg\" (UID: \"688b660c-59dc-4b13-a0e0-1700293ef24f\") " pod="calico-system/calico-typha-5947df9844-mzrgg" Oct 2 19:16:12.962910 kubelet[2467]: I1002 19:16:12.962899 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ckc8g\" (UniqueName: \"kubernetes.io/projected/688b660c-59dc-4b13-a0e0-1700293ef24f-kube-api-access-ckc8g\") pod \"calico-typha-5947df9844-mzrgg\" (UID: \"688b660c-59dc-4b13-a0e0-1700293ef24f\") " pod="calico-system/calico-typha-5947df9844-mzrgg" Oct 2 19:16:12.967755 systemd[1]: Created slice kubepods-besteffort-podd2341403_c352_4000_92fb_682620162c02.slice. Oct 2 19:16:13.063612 kubelet[2467]: I1002 19:16:13.063571 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-policysync\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d" Oct 2 19:16:13.063893 kubelet[2467]: I1002 19:16:13.063880 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-lib-modules\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d" Oct 2 19:16:13.064066 kubelet[2467]: I1002 19:16:13.064053 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d2341403-c352-4000-92fb-682620162c02-tigera-ca-bundle\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d" Oct 2 19:16:13.064188 kubelet[2467]: I1002 19:16:13.064178 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-cni-net-dir\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d" Oct 2 19:16:13.064296 kubelet[2467]: I1002 19:16:13.064287 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-var-run-calico\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d" Oct 2 19:16:13.064410 kubelet[2467]: I1002 19:16:13.064401 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-flexvol-driver-host\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d" Oct 2 19:16:13.064510 kubelet[2467]: I1002 19:16:13.064500 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-97qq8\" (UniqueName: \"kubernetes.io/projected/d2341403-c352-4000-92fb-682620162c02-kube-api-access-97qq8\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d" Oct 2 19:16:13.064654 kubelet[2467]: I1002 19:16:13.064640 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d2341403-c352-4000-92fb-682620162c02-node-certs\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d" Oct 2 19:16:13.064787 kubelet[2467]: I1002 19:16:13.064774 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-var-lib-calico\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d" Oct 2 19:16:13.064911 kubelet[2467]: I1002 19:16:13.064900 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-cni-log-dir\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d" Oct 2 19:16:13.065057 kubelet[2467]: I1002 19:16:13.065044 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-xtables-lock\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d" Oct 2 19:16:13.065181 kubelet[2467]: I1002 19:16:13.065169 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d2341403-c352-4000-92fb-682620162c02-cni-bin-dir\") pod \"calico-node-hl64d\" (UID: \"d2341403-c352-4000-92fb-682620162c02\") " pod="calico-system/calico-node-hl64d" Oct 2 19:16:13.167888 kubelet[2467]: E1002 19:16:13.167857 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.167888 kubelet[2467]: W1002 19:16:13.167881 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.168147 kubelet[2467]: E1002 19:16:13.167908 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.168147 kubelet[2467]: E1002 19:16:13.168116 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.168147 kubelet[2467]: W1002 19:16:13.168126 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.168147 kubelet[2467]: E1002 19:16:13.168142 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.168344 kubelet[2467]: E1002 19:16:13.168297 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.168344 kubelet[2467]: W1002 19:16:13.168305 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.168344 kubelet[2467]: E1002 19:16:13.168320 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.168526 kubelet[2467]: E1002 19:16:13.168511 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.168526 kubelet[2467]: W1002 19:16:13.168527 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.168643 kubelet[2467]: E1002 19:16:13.168541 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.168731 kubelet[2467]: E1002 19:16:13.168715 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.168790 kubelet[2467]: W1002 19:16:13.168731 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.168790 kubelet[2467]: E1002 19:16:13.168746 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.168960 kubelet[2467]: E1002 19:16:13.168931 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.168960 kubelet[2467]: W1002 19:16:13.168958 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.169082 kubelet[2467]: E1002 19:16:13.168973 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.169169 kubelet[2467]: E1002 19:16:13.169153 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.169169 kubelet[2467]: W1002 19:16:13.169168 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.169275 kubelet[2467]: E1002 19:16:13.169183 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.169396 kubelet[2467]: E1002 19:16:13.169380 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.169451 kubelet[2467]: W1002 19:16:13.169396 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.169451 kubelet[2467]: E1002 19:16:13.169411 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.169689 kubelet[2467]: E1002 19:16:13.169671 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.169689 kubelet[2467]: W1002 19:16:13.169688 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.169810 kubelet[2467]: E1002 19:16:13.169704 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.169881 kubelet[2467]: E1002 19:16:13.169865 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.169928 kubelet[2467]: W1002 19:16:13.169882 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.169928 kubelet[2467]: E1002 19:16:13.169896 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.170082 kubelet[2467]: E1002 19:16:13.170068 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.170137 kubelet[2467]: W1002 19:16:13.170083 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.170137 kubelet[2467]: E1002 19:16:13.170097 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.170319 kubelet[2467]: E1002 19:16:13.170301 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.170319 kubelet[2467]: W1002 19:16:13.170317 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.170440 kubelet[2467]: E1002 19:16:13.170332 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.170513 kubelet[2467]: E1002 19:16:13.170499 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.170572 kubelet[2467]: W1002 19:16:13.170514 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.170572 kubelet[2467]: E1002 19:16:13.170528 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.170696 kubelet[2467]: E1002 19:16:13.170682 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.170744 kubelet[2467]: W1002 19:16:13.170698 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.170744 kubelet[2467]: E1002 19:16:13.170712 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.170885 kubelet[2467]: E1002 19:16:13.170870 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.172971 kubelet[2467]: W1002 19:16:13.170885 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.172971 kubelet[2467]: E1002 19:16:13.170899 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.180155 kubelet[2467]: E1002 19:16:13.179118 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.180155 kubelet[2467]: W1002 19:16:13.179133 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.180155 kubelet[2467]: E1002 19:16:13.179160 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.184071 env[1311]: time="2023-10-02T19:16:13.183299902Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5947df9844-mzrgg,Uid:688b660c-59dc-4b13-a0e0-1700293ef24f,Namespace:calico-system,Attempt:0,}" Oct 2 19:16:13.185214 kubelet[2467]: E1002 19:16:13.185200 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.185305 kubelet[2467]: W1002 19:16:13.185295 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.185380 kubelet[2467]: E1002 19:16:13.185373 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.198688 kubelet[2467]: E1002 19:16:13.198673 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:13.198811 kubelet[2467]: W1002 19:16:13.198799 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:13.198884 kubelet[2467]: E1002 19:16:13.198876 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:13.237451 env[1311]: time="2023-10-02T19:16:13.237286863Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:13.237451 env[1311]: time="2023-10-02T19:16:13.237385565Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:13.237451 env[1311]: time="2023-10-02T19:16:13.237412766Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:13.240808 env[1311]: time="2023-10-02T19:16:13.238179484Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a188a8da18f56ea608fcba9093578adbeec141ddbe6c5b4731cf28255e116fa1 pid=2903 runtime=io.containerd.runc.v2 Oct 2 19:16:13.252175 systemd[1]: Started cri-containerd-a188a8da18f56ea608fcba9093578adbeec141ddbe6c5b4731cf28255e116fa1.scope. Oct 2 19:16:13.274033 env[1311]: time="2023-10-02T19:16:13.273988120Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hl64d,Uid:d2341403-c352-4000-92fb-682620162c02,Namespace:calico-system,Attempt:0,}" Oct 2 19:16:13.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.274000 audit: BPF prog-id=122 op=LOAD Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2903 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131383861386461313866353665613630386663626139303933353738 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=2903 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131383861386461313866353665613630386663626139303933353738 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit: BPF prog-id=123 op=LOAD Oct 2 19:16:13.276000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0003aabb0 items=0 ppid=2903 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131383861386461313866353665613630386663626139303933353738 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit: BPF prog-id=124 op=LOAD Oct 2 19:16:13.276000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0003aabf8 items=0 ppid=2903 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131383861386461313866353665613630386663626139303933353738 Oct 2 19:16:13.276000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:16:13.276000 audit: BPF prog-id=123 op=UNLOAD Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.276000 audit: BPF prog-id=125 op=LOAD Oct 2 19:16:13.276000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003ab008 items=0 ppid=2903 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131383861386461313866353665613630386663626139303933353738 Oct 2 19:16:13.323147 env[1311]: time="2023-10-02T19:16:13.323079867Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:13.323370 env[1311]: time="2023-10-02T19:16:13.323336773Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:13.323521 env[1311]: time="2023-10-02T19:16:13.323494477Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:13.323769 env[1311]: time="2023-10-02T19:16:13.323731482Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584 pid=2937 runtime=io.containerd.runc.v2 Oct 2 19:16:13.342632 systemd[1]: Started cri-containerd-3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584.scope. Oct 2 19:16:13.346984 env[1311]: time="2023-10-02T19:16:13.346924424Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5947df9844-mzrgg,Uid:688b660c-59dc-4b13-a0e0-1700293ef24f,Namespace:calico-system,Attempt:0,} returns sandbox id \"a188a8da18f56ea608fcba9093578adbeec141ddbe6c5b4731cf28255e116fa1\"" Oct 2 19:16:13.348898 env[1311]: time="2023-10-02T19:16:13.348847069Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 19:16:13.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.367000 audit: BPF prog-id=126 op=LOAD Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2937 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339383166306431626334386636336234396564363835363630346137 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2937 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339383166306431626334386636336234396564363835363630346137 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit: BPF prog-id=127 op=LOAD Oct 2 19:16:13.368000 audit[2952]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024990 items=0 ppid=2937 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339383166306431626334386636336234396564363835363630346137 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit: BPF prog-id=128 op=LOAD Oct 2 19:16:13.368000 audit[2952]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000249d8 items=0 ppid=2937 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339383166306431626334386636336234396564363835363630346137 Oct 2 19:16:13.368000 audit: BPF prog-id=128 op=UNLOAD Oct 2 19:16:13.368000 audit: BPF prog-id=127 op=UNLOAD Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { perfmon } for pid=2952 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit[2952]: AVC avc: denied { bpf } for pid=2952 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:13.368000 audit: BPF prog-id=129 op=LOAD Oct 2 19:16:13.368000 audit[2952]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024de8 items=0 ppid=2937 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339383166306431626334386636336234396564363835363630346137 Oct 2 19:16:13.386729 env[1311]: time="2023-10-02T19:16:13.386681553Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hl64d,Uid:d2341403-c352-4000-92fb-682620162c02,Namespace:calico-system,Attempt:0,} returns sandbox id \"3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584\"" Oct 2 19:16:13.851000 audit[2999]: NETFILTER_CFG table=filter:111 family=2 entries=14 op=nft_register_rule pid=2999 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:13.851000 audit[2999]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffe7bc35560 a2=0 a3=7ffe7bc3554c items=0 ppid=2658 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.851000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:13.852000 audit[2999]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=2999 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:13.852000 audit[2999]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe7bc35560 a2=0 a3=7ffe7bc3554c items=0 ppid=2658 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:13.852000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:15.568216 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3466921642.mount: Deactivated successfully. Oct 2 19:16:18.261624 env[1311]: time="2023-10-02T19:16:18.261570309Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:18.269109 env[1311]: time="2023-10-02T19:16:18.269072267Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:18.274199 env[1311]: time="2023-10-02T19:16:18.274168974Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:18.278492 env[1311]: time="2023-10-02T19:16:18.278456965Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:18.279284 env[1311]: time="2023-10-02T19:16:18.279246781Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\"" Oct 2 19:16:18.280848 env[1311]: time="2023-10-02T19:16:18.280817114Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:16:18.281984 env[1311]: time="2023-10-02T19:16:18.281951538Z" level=info msg="CreateContainer within sandbox \"a188a8da18f56ea608fcba9093578adbeec141ddbe6c5b4731cf28255e116fa1\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 19:16:18.313074 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1079914586.mount: Deactivated successfully. Oct 2 19:16:18.330910 env[1311]: time="2023-10-02T19:16:18.330870067Z" level=info msg="CreateContainer within sandbox \"a188a8da18f56ea608fcba9093578adbeec141ddbe6c5b4731cf28255e116fa1\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"5d0584a077559ae32c718381626350a104f7aad67c6e95c5b0e4c249b9ad02d0\"" Oct 2 19:16:18.331527 env[1311]: time="2023-10-02T19:16:18.331489480Z" level=info msg="StartContainer for \"5d0584a077559ae32c718381626350a104f7aad67c6e95c5b0e4c249b9ad02d0\"" Oct 2 19:16:18.353412 systemd[1]: Started cri-containerd-5d0584a077559ae32c718381626350a104f7aad67c6e95c5b0e4c249b9ad02d0.scope. Oct 2 19:16:18.384995 kernel: kauditd_printk_skb: 122 callbacks suppressed Oct 2 19:16:18.385109 kernel: audit: type=1400 audit(1696274178.366:1093): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.413886 kernel: audit: type=1400 audit(1696274178.366:1094): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.413990 kernel: audit: type=1400 audit(1696274178.366:1095): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.427438 kernel: audit: type=1400 audit(1696274178.366:1096): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.427495 kernel: audit: type=1400 audit(1696274178.366:1097): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.453678 kernel: audit: type=1400 audit(1696274178.366:1098): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.482710 kernel: audit: type=1400 audit(1696274178.366:1099): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.482784 kernel: audit: type=1400 audit(1696274178.366:1100): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.482825 kernel: audit: type=1400 audit(1696274178.366:1101): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.483079 env[1311]: time="2023-10-02T19:16:18.483046267Z" level=info msg="StartContainer for \"5d0584a077559ae32c718381626350a104f7aad67c6e95c5b0e4c249b9ad02d0\" returns successfully" Oct 2 19:16:18.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.513631 kernel: audit: type=1400 audit(1696274178.384:1102): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit: BPF prog-id=130 op=LOAD Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2903 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303538346130373735353961653332633731383338313632363335 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2903 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303538346130373735353961653332633731383338313632363335 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit: BPF prog-id=131 op=LOAD Oct 2 19:16:18.384000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000300f00 items=0 ppid=2903 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303538346130373735353961653332633731383338313632363335 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit: BPF prog-id=132 op=LOAD Oct 2 19:16:18.384000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000300f48 items=0 ppid=2903 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303538346130373735353961653332633731383338313632363335 Oct 2 19:16:18.384000 audit: BPF prog-id=132 op=UNLOAD Oct 2 19:16:18.384000 audit: BPF prog-id=131 op=UNLOAD Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { perfmon } for pid=3008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit[3008]: AVC avc: denied { bpf } for pid=3008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:18.384000 audit: BPF prog-id=133 op=LOAD Oct 2 19:16:18.384000 audit[3008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000301358 items=0 ppid=2903 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:18.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303538346130373735353961653332633731383338313632363335 Oct 2 19:16:19.205888 kubelet[2467]: I1002 19:16:19.205853 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5947df9844-mzrgg" podStartSLOduration=-9.22337202964896e+09 pod.CreationTimestamp="2023-10-02 19:16:12 +0000 UTC" firstStartedPulling="2023-10-02 19:16:13.348243255 +0000 UTC m=+19.463425096" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:19.204659059 +0000 UTC m=+25.319840900" watchObservedRunningTime="2023-10-02 19:16:19.205815582 +0000 UTC m=+25.320997423" Oct 2 19:16:19.262000 audit[3065]: NETFILTER_CFG table=filter:113 family=2 entries=13 op=nft_register_rule pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:19.262000 audit[3065]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffd1bf2a7c0 a2=0 a3=7ffd1bf2a7ac items=0 ppid=2658 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.262000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:19.263000 audit[3065]: NETFILTER_CFG table=nat:114 family=2 entries=27 op=nft_register_chain pid=3065 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:19.263000 audit[3065]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffd1bf2a7c0 a2=0 a3=7ffd1bf2a7ac items=0 ppid=2658 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:19.263000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:19.296332 kubelet[2467]: E1002 19:16:19.296274 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.296332 kubelet[2467]: W1002 19:16:19.296328 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.296639 kubelet[2467]: E1002 19:16:19.296383 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.296696 kubelet[2467]: E1002 19:16:19.296639 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.296696 kubelet[2467]: W1002 19:16:19.296649 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.296696 kubelet[2467]: E1002 19:16:19.296664 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.296835 kubelet[2467]: E1002 19:16:19.296829 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.296883 kubelet[2467]: W1002 19:16:19.296838 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.296883 kubelet[2467]: E1002 19:16:19.296852 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.297112 kubelet[2467]: E1002 19:16:19.297094 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.297112 kubelet[2467]: W1002 19:16:19.297112 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.297246 kubelet[2467]: E1002 19:16:19.297129 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.297314 kubelet[2467]: E1002 19:16:19.297300 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.297370 kubelet[2467]: W1002 19:16:19.297315 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.297370 kubelet[2467]: E1002 19:16:19.297329 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.297504 kubelet[2467]: E1002 19:16:19.297490 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.297552 kubelet[2467]: W1002 19:16:19.297505 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.297552 kubelet[2467]: E1002 19:16:19.297519 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.297778 kubelet[2467]: E1002 19:16:19.297761 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.297778 kubelet[2467]: W1002 19:16:19.297776 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.297909 kubelet[2467]: E1002 19:16:19.297792 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.297994 kubelet[2467]: E1002 19:16:19.297981 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.298067 kubelet[2467]: W1002 19:16:19.297995 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.298067 kubelet[2467]: E1002 19:16:19.298010 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.298196 kubelet[2467]: E1002 19:16:19.298181 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.298267 kubelet[2467]: W1002 19:16:19.298196 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.298267 kubelet[2467]: E1002 19:16:19.298210 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.298401 kubelet[2467]: E1002 19:16:19.298386 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.298401 kubelet[2467]: W1002 19:16:19.298401 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.298515 kubelet[2467]: E1002 19:16:19.298415 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.298593 kubelet[2467]: E1002 19:16:19.298579 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.298662 kubelet[2467]: W1002 19:16:19.298594 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.298662 kubelet[2467]: E1002 19:16:19.298608 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.298797 kubelet[2467]: E1002 19:16:19.298783 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.298854 kubelet[2467]: W1002 19:16:19.298797 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.298854 kubelet[2467]: E1002 19:16:19.298812 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.316623 kubelet[2467]: E1002 19:16:19.316602 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.316623 kubelet[2467]: W1002 19:16:19.316616 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.316793 kubelet[2467]: E1002 19:16:19.316633 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.316931 kubelet[2467]: E1002 19:16:19.316913 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.316931 kubelet[2467]: W1002 19:16:19.316927 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.317069 kubelet[2467]: E1002 19:16:19.316974 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.317244 kubelet[2467]: E1002 19:16:19.317227 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.317244 kubelet[2467]: W1002 19:16:19.317239 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.317392 kubelet[2467]: E1002 19:16:19.317257 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.317510 kubelet[2467]: E1002 19:16:19.317491 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.317567 kubelet[2467]: W1002 19:16:19.317505 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.317567 kubelet[2467]: E1002 19:16:19.317530 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.317782 kubelet[2467]: E1002 19:16:19.317760 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.317782 kubelet[2467]: W1002 19:16:19.317772 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.317980 kubelet[2467]: E1002 19:16:19.317791 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.317980 kubelet[2467]: E1002 19:16:19.317978 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.318076 kubelet[2467]: W1002 19:16:19.317989 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.318076 kubelet[2467]: E1002 19:16:19.318003 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.318205 kubelet[2467]: E1002 19:16:19.318188 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.318205 kubelet[2467]: W1002 19:16:19.318202 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.318313 kubelet[2467]: E1002 19:16:19.318216 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.318562 kubelet[2467]: E1002 19:16:19.318544 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.318562 kubelet[2467]: W1002 19:16:19.318557 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.318702 kubelet[2467]: E1002 19:16:19.318577 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.318796 kubelet[2467]: E1002 19:16:19.318782 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.318796 kubelet[2467]: W1002 19:16:19.318793 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.318921 kubelet[2467]: E1002 19:16:19.318874 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.319034 kubelet[2467]: E1002 19:16:19.319020 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.319034 kubelet[2467]: W1002 19:16:19.319031 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.319160 kubelet[2467]: E1002 19:16:19.319111 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.319258 kubelet[2467]: E1002 19:16:19.319244 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.319258 kubelet[2467]: W1002 19:16:19.319255 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.319383 kubelet[2467]: E1002 19:16:19.319273 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.319473 kubelet[2467]: E1002 19:16:19.319460 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.319473 kubelet[2467]: W1002 19:16:19.319471 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.319581 kubelet[2467]: E1002 19:16:19.319489 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.319732 kubelet[2467]: E1002 19:16:19.319714 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.319732 kubelet[2467]: W1002 19:16:19.319728 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.319838 kubelet[2467]: E1002 19:16:19.319746 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.320127 kubelet[2467]: E1002 19:16:19.320111 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.320127 kubelet[2467]: W1002 19:16:19.320123 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.320271 kubelet[2467]: E1002 19:16:19.320145 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.320359 kubelet[2467]: E1002 19:16:19.320340 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.320359 kubelet[2467]: W1002 19:16:19.320354 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.320486 kubelet[2467]: E1002 19:16:19.320369 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.320552 kubelet[2467]: E1002 19:16:19.320535 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.320552 kubelet[2467]: W1002 19:16:19.320551 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.320673 kubelet[2467]: E1002 19:16:19.320565 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.320768 kubelet[2467]: E1002 19:16:19.320755 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.320768 kubelet[2467]: W1002 19:16:19.320766 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.320899 kubelet[2467]: E1002 19:16:19.320780 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:19.321646 kubelet[2467]: E1002 19:16:19.321629 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:19.321646 kubelet[2467]: W1002 19:16:19.321642 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:19.321761 kubelet[2467]: E1002 19:16:19.321657 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.203115 kubelet[2467]: E1002 19:16:20.203090 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.203115 kubelet[2467]: W1002 19:16:20.203107 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.203337 kubelet[2467]: E1002 19:16:20.203128 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.203337 kubelet[2467]: E1002 19:16:20.203323 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.203337 kubelet[2467]: W1002 19:16:20.203332 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.203535 kubelet[2467]: E1002 19:16:20.203347 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.203535 kubelet[2467]: E1002 19:16:20.203534 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.203635 kubelet[2467]: W1002 19:16:20.203544 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.203635 kubelet[2467]: E1002 19:16:20.203560 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.203796 kubelet[2467]: E1002 19:16:20.203780 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.203796 kubelet[2467]: W1002 19:16:20.203792 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.203928 kubelet[2467]: E1002 19:16:20.203807 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.204016 kubelet[2467]: E1002 19:16:20.204000 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.204016 kubelet[2467]: W1002 19:16:20.204013 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.204166 kubelet[2467]: E1002 19:16:20.204029 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.204252 kubelet[2467]: E1002 19:16:20.204195 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.204252 kubelet[2467]: W1002 19:16:20.204212 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.204252 kubelet[2467]: E1002 19:16:20.204229 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.204474 kubelet[2467]: E1002 19:16:20.204460 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.204612 kubelet[2467]: W1002 19:16:20.204551 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.204695 kubelet[2467]: E1002 19:16:20.204678 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.205011 kubelet[2467]: E1002 19:16:20.204875 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.205011 kubelet[2467]: W1002 19:16:20.204900 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.205011 kubelet[2467]: E1002 19:16:20.204916 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.205211 kubelet[2467]: E1002 19:16:20.205196 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.205211 kubelet[2467]: W1002 19:16:20.205208 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.205323 kubelet[2467]: E1002 19:16:20.205223 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.205442 kubelet[2467]: E1002 19:16:20.205427 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.205442 kubelet[2467]: W1002 19:16:20.205438 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.205554 kubelet[2467]: E1002 19:16:20.205456 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.205746 kubelet[2467]: E1002 19:16:20.205728 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.205746 kubelet[2467]: W1002 19:16:20.205740 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.205875 kubelet[2467]: E1002 19:16:20.205756 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.205962 kubelet[2467]: E1002 19:16:20.205930 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.205962 kubelet[2467]: W1002 19:16:20.205960 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.206339 kubelet[2467]: E1002 19:16:20.205976 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.224600 kubelet[2467]: E1002 19:16:20.224580 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.224600 kubelet[2467]: W1002 19:16:20.224594 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.224729 kubelet[2467]: E1002 19:16:20.224610 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.224898 kubelet[2467]: E1002 19:16:20.224881 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.224898 kubelet[2467]: W1002 19:16:20.224894 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.225055 kubelet[2467]: E1002 19:16:20.224915 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.225141 kubelet[2467]: E1002 19:16:20.225122 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.225141 kubelet[2467]: W1002 19:16:20.225136 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.225311 kubelet[2467]: E1002 19:16:20.225152 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.225815 kubelet[2467]: E1002 19:16:20.225792 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.225815 kubelet[2467]: W1002 19:16:20.225814 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.225969 kubelet[2467]: E1002 19:16:20.225832 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.226063 kubelet[2467]: E1002 19:16:20.226047 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.226115 kubelet[2467]: W1002 19:16:20.226065 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.226115 kubelet[2467]: E1002 19:16:20.226108 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.226298 kubelet[2467]: E1002 19:16:20.226276 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.226351 kubelet[2467]: W1002 19:16:20.226301 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.226351 kubelet[2467]: E1002 19:16:20.226317 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.226526 kubelet[2467]: E1002 19:16:20.226510 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.226576 kubelet[2467]: W1002 19:16:20.226526 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.226576 kubelet[2467]: E1002 19:16:20.226540 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.231768 kubelet[2467]: E1002 19:16:20.231749 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.231768 kubelet[2467]: W1002 19:16:20.231766 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.231894 kubelet[2467]: E1002 19:16:20.231789 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.234215 kubelet[2467]: E1002 19:16:20.234197 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.234215 kubelet[2467]: W1002 19:16:20.234213 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.234361 kubelet[2467]: E1002 19:16:20.234231 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.234410 kubelet[2467]: E1002 19:16:20.234397 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.234410 kubelet[2467]: W1002 19:16:20.234406 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.234514 kubelet[2467]: E1002 19:16:20.234420 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.234579 kubelet[2467]: E1002 19:16:20.234565 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.234625 kubelet[2467]: W1002 19:16:20.234581 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.234625 kubelet[2467]: E1002 19:16:20.234595 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.234963 kubelet[2467]: E1002 19:16:20.234805 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.234963 kubelet[2467]: W1002 19:16:20.234817 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.234963 kubelet[2467]: E1002 19:16:20.234831 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.235167 kubelet[2467]: E1002 19:16:20.235154 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.235212 kubelet[2467]: W1002 19:16:20.235168 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.235212 kubelet[2467]: E1002 19:16:20.235183 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.235366 kubelet[2467]: E1002 19:16:20.235351 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.235418 kubelet[2467]: W1002 19:16:20.235367 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.235418 kubelet[2467]: E1002 19:16:20.235380 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.235552 kubelet[2467]: E1002 19:16:20.235539 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.235603 kubelet[2467]: W1002 19:16:20.235553 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.235603 kubelet[2467]: E1002 19:16:20.235566 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.235730 kubelet[2467]: E1002 19:16:20.235717 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.235730 kubelet[2467]: W1002 19:16:20.235731 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.235730 kubelet[2467]: E1002 19:16:20.235744 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.235982 kubelet[2467]: E1002 19:16:20.235927 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.235982 kubelet[2467]: W1002 19:16:20.235936 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.235982 kubelet[2467]: E1002 19:16:20.235973 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:20.236333 kubelet[2467]: E1002 19:16:20.236316 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:20.236333 kubelet[2467]: W1002 19:16:20.236333 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:20.236433 kubelet[2467]: E1002 19:16:20.236348 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.213670 kubelet[2467]: E1002 19:16:21.213639 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.213670 kubelet[2467]: W1002 19:16:21.213664 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.214219 kubelet[2467]: E1002 19:16:21.213691 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.214219 kubelet[2467]: E1002 19:16:21.213884 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.214219 kubelet[2467]: W1002 19:16:21.213893 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.214219 kubelet[2467]: E1002 19:16:21.213908 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.214219 kubelet[2467]: E1002 19:16:21.214102 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.214219 kubelet[2467]: W1002 19:16:21.214111 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.214219 kubelet[2467]: E1002 19:16:21.214125 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.214559 kubelet[2467]: E1002 19:16:21.214333 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.214559 kubelet[2467]: W1002 19:16:21.214342 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.214559 kubelet[2467]: E1002 19:16:21.214355 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.214559 kubelet[2467]: E1002 19:16:21.214505 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.214559 kubelet[2467]: W1002 19:16:21.214514 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.214559 kubelet[2467]: E1002 19:16:21.214529 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.214901 kubelet[2467]: E1002 19:16:21.214679 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.214901 kubelet[2467]: W1002 19:16:21.214687 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.214901 kubelet[2467]: E1002 19:16:21.214700 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.215135 kubelet[2467]: E1002 19:16:21.214924 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.215135 kubelet[2467]: W1002 19:16:21.214934 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.215135 kubelet[2467]: E1002 19:16:21.214961 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.215135 kubelet[2467]: E1002 19:16:21.215133 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.215317 kubelet[2467]: W1002 19:16:21.215143 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.215317 kubelet[2467]: E1002 19:16:21.215157 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.215317 kubelet[2467]: E1002 19:16:21.215314 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.215453 kubelet[2467]: W1002 19:16:21.215323 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.215453 kubelet[2467]: E1002 19:16:21.215335 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.215536 kubelet[2467]: E1002 19:16:21.215502 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.215536 kubelet[2467]: W1002 19:16:21.215513 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.215536 kubelet[2467]: E1002 19:16:21.215525 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.215708 kubelet[2467]: E1002 19:16:21.215682 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.215783 kubelet[2467]: W1002 19:16:21.215767 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.215829 kubelet[2467]: E1002 19:16:21.215794 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.216011 kubelet[2467]: E1002 19:16:21.215995 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.216011 kubelet[2467]: W1002 19:16:21.216010 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.217530 kubelet[2467]: E1002 19:16:21.216026 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.232318 kubelet[2467]: E1002 19:16:21.232295 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.232318 kubelet[2467]: W1002 19:16:21.232311 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.232509 kubelet[2467]: E1002 19:16:21.232330 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.232649 kubelet[2467]: E1002 19:16:21.232631 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.232649 kubelet[2467]: W1002 19:16:21.232645 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.232836 kubelet[2467]: E1002 19:16:21.232666 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.233286 kubelet[2467]: E1002 19:16:21.232937 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.233286 kubelet[2467]: W1002 19:16:21.232969 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.233286 kubelet[2467]: E1002 19:16:21.232988 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.233286 kubelet[2467]: E1002 19:16:21.233233 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.233286 kubelet[2467]: W1002 19:16:21.233243 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.233286 kubelet[2467]: E1002 19:16:21.233261 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.233609 kubelet[2467]: E1002 19:16:21.233448 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.233609 kubelet[2467]: W1002 19:16:21.233459 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.233609 kubelet[2467]: E1002 19:16:21.233479 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.233735 kubelet[2467]: E1002 19:16:21.233678 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.233735 kubelet[2467]: W1002 19:16:21.233687 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.233735 kubelet[2467]: E1002 19:16:21.233705 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.233904 kubelet[2467]: E1002 19:16:21.233886 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.233973 kubelet[2467]: W1002 19:16:21.233899 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.233973 kubelet[2467]: E1002 19:16:21.233929 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.234185 kubelet[2467]: E1002 19:16:21.234169 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.234185 kubelet[2467]: W1002 19:16:21.234181 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.234765 kubelet[2467]: E1002 19:16:21.234351 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.234765 kubelet[2467]: E1002 19:16:21.234353 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.234765 kubelet[2467]: W1002 19:16:21.234464 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.234765 kubelet[2467]: E1002 19:16:21.234660 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.234765 kubelet[2467]: W1002 19:16:21.234670 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.234765 kubelet[2467]: E1002 19:16:21.234686 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.234765 kubelet[2467]: E1002 19:16:21.234729 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.235129 kubelet[2467]: E1002 19:16:21.234856 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.235129 kubelet[2467]: W1002 19:16:21.234865 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.235129 kubelet[2467]: E1002 19:16:21.234883 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.235129 kubelet[2467]: E1002 19:16:21.235099 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.235129 kubelet[2467]: W1002 19:16:21.235108 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.235129 kubelet[2467]: E1002 19:16:21.235122 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.235515 kubelet[2467]: E1002 19:16:21.235497 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.235515 kubelet[2467]: W1002 19:16:21.235510 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.235651 kubelet[2467]: E1002 19:16:21.235528 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.235741 kubelet[2467]: E1002 19:16:21.235727 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.235741 kubelet[2467]: W1002 19:16:21.235739 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.235844 kubelet[2467]: E1002 19:16:21.235758 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.236001 kubelet[2467]: E1002 19:16:21.235984 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.236001 kubelet[2467]: W1002 19:16:21.235997 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.236121 kubelet[2467]: E1002 19:16:21.236012 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.236192 kubelet[2467]: E1002 19:16:21.236176 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.236192 kubelet[2467]: W1002 19:16:21.236188 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.236303 kubelet[2467]: E1002 19:16:21.236203 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.236399 kubelet[2467]: E1002 19:16:21.236382 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.236449 kubelet[2467]: W1002 19:16:21.236398 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.236449 kubelet[2467]: E1002 19:16:21.236413 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:21.236714 kubelet[2467]: E1002 19:16:21.236698 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:16:21.236714 kubelet[2467]: W1002 19:16:21.236710 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:16:21.236817 kubelet[2467]: E1002 19:16:21.236724 2467 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:16:22.139353 env[1311]: time="2023-10-02T19:16:22.139301959Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:22.149038 env[1311]: time="2023-10-02T19:16:22.149000448Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:22.156108 env[1311]: time="2023-10-02T19:16:22.156074885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:22.163105 env[1311]: time="2023-10-02T19:16:22.163072421Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:22.164576 env[1311]: time="2023-10-02T19:16:22.164547450Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:16:22.167064 env[1311]: time="2023-10-02T19:16:22.167029298Z" level=info msg="CreateContainer within sandbox \"3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:16:22.220019 env[1311]: time="2023-10-02T19:16:22.219928425Z" level=info msg="CreateContainer within sandbox \"3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d\"" Oct 2 19:16:22.221078 env[1311]: time="2023-10-02T19:16:22.221043847Z" level=info msg="StartContainer for \"2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d\"" Oct 2 19:16:22.250731 systemd[1]: run-containerd-runc-k8s.io-2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d-runc.NhRtUf.mount: Deactivated successfully. Oct 2 19:16:22.252516 systemd[1]: Started cri-containerd-2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d.scope. Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2937 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:22.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264626132393733383165353061626437373637393139323530383032 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit: BPF prog-id=134 op=LOAD Oct 2 19:16:22.273000 audit[3162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002cfda0 items=0 ppid=2937 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:22.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264626132393733383165353061626437373637393139323530383032 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit: BPF prog-id=135 op=LOAD Oct 2 19:16:22.273000 audit[3162]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002cfde8 items=0 ppid=2937 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:22.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264626132393733383165353061626437373637393139323530383032 Oct 2 19:16:22.273000 audit: BPF prog-id=135 op=UNLOAD Oct 2 19:16:22.273000 audit: BPF prog-id=134 op=UNLOAD Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:22.273000 audit: BPF prog-id=136 op=LOAD Oct 2 19:16:22.273000 audit[3162]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002cfe78 items=0 ppid=2937 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:22.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264626132393733383165353061626437373637393139323530383032 Oct 2 19:16:22.302844 env[1311]: time="2023-10-02T19:16:22.302802135Z" level=info msg="StartContainer for \"2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d\" returns successfully" Oct 2 19:16:22.327349 systemd[1]: cri-containerd-2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d.scope: Deactivated successfully. Oct 2 19:16:22.330000 audit: BPF prog-id=136 op=UNLOAD Oct 2 19:16:23.193412 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d-rootfs.mount: Deactivated successfully. Oct 2 19:16:23.545580 env[1311]: time="2023-10-02T19:16:23.545169458Z" level=info msg="shim disconnected" id=2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d Oct 2 19:16:23.545580 env[1311]: time="2023-10-02T19:16:23.545233959Z" level=warning msg="cleaning up after shim disconnected" id=2dba297381e50abd7767919250802854145a3e4ec3cffa988f8591519568b27d namespace=k8s.io Oct 2 19:16:23.545580 env[1311]: time="2023-10-02T19:16:23.545246259Z" level=info msg="cleaning up dead shim" Oct 2 19:16:23.553195 env[1311]: time="2023-10-02T19:16:23.553156910Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:16:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3203 runtime=io.containerd.runc.v2\n" Oct 2 19:16:24.210610 env[1311]: time="2023-10-02T19:16:24.210569556Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:16:26.125331 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1288011836.mount: Deactivated successfully. Oct 2 19:16:30.790200 env[1311]: time="2023-10-02T19:16:30.790078854Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:30.803928 env[1311]: time="2023-10-02T19:16:30.803788784Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:30.808207 env[1311]: time="2023-10-02T19:16:30.808126056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:30.812173 env[1311]: time="2023-10-02T19:16:30.812141423Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:30.812787 env[1311]: time="2023-10-02T19:16:30.812754534Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:16:30.816846 env[1311]: time="2023-10-02T19:16:30.816817402Z" level=info msg="CreateContainer within sandbox \"3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:16:30.849335 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1673546424.mount: Deactivated successfully. Oct 2 19:16:30.856703 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2196771332.mount: Deactivated successfully. Oct 2 19:16:30.874330 env[1311]: time="2023-10-02T19:16:30.874283864Z" level=info msg="CreateContainer within sandbox \"3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6\"" Oct 2 19:16:30.875205 env[1311]: time="2023-10-02T19:16:30.875174879Z" level=info msg="StartContainer for \"d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6\"" Oct 2 19:16:30.901606 systemd[1]: Started cri-containerd-d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6.scope. Oct 2 19:16:30.917000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.923233 kernel: kauditd_printk_skb: 97 callbacks suppressed Oct 2 19:16:30.923321 kernel: audit: type=1400 audit(1696274190.917:1120): avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.917000 audit[3224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2937 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:30.957969 kernel: audit: type=1300 audit(1696274190.917:1120): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2937 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:30.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438373630356131656536636166373533383031393330646639386462 Oct 2 19:16:30.917000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.991229 env[1311]: time="2023-10-02T19:16:30.991193522Z" level=info msg="StartContainer for \"d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6\" returns successfully" Oct 2 19:16:30.996627 kernel: audit: type=1327 audit(1696274190.917:1120): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438373630356131656536636166373533383031393330646639386462 Oct 2 19:16:30.996718 kernel: audit: type=1400 audit(1696274190.917:1121): avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.999983 kernel: audit: type=1400 audit(1696274190.917:1121): avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.917000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.917000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:31.021654 kernel: audit: type=1400 audit(1696274190.917:1121): avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.917000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:31.034601 kernel: audit: type=1400 audit(1696274190.917:1121): avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:31.034736 kernel: audit: type=1400 audit(1696274190.917:1121): avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.917000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:31.047150 kernel: audit: type=1400 audit(1696274190.917:1121): avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.917000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.917000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:31.076982 kernel: audit: type=1400 audit(1696274190.917:1121): avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.917000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.917000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.917000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.917000 audit: BPF prog-id=137 op=LOAD Oct 2 19:16:30.917000 audit[3224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000304740 items=0 ppid=2937 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:30.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438373630356131656536636166373533383031393330646639386462 Oct 2 19:16:30.936000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.936000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.936000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.936000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.936000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.936000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.936000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.936000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.936000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.936000 audit: BPF prog-id=138 op=LOAD Oct 2 19:16:30.936000 audit[3224]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000304788 items=0 ppid=2937 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:30.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438373630356131656536636166373533383031393330646639386462 Oct 2 19:16:30.956000 audit: BPF prog-id=138 op=UNLOAD Oct 2 19:16:30.956000 audit: BPF prog-id=137 op=UNLOAD Oct 2 19:16:30.956000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.956000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.956000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.956000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.956000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.956000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.956000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.956000 audit[3224]: AVC avc: denied { perfmon } for pid=3224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.956000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.956000 audit[3224]: AVC avc: denied { bpf } for pid=3224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:30.956000 audit: BPF prog-id=139 op=LOAD Oct 2 19:16:30.956000 audit[3224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000304818 items=0 ppid=2937 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:30.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438373630356131656536636166373533383031393330646639386462 Oct 2 19:16:32.591471 env[1311]: time="2023-10-02T19:16:32.591404600Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:16:32.594879 systemd[1]: cri-containerd-d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6.scope: Deactivated successfully. Oct 2 19:16:32.597000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:16:32.615604 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6-rootfs.mount: Deactivated successfully. Oct 2 19:16:32.631106 kubelet[2467]: I1002 19:16:32.630173 2467 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.655098 2467 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.666358 2467 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.667870 2467 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.688239 2467 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.708186 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sntnx\" (UniqueName: \"kubernetes.io/projected/6efed0db-4734-47a7-afef-8e4f010b2a81-kube-api-access-sntnx\") pod \"coredns-787d4945fb-mdww6\" (UID: \"6efed0db-4734-47a7-afef-8e4f010b2a81\") " pod="kube-system/coredns-787d4945fb-mdww6" Oct 2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.708232 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cf67d82a-6eeb-4bf3-adec-800e8c7dc360-config-volume\") pod \"coredns-787d4945fb-9tz2t\" (UID: \"cf67d82a-6eeb-4bf3-adec-800e8c7dc360\") " pod="kube-system/coredns-787d4945fb-9tz2t" Oct 2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.708341 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/51cdf950-fd56-4099-b416-942f3ef06aee-varrun\") pod \"csi-node-driver-484pr\" (UID: \"51cdf950-fd56-4099-b416-942f3ef06aee\") " pod="calico-system/csi-node-driver-484pr" Oct 2 19:16:33.121312 kubelet[2467]: I1002 19:16:32.708427 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/51cdf950-fd56-4099-b416-942f3ef06aee-etccalico\") pod \"csi-node-driver-484pr\" (UID: \"51cdf950-fd56-4099-b416-942f3ef06aee\") " pod="calico-system/csi-node-driver-484pr" Oct 2 19:16:32.661364 systemd[1]: Created slice kubepods-burstable-pod6efed0db_4734_47a7_afef_8e4f010b2a81.slice. Oct 2 19:16:33.121870 kubelet[2467]: I1002 19:16:32.708546 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r78km\" (UniqueName: \"kubernetes.io/projected/cf67d82a-6eeb-4bf3-adec-800e8c7dc360-kube-api-access-r78km\") pod \"coredns-787d4945fb-9tz2t\" (UID: \"cf67d82a-6eeb-4bf3-adec-800e8c7dc360\") " pod="kube-system/coredns-787d4945fb-9tz2t" Oct 2 19:16:33.121870 kubelet[2467]: I1002 19:16:32.708589 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kp4ht\" (UniqueName: \"kubernetes.io/projected/51cd6516-73d5-4525-9aa3-c3b0c6013145-kube-api-access-kp4ht\") pod \"calico-kube-controllers-69c848ddc6-z4r7k\" (UID: \"51cd6516-73d5-4525-9aa3-c3b0c6013145\") " pod="calico-system/calico-kube-controllers-69c848ddc6-z4r7k" Oct 2 19:16:33.121870 kubelet[2467]: I1002 19:16:32.708621 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/51cdf950-fd56-4099-b416-942f3ef06aee-socket-dir\") pod \"csi-node-driver-484pr\" (UID: \"51cdf950-fd56-4099-b416-942f3ef06aee\") " pod="calico-system/csi-node-driver-484pr" Oct 2 19:16:33.121870 kubelet[2467]: I1002 19:16:32.708649 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-44fmr\" (UniqueName: \"kubernetes.io/projected/51cdf950-fd56-4099-b416-942f3ef06aee-kube-api-access-44fmr\") pod \"csi-node-driver-484pr\" (UID: \"51cdf950-fd56-4099-b416-942f3ef06aee\") " pod="calico-system/csi-node-driver-484pr" Oct 2 19:16:33.121870 kubelet[2467]: I1002 19:16:32.708682 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/51cdf950-fd56-4099-b416-942f3ef06aee-registration-dir\") pod \"csi-node-driver-484pr\" (UID: \"51cdf950-fd56-4099-b416-942f3ef06aee\") " pod="calico-system/csi-node-driver-484pr" Oct 2 19:16:32.674520 systemd[1]: Created slice kubepods-besteffort-pod51cd6516_73d5_4525_9aa3_c3b0c6013145.slice. Oct 2 19:16:33.122182 kubelet[2467]: I1002 19:16:32.708716 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6efed0db-4734-47a7-afef-8e4f010b2a81-config-volume\") pod \"coredns-787d4945fb-mdww6\" (UID: \"6efed0db-4734-47a7-afef-8e4f010b2a81\") " pod="kube-system/coredns-787d4945fb-mdww6" Oct 2 19:16:33.122182 kubelet[2467]: I1002 19:16:32.708748 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/51cdf950-fd56-4099-b416-942f3ef06aee-kubelet-dir\") pod \"csi-node-driver-484pr\" (UID: \"51cdf950-fd56-4099-b416-942f3ef06aee\") " pod="calico-system/csi-node-driver-484pr" Oct 2 19:16:32.682120 systemd[1]: Created slice kubepods-burstable-podcf67d82a_6eeb_4bf3_adec_800e8c7dc360.slice. Oct 2 19:16:32.693634 systemd[1]: Created slice kubepods-besteffort-pod51cdf950_fd56_4099_b416_942f3ef06aee.slice. Oct 2 19:16:33.474771 env[1311]: time="2023-10-02T19:16:33.474268757Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mdww6,Uid:6efed0db-4734-47a7-afef-8e4f010b2a81,Namespace:kube-system,Attempt:0,}" Oct 2 19:16:33.475743 env[1311]: time="2023-10-02T19:16:33.475498577Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-9tz2t,Uid:cf67d82a-6eeb-4bf3-adec-800e8c7dc360,Namespace:kube-system,Attempt:0,}" Oct 2 19:16:33.476799 env[1311]: time="2023-10-02T19:16:33.476431892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-484pr,Uid:51cdf950-fd56-4099-b416-942f3ef06aee,Namespace:calico-system,Attempt:0,}" Oct 2 19:16:33.476799 env[1311]: time="2023-10-02T19:16:33.476431492Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-z4r7k,Uid:51cd6516-73d5-4525-9aa3-c3b0c6013145,Namespace:calico-system,Attempt:0,}" Oct 2 19:16:34.199711 env[1311]: time="2023-10-02T19:16:34.199655546Z" level=info msg="shim disconnected" id=d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6 Oct 2 19:16:34.199711 env[1311]: time="2023-10-02T19:16:34.199704247Z" level=warning msg="cleaning up after shim disconnected" id=d87605a1ee6caf753801930df98dbbc68900e85fb8ea24c7ca80da4a4b36d6f6 namespace=k8s.io Oct 2 19:16:34.199711 env[1311]: time="2023-10-02T19:16:34.199715747Z" level=info msg="cleaning up dead shim" Oct 2 19:16:34.210032 env[1311]: time="2023-10-02T19:16:34.209986408Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:16:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3280 runtime=io.containerd.runc.v2\n" Oct 2 19:16:34.233392 env[1311]: time="2023-10-02T19:16:34.231552045Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:16:34.456271 env[1311]: time="2023-10-02T19:16:34.455882855Z" level=error msg="Failed to destroy network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.456451 env[1311]: time="2023-10-02T19:16:34.456407163Z" level=error msg="encountered an error cleaning up failed sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.456534 env[1311]: time="2023-10-02T19:16:34.456480565Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-9tz2t,Uid:cf67d82a-6eeb-4bf3-adec-800e8c7dc360,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.456755 kubelet[2467]: E1002 19:16:34.456731 2467 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.457149 kubelet[2467]: E1002 19:16:34.456795 2467 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-9tz2t" Oct 2 19:16:34.457149 kubelet[2467]: E1002 19:16:34.456829 2467 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-9tz2t" Oct 2 19:16:34.457149 kubelet[2467]: E1002 19:16:34.456902 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-9tz2t_kube-system(cf67d82a-6eeb-4bf3-adec-800e8c7dc360)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-9tz2t_kube-system(cf67d82a-6eeb-4bf3-adec-800e8c7dc360)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-9tz2t" podUID=cf67d82a-6eeb-4bf3-adec-800e8c7dc360 Oct 2 19:16:34.494174 env[1311]: time="2023-10-02T19:16:34.494103853Z" level=error msg="Failed to destroy network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.494533 env[1311]: time="2023-10-02T19:16:34.494485059Z" level=error msg="encountered an error cleaning up failed sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.494625 env[1311]: time="2023-10-02T19:16:34.494568361Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mdww6,Uid:6efed0db-4734-47a7-afef-8e4f010b2a81,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.494841 kubelet[2467]: E1002 19:16:34.494817 2467 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.494968 kubelet[2467]: E1002 19:16:34.494890 2467 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-mdww6" Oct 2 19:16:34.494968 kubelet[2467]: E1002 19:16:34.494922 2467 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-mdww6" Oct 2 19:16:34.495078 kubelet[2467]: E1002 19:16:34.495002 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-mdww6_kube-system(6efed0db-4734-47a7-afef-8e4f010b2a81)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-mdww6_kube-system(6efed0db-4734-47a7-afef-8e4f010b2a81)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-mdww6" podUID=6efed0db-4734-47a7-afef-8e4f010b2a81 Oct 2 19:16:34.500577 env[1311]: time="2023-10-02T19:16:34.500528354Z" level=error msg="Failed to destroy network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.500880 env[1311]: time="2023-10-02T19:16:34.500835059Z" level=error msg="encountered an error cleaning up failed sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.500972 env[1311]: time="2023-10-02T19:16:34.500895960Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-z4r7k,Uid:51cd6516-73d5-4525-9aa3-c3b0c6013145,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.501129 kubelet[2467]: E1002 19:16:34.501106 2467 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.501217 kubelet[2467]: E1002 19:16:34.501161 2467 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69c848ddc6-z4r7k" Oct 2 19:16:34.501217 kubelet[2467]: E1002 19:16:34.501191 2467 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69c848ddc6-z4r7k" Oct 2 19:16:34.501311 kubelet[2467]: E1002 19:16:34.501249 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-69c848ddc6-z4r7k_calico-system(51cd6516-73d5-4525-9aa3-c3b0c6013145)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-69c848ddc6-z4r7k_calico-system(51cd6516-73d5-4525-9aa3-c3b0c6013145)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69c848ddc6-z4r7k" podUID=51cd6516-73d5-4525-9aa3-c3b0c6013145 Oct 2 19:16:34.518798 env[1311]: time="2023-10-02T19:16:34.518741739Z" level=error msg="Failed to destroy network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.519135 env[1311]: time="2023-10-02T19:16:34.519097044Z" level=error msg="encountered an error cleaning up failed sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.519222 env[1311]: time="2023-10-02T19:16:34.519164345Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-484pr,Uid:51cdf950-fd56-4099-b416-942f3ef06aee,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.519405 kubelet[2467]: E1002 19:16:34.519383 2467 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:34.519511 kubelet[2467]: E1002 19:16:34.519441 2467 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-484pr" Oct 2 19:16:34.519511 kubelet[2467]: E1002 19:16:34.519472 2467 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-484pr" Oct 2 19:16:34.519609 kubelet[2467]: E1002 19:16:34.519536 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:16:35.232592 kubelet[2467]: I1002 19:16:35.232560 2467 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Oct 2 19:16:35.233335 env[1311]: time="2023-10-02T19:16:35.233258661Z" level=info msg="StopPodSandbox for \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\"" Oct 2 19:16:35.236749 kubelet[2467]: I1002 19:16:35.236724 2467 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Oct 2 19:16:35.237444 env[1311]: time="2023-10-02T19:16:35.237402025Z" level=info msg="StopPodSandbox for \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\"" Oct 2 19:16:35.241005 kubelet[2467]: I1002 19:16:35.240464 2467 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Oct 2 19:16:35.241319 env[1311]: time="2023-10-02T19:16:35.241282684Z" level=info msg="StopPodSandbox for \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\"" Oct 2 19:16:35.243583 kubelet[2467]: I1002 19:16:35.243158 2467 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Oct 2 19:16:35.243903 env[1311]: time="2023-10-02T19:16:35.243866724Z" level=info msg="StopPodSandbox for \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\"" Oct 2 19:16:35.309258 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f-shm.mount: Deactivated successfully. Oct 2 19:16:35.309361 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e-shm.mount: Deactivated successfully. Oct 2 19:16:35.309435 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44-shm.mount: Deactivated successfully. Oct 2 19:16:35.337350 env[1311]: time="2023-10-02T19:16:35.337283962Z" level=error msg="StopPodSandbox for \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\" failed" error="failed to destroy network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:35.337826 kubelet[2467]: E1002 19:16:35.337802 2467 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Oct 2 19:16:35.337966 kubelet[2467]: E1002 19:16:35.337864 2467 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e} Oct 2 19:16:35.337966 kubelet[2467]: E1002 19:16:35.337924 2467 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cf67d82a-6eeb-4bf3-adec-800e8c7dc360\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:16:35.338125 kubelet[2467]: E1002 19:16:35.337992 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cf67d82a-6eeb-4bf3-adec-800e8c7dc360\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-9tz2t" podUID=cf67d82a-6eeb-4bf3-adec-800e8c7dc360 Oct 2 19:16:35.346431 env[1311]: time="2023-10-02T19:16:35.346374202Z" level=error msg="StopPodSandbox for \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\" failed" error="failed to destroy network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:35.346799 kubelet[2467]: E1002 19:16:35.346778 2467 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Oct 2 19:16:35.346908 kubelet[2467]: E1002 19:16:35.346821 2467 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44} Oct 2 19:16:35.346908 kubelet[2467]: E1002 19:16:35.346864 2467 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6efed0db-4734-47a7-afef-8e4f010b2a81\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:16:35.347068 kubelet[2467]: E1002 19:16:35.346911 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6efed0db-4734-47a7-afef-8e4f010b2a81\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-mdww6" podUID=6efed0db-4734-47a7-afef-8e4f010b2a81 Oct 2 19:16:35.347939 env[1311]: time="2023-10-02T19:16:35.347896026Z" level=error msg="StopPodSandbox for \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\" failed" error="failed to destroy network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:35.348426 kubelet[2467]: E1002 19:16:35.348248 2467 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Oct 2 19:16:35.348426 kubelet[2467]: E1002 19:16:35.348286 2467 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f} Oct 2 19:16:35.348426 kubelet[2467]: E1002 19:16:35.348343 2467 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"51cdf950-fd56-4099-b416-942f3ef06aee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:16:35.348426 kubelet[2467]: E1002 19:16:35.348397 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"51cdf950-fd56-4099-b416-942f3ef06aee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:16:35.349572 env[1311]: time="2023-10-02T19:16:35.349532351Z" level=error msg="StopPodSandbox for \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\" failed" error="failed to destroy network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:16:35.349712 kubelet[2467]: E1002 19:16:35.349694 2467 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Oct 2 19:16:35.349794 kubelet[2467]: E1002 19:16:35.349726 2467 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d} Oct 2 19:16:35.349794 kubelet[2467]: E1002 19:16:35.349769 2467 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"51cd6516-73d5-4525-9aa3-c3b0c6013145\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:16:35.349905 kubelet[2467]: E1002 19:16:35.349810 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"51cd6516-73d5-4525-9aa3-c3b0c6013145\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69c848ddc6-z4r7k" podUID=51cd6516-73d5-4525-9aa3-c3b0c6013145 Oct 2 19:16:40.881010 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4148316339.mount: Deactivated successfully. Oct 2 19:16:40.979258 env[1311]: time="2023-10-02T19:16:40.979206493Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:40.985292 env[1311]: time="2023-10-02T19:16:40.985254379Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:40.988451 env[1311]: time="2023-10-02T19:16:40.988419424Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:40.991410 env[1311]: time="2023-10-02T19:16:40.991377066Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:40.991813 env[1311]: time="2023-10-02T19:16:40.991782572Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:16:40.994205 env[1311]: time="2023-10-02T19:16:40.994172306Z" level=info msg="CreateContainer within sandbox \"3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:16:41.022337 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2510689735.mount: Deactivated successfully. Oct 2 19:16:41.029585 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3203641660.mount: Deactivated successfully. Oct 2 19:16:41.042768 env[1311]: time="2023-10-02T19:16:41.042725388Z" level=info msg="CreateContainer within sandbox \"3981f0d1bc48f63b49ed6856604a7d6c884810ff3837fcd677127ebf9c772584\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5\"" Oct 2 19:16:41.043504 env[1311]: time="2023-10-02T19:16:41.043475299Z" level=info msg="StartContainer for \"5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5\"" Oct 2 19:16:41.062241 systemd[1]: Started cri-containerd-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5.scope. Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.085653 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:16:41.085744 kernel: audit: type=1400 audit(1696274201.080:1127): avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2937 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:41.122158 kernel: audit: type=1300 audit(1696274201.080:1127): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2937 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:41.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313039643737633262316233613166313234666239626565646234 Oct 2 19:16:41.143049 kernel: audit: type=1327 audit(1696274201.080:1127): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313039643737633262316233613166313234666239626565646234 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.158367 env[1311]: time="2023-10-02T19:16:41.155528570Z" level=info msg="StartContainer for \"5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5\" returns successfully" Oct 2 19:16:41.167825 kernel: audit: type=1400 audit(1696274201.080:1128): avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.167925 kernel: audit: type=1400 audit(1696274201.080:1128): avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.193252 kernel: audit: type=1400 audit(1696274201.080:1128): avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.193334 kernel: audit: type=1400 audit(1696274201.080:1128): avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.205848 kernel: audit: type=1400 audit(1696274201.080:1128): avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.205932 kernel: audit: type=1400 audit(1696274201.080:1128): avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.219200 kernel: audit: type=1400 audit(1696274201.080:1128): avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit: BPF prog-id=140 op=LOAD Oct 2 19:16:41.080000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d9bc0 items=0 ppid=2937 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:41.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313039643737633262316233613166313234666239626565646234 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit: BPF prog-id=141 op=LOAD Oct 2 19:16:41.080000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d9c08 items=0 ppid=2937 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:41.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313039643737633262316233613166313234666239626565646234 Oct 2 19:16:41.080000 audit: BPF prog-id=141 op=UNLOAD Oct 2 19:16:41.080000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { perfmon } for pid=3514 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit[3514]: AVC avc: denied { bpf } for pid=3514 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:41.080000 audit: BPF prog-id=142 op=LOAD Oct 2 19:16:41.080000 audit[3514]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d9c98 items=0 ppid=2937 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:41.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565313039643737633262316233613166313234666239626565646234 Oct 2 19:16:41.499522 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:16:41.499684 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. Oct 2 19:16:42.287497 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.teDUDr.mount: Deactivated successfully. Oct 2 19:16:42.854000 audit[3670]: AVC avc: denied { write } for pid=3670 comm="tee" name="fd" dev="proc" ino=30530 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:16:42.857000 audit[3690]: AVC avc: denied { write } for pid=3690 comm="tee" name="fd" dev="proc" ino=30533 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:16:42.854000 audit[3670]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd561da975 a2=241 a3=1b6 items=1 ppid=3630 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:42.854000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:16:42.854000 audit: PATH item=0 name="/dev/fd/63" inode=30509 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:42.854000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:16:42.858000 audit[3664]: AVC avc: denied { write } for pid=3664 comm="tee" name="fd" dev="proc" ino=30537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:16:42.860000 audit[3688]: AVC avc: denied { write } for pid=3688 comm="tee" name="fd" dev="proc" ino=30543 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:16:42.857000 audit[3690]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd98168976 a2=241 a3=1b6 items=1 ppid=3640 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:42.857000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:16:42.857000 audit: PATH item=0 name="/dev/fd/63" inode=30527 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:42.857000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:16:42.858000 audit[3664]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7194c966 a2=241 a3=1b6 items=1 ppid=3626 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:42.858000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:16:42.858000 audit: PATH item=0 name="/dev/fd/63" inode=31060 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:42.858000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:16:42.860000 audit[3688]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0acdc975 a2=241 a3=1b6 items=1 ppid=3631 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:42.860000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:16:42.860000 audit: PATH item=0 name="/dev/fd/63" inode=30526 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:42.860000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:16:42.878000 audit[3682]: AVC avc: denied { write } for pid=3682 comm="tee" name="fd" dev="proc" ino=30556 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:16:42.881000 audit[3695]: AVC avc: denied { write } for pid=3695 comm="tee" name="fd" dev="proc" ino=30559 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:16:42.878000 audit[3682]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9db95975 a2=241 a3=1b6 items=1 ppid=3627 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:42.878000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:16:42.878000 audit: PATH item=0 name="/dev/fd/63" inode=30523 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:42.878000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:16:42.881000 audit[3695]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd86dd1977 a2=241 a3=1b6 items=1 ppid=3635 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:42.881000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:16:42.881000 audit: PATH item=0 name="/dev/fd/63" inode=30540 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:42.881000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:16:42.890000 audit[3705]: AVC avc: denied { write } for pid=3705 comm="tee" name="fd" dev="proc" ino=30564 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:16:42.890000 audit[3705]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff68060965 a2=241 a3=1b6 items=1 ppid=3642 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:42.890000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:16:42.890000 audit: PATH item=0 name="/dev/fd/63" inode=30553 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:16:42.890000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:16:43.300230 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.OHbAZt.mount: Deactivated successfully. Oct 2 19:16:43.327000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.327000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.327000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.327000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.327000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.327000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.327000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.327000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.327000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.327000 audit: BPF prog-id=143 op=LOAD Oct 2 19:16:43.327000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdf332a480 a2=70 a3=7f2658eb9000 items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.327000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:16:43.342000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:16:43.342000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.342000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.342000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.342000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.342000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.342000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.342000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.342000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.342000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.342000 audit: BPF prog-id=144 op=LOAD Oct 2 19:16:43.342000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdf332a480 a2=70 a3=6e items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.342000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:16:43.343000 audit: BPF prog-id=144 op=UNLOAD Oct 2 19:16:43.343000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.343000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdf332a430 a2=70 a3=7ffdf332a480 items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.343000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:16:43.343000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.343000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.343000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.343000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.343000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.343000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.343000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.343000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.343000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.343000 audit: BPF prog-id=145 op=LOAD Oct 2 19:16:43.343000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdf332a410 a2=70 a3=7ffdf332a480 items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.343000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:16:43.344000 audit: BPF prog-id=145 op=UNLOAD Oct 2 19:16:43.344000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.344000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf332a4f0 a2=70 a3=0 items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:16:43.344000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.344000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdf332a4e0 a2=70 a3=0 items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.344000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:16:43.345000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.345000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffdf332a520 a2=70 a3=0 items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.345000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:16:43.346000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.346000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.346000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.346000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.346000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.346000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.346000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.346000 audit[3785]: AVC avc: denied { perfmon } for pid=3785 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.346000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.346000 audit[3785]: AVC avc: denied { bpf } for pid=3785 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.346000 audit: BPF prog-id=146 op=LOAD Oct 2 19:16:43.346000 audit[3785]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffdf332a440 a2=70 a3=ffffffff items=0 ppid=3629 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.346000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:16:43.350000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.350000 audit[3796]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd2fb043d0 a2=70 a3=fff80800 items=0 ppid=3629 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.350000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:16:43.350000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:43.350000 audit[3796]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd2fb042a0 a2=70 a3=3 items=0 ppid=3629 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.350000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:16:43.357000 audit: BPF prog-id=146 op=UNLOAD Oct 2 19:16:43.555000 audit[3818]: NETFILTER_CFG table=raw:115 family=2 entries=19 op=nft_register_chain pid=3818 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:16:43.555000 audit[3818]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffd07216120 a2=0 a3=7ffd0721610c items=0 ppid=3629 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.555000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:16:43.567000 audit[3819]: NETFILTER_CFG table=nat:116 family=2 entries=16 op=nft_register_chain pid=3819 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:16:43.567000 audit[3819]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffcd6ae3920 a2=0 a3=7ffcd6ae390c items=0 ppid=3629 pid=3819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.567000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:16:43.571000 audit[3822]: NETFILTER_CFG table=mangle:117 family=2 entries=19 op=nft_register_chain pid=3822 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:16:43.571000 audit[3822]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffea7bd4bc0 a2=0 a3=7ffea7bd4bac items=0 ppid=3629 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.571000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:16:43.640000 audit[3820]: NETFILTER_CFG table=filter:118 family=2 entries=39 op=nft_register_chain pid=3820 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:16:43.640000 audit[3820]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffc52a27f10 a2=0 a3=55da8aad9000 items=0 ppid=3629 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:43.640000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:16:44.186119 systemd-networkd[1452]: vxlan.calico: Link UP Oct 2 19:16:44.186128 systemd-networkd[1452]: vxlan.calico: Gained carrier Oct 2 19:16:45.393161 systemd-networkd[1452]: vxlan.calico: Gained IPv6LL Oct 2 19:16:47.133615 env[1311]: time="2023-10-02T19:16:47.133565645Z" level=info msg="StopPodSandbox for \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\"" Oct 2 19:16:47.134639 env[1311]: time="2023-10-02T19:16:47.133849348Z" level=info msg="StopPodSandbox for \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\"" Oct 2 19:16:47.208015 kubelet[2467]: I1002 19:16:47.207974 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-hl64d" podStartSLOduration=-9.223372001646866e+09 pod.CreationTimestamp="2023-10-02 19:16:12 +0000 UTC" firstStartedPulling="2023-10-02 19:16:13.388129586 +0000 UTC m=+19.503311327" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:41.279083304 +0000 UTC m=+47.394265045" watchObservedRunningTime="2023-10-02 19:16:47.207909803 +0000 UTC m=+53.323091544" Oct 2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.208 [INFO][3877] k8s.go 576: Cleaning up netns ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Oct 2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.209 [INFO][3877] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" iface="eth0" netns="/var/run/netns/cni-aa6d8d3b-084e-bbb0-266b-0b2248330a0d" Oct 2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.209 [INFO][3877] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" iface="eth0" netns="/var/run/netns/cni-aa6d8d3b-084e-bbb0-266b-0b2248330a0d" Oct 2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.209 [INFO][3877] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" iface="eth0" netns="/var/run/netns/cni-aa6d8d3b-084e-bbb0-266b-0b2248330a0d" Oct 2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.209 [INFO][3877] k8s.go 583: Releasing IP address(es) ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Oct 2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.209 [INFO][3877] utils.go 196: Calico CNI releasing IP address ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Oct 2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.257 [INFO][3889] ipam_plugin.go 416: Releasing address using handleID ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:47.275095 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:47.275095 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.267 [WARNING][3889] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.267 [INFO][3889] ipam_plugin.go 444: Releasing address using workloadID ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:47.275095 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:47.275095 env[1311]: 2023-10-02 19:16:47.270 [INFO][3877] k8s.go 589: Teardown processing complete. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Oct 2 19:16:47.279053 systemd[1]: run-netns-cni\x2daa6d8d3b\x2d084e\x2dbbb0\x2d266b\x2d0b2248330a0d.mount: Deactivated successfully. Oct 2 19:16:47.282093 env[1311]: time="2023-10-02T19:16:47.282051760Z" level=info msg="TearDown network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\" successfully" Oct 2 19:16:47.282236 env[1311]: time="2023-10-02T19:16:47.282216062Z" level=info msg="StopPodSandbox for \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\" returns successfully" Oct 2 19:16:47.283010 env[1311]: time="2023-10-02T19:16:47.282976572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-9tz2t,Uid:cf67d82a-6eeb-4bf3-adec-800e8c7dc360,Namespace:kube-system,Attempt:1,}" Oct 2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.263 [INFO][3882] k8s.go 576: Cleaning up netns ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Oct 2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.263 [INFO][3882] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" iface="eth0" netns="/var/run/netns/cni-322b3501-ddc2-72f1-819d-b84733c630f5" Oct 2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.263 [INFO][3882] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" iface="eth0" netns="/var/run/netns/cni-322b3501-ddc2-72f1-819d-b84733c630f5" Oct 2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.263 [INFO][3882] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" iface="eth0" netns="/var/run/netns/cni-322b3501-ddc2-72f1-819d-b84733c630f5" Oct 2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.263 [INFO][3882] k8s.go 583: Releasing IP address(es) ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Oct 2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.264 [INFO][3882] utils.go 196: Calico CNI releasing IP address ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Oct 2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.307 [INFO][3896] ipam_plugin.go 416: Releasing address using handleID ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:47.328760 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:47.328760 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.317 [WARNING][3896] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.317 [INFO][3896] ipam_plugin.go 444: Releasing address using workloadID ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:47.328760 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:47.328760 env[1311]: 2023-10-02 19:16:47.321 [INFO][3882] k8s.go 589: Teardown processing complete. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Oct 2 19:16:47.331237 systemd[1]: run-netns-cni\x2d322b3501\x2dddc2\x2d72f1\x2d819d\x2db84733c630f5.mount: Deactivated successfully. Oct 2 19:16:47.332415 env[1311]: time="2023-10-02T19:16:47.332363909Z" level=info msg="TearDown network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\" successfully" Oct 2 19:16:47.332537 env[1311]: time="2023-10-02T19:16:47.332413909Z" level=info msg="StopPodSandbox for \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\" returns successfully" Oct 2 19:16:47.333317 env[1311]: time="2023-10-02T19:16:47.333281120Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-484pr,Uid:51cdf950-fd56-4099-b416-942f3ef06aee,Namespace:calico-system,Attempt:1,}" Oct 2 19:16:47.548505 systemd-networkd[1452]: calie3e9f3171ab: Link UP Oct 2 19:16:47.554965 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie3e9f3171ab: link becomes ready Oct 2 19:16:47.556316 systemd-networkd[1452]: calie3e9f3171ab: Gained carrier Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.412 [INFO][3902] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0 coredns-787d4945fb- kube-system cf67d82a-6eeb-4bf3-adec-800e8c7dc360 694 0 2023-10-02 19:16:07 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-e4b0ec5c33 coredns-787d4945fb-9tz2t eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie3e9f3171ab [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-" Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.412 [INFO][3902] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.473 [INFO][3923] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" HandleID="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.491 [INFO][3923] ipam_plugin.go 269: Auto assigning IP ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" HandleID="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00042e0a0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-e4b0ec5c33", "pod":"coredns-787d4945fb-9tz2t", "timestamp":"2023-10-02 19:16:47.473434528 +0000 UTC"}, Hostname:"ci-3510.3.0-a-e4b0ec5c33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:16:47.580618 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:47.580618 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.491 [INFO][3923] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-e4b0ec5c33' Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.493 [INFO][3923] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.501 [INFO][3923] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.514 [INFO][3923] ipam.go 489: Trying affinity for 192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.516 [INFO][3923] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.518 [INFO][3923] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.518 [INFO][3923] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.522 [INFO][3923] ipam.go 1682: Creating new handle: k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.525 [INFO][3923] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.531 [INFO][3923] ipam.go 1216: Successfully claimed IPs: [192.168.25.193/26] block=192.168.25.192/26 handle="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.531 [INFO][3923] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.193/26] handle="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.580618 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:47.580618 env[1311]: 2023-10-02 19:16:47.531 [INFO][3923] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.25.193/26] IPv6=[] ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" HandleID="k8s-pod-network.c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:47.581598 env[1311]: 2023-10-02 19:16:47.536 [INFO][3902] k8s.go 383: Populated endpoint ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"cf67d82a-6eeb-4bf3-adec-800e8c7dc360", ResourceVersion:"694", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"", Pod:"coredns-787d4945fb-9tz2t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie3e9f3171ab", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:47.581598 env[1311]: 2023-10-02 19:16:47.536 [INFO][3902] k8s.go 384: Calico CNI using IPs: [192.168.25.193/32] ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:47.581598 env[1311]: 2023-10-02 19:16:47.536 [INFO][3902] dataplane_linux.go 68: Setting the host side veth name to calie3e9f3171ab ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:47.581598 env[1311]: 2023-10-02 19:16:47.537 [INFO][3902] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:47.581598 env[1311]: 2023-10-02 19:16:47.557 [INFO][3902] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"cf67d82a-6eeb-4bf3-adec-800e8c7dc360", ResourceVersion:"694", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b", Pod:"coredns-787d4945fb-9tz2t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie3e9f3171ab", MAC:"da:0d:97:b1:d1:83", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:47.581598 env[1311]: 2023-10-02 19:16:47.575 [INFO][3902] k8s.go 489: Wrote updated endpoint to datastore ContainerID="c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b" Namespace="kube-system" Pod="coredns-787d4945fb-9tz2t" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:47.617970 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali307092f28d3: link becomes ready Oct 2 19:16:47.625783 systemd-networkd[1452]: cali307092f28d3: Link UP Oct 2 19:16:47.625792 systemd-networkd[1452]: cali307092f28d3: Gained carrier Oct 2 19:16:47.649318 env[1311]: time="2023-10-02T19:16:47.649110494Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:47.649318 env[1311]: time="2023-10-02T19:16:47.649167794Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:47.649318 env[1311]: time="2023-10-02T19:16:47.649181695Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:47.650477 env[1311]: time="2023-10-02T19:16:47.649662501Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b pid=3967 runtime=io.containerd.runc.v2 Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.465 [INFO][3912] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0 csi-node-driver- calico-system 51cdf950-fd56-4099-b416-942f3ef06aee 695 0 2023-10-02 19:16:32 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5877dcb8f5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.0-a-e4b0ec5c33 csi-node-driver-484pr eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali307092f28d3 [] []}} ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-" Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.465 [INFO][3912] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.517 [INFO][3933] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" HandleID="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.529 [INFO][3933] ipam_plugin.go 269: Auto assigning IP ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" HandleID="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004d660), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-e4b0ec5c33", "pod":"csi-node-driver-484pr", "timestamp":"2023-10-02 19:16:47.517576497 +0000 UTC"}, Hostname:"ci-3510.3.0-a-e4b0ec5c33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:16:47.650477 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:47.650477 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.531 [INFO][3933] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-e4b0ec5c33' Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.540 [INFO][3933] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.558 [INFO][3933] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.582 [INFO][3933] ipam.go 489: Trying affinity for 192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.586 [INFO][3933] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.589 [INFO][3933] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.589 [INFO][3933] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.591 [INFO][3933] ipam.go 1682: Creating new handle: k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.598 [INFO][3933] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.607 [INFO][3933] ipam.go 1216: Successfully claimed IPs: [192.168.25.194/26] block=192.168.25.192/26 handle="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.607 [INFO][3933] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.194/26] handle="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:47.650477 env[1311]: time="2023-10-02T19:16:47Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:47.650477 env[1311]: 2023-10-02 19:16:47.607 [INFO][3933] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.25.194/26] IPv6=[] ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" HandleID="k8s-pod-network.50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:47.651483 env[1311]: 2023-10-02 19:16:47.608 [INFO][3912] k8s.go 383: Populated endpoint ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"51cdf950-fd56-4099-b416-942f3ef06aee", ResourceVersion:"695", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 32, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"", Pod:"csi-node-driver-484pr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali307092f28d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:47.651483 env[1311]: 2023-10-02 19:16:47.609 [INFO][3912] k8s.go 384: Calico CNI using IPs: [192.168.25.194/32] ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:47.651483 env[1311]: 2023-10-02 19:16:47.609 [INFO][3912] dataplane_linux.go 68: Setting the host side veth name to cali307092f28d3 ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:47.651483 env[1311]: 2023-10-02 19:16:47.617 [INFO][3912] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:47.651483 env[1311]: 2023-10-02 19:16:47.625 [INFO][3912] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"51cdf950-fd56-4099-b416-942f3ef06aee", ResourceVersion:"695", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 32, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a", Pod:"csi-node-driver-484pr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali307092f28d3", MAC:"a2:1b:00:f3:78:2b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:47.651483 env[1311]: 2023-10-02 19:16:47.649 [INFO][3912] k8s.go 489: Wrote updated endpoint to datastore ContainerID="50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a" Namespace="calico-system" Pod="csi-node-driver-484pr" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:47.673655 kernel: kauditd_printk_skb: 151 callbacks suppressed Oct 2 19:16:47.673794 kernel: audit: type=1325 audit(1696274207.655:1158): table=filter:119 family=2 entries=36 op=nft_register_chain pid=3973 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:16:47.655000 audit[3973]: NETFILTER_CFG table=filter:119 family=2 entries=36 op=nft_register_chain pid=3973 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:16:47.655000 audit[3973]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd136fd800 a2=0 a3=7ffd136fd7ec items=0 ppid=3629 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.700273 kernel: audit: type=1300 audit(1696274207.655:1158): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd136fd800 a2=0 a3=7ffd136fd7ec items=0 ppid=3629 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.655000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:16:47.715155 kernel: audit: type=1327 audit(1696274207.655:1158): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:16:47.715214 kernel: audit: type=1325 audit(1696274207.708:1159): table=filter:120 family=2 entries=40 op=nft_register_chain pid=3999 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:16:47.708000 audit[3999]: NETFILTER_CFG table=filter:120 family=2 entries=40 op=nft_register_chain pid=3999 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:16:47.714954 systemd[1]: Started cri-containerd-c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b.scope. Oct 2 19:16:47.708000 audit[3999]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fff07841610 a2=0 a3=7fff078415fc items=0 ppid=3629 pid=3999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.736219 env[1311]: time="2023-10-02T19:16:47.734146590Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:47.736219 env[1311]: time="2023-10-02T19:16:47.734205391Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:47.736219 env[1311]: time="2023-10-02T19:16:47.734227091Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:47.736219 env[1311]: time="2023-10-02T19:16:47.734343993Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a pid=4015 runtime=io.containerd.runc.v2 Oct 2 19:16:47.748653 kernel: audit: type=1300 audit(1696274207.708:1159): arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fff07841610 a2=0 a3=7fff078415fc items=0 ppid=3629 pid=3999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.708000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:16:47.768039 kernel: audit: type=1327 audit(1696274207.708:1159): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:16:47.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.782974 kernel: audit: type=1400 audit(1696274207.750:1160): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.783063 kernel: audit: type=1400 audit(1696274207.750:1161): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.812037 kernel: audit: type=1400 audit(1696274207.750:1162): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.812517 systemd[1]: Started cri-containerd-50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a.scope. Oct 2 19:16:47.827000 kernel: audit: type=1400 audit(1696274207.750:1163): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.751000 audit: BPF prog-id=147 op=LOAD Oct 2 19:16:47.751000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.751000 audit[3982]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3967 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333363383735393731323036646535373339373036363631346536 Oct 2 19:16:47.751000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.751000 audit[3982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3967 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333363383735393731323036646535373339373036363631346536 Oct 2 19:16:47.751000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.751000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.751000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.751000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.751000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.751000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.751000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.751000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.751000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.751000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.751000 audit: BPF prog-id=148 op=LOAD Oct 2 19:16:47.751000 audit[3982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002809b0 items=0 ppid=3967 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333363383735393731323036646535373339373036363631346536 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit: BPF prog-id=149 op=LOAD Oct 2 19:16:47.752000 audit[3982]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002809f8 items=0 ppid=3967 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333363383735393731323036646535373339373036363631346536 Oct 2 19:16:47.752000 audit: BPF prog-id=149 op=UNLOAD Oct 2 19:16:47.752000 audit: BPF prog-id=148 op=UNLOAD Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.752000 audit: BPF prog-id=150 op=LOAD Oct 2 19:16:47.752000 audit[3982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000280e08 items=0 ppid=3967 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333363383735393731323036646535373339373036363631346536 Oct 2 19:16:47.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.846000 audit: BPF prog-id=151 op=LOAD Oct 2 19:16:47.847000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.847000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4015 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383039653936336535636330633865376239626164636431666339 Oct 2 19:16:47.847000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.847000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4015 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383039653936336535636330633865376239626164636431666339 Oct 2 19:16:47.847000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.847000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.847000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.847000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.847000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.847000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.847000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.847000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.847000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.847000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.847000 audit: BPF prog-id=152 op=LOAD Oct 2 19:16:47.847000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001ddc90 items=0 ppid=4015 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383039653936336535636330633865376239626164636431666339 Oct 2 19:16:47.848000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.848000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.848000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.848000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.848000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.848000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.848000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.848000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.848000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.848000 audit: BPF prog-id=153 op=LOAD Oct 2 19:16:47.848000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001ddcd8 items=0 ppid=4015 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383039653936336535636330633865376239626164636431666339 Oct 2 19:16:47.849000 audit: BPF prog-id=153 op=UNLOAD Oct 2 19:16:47.849000 audit: BPF prog-id=152 op=UNLOAD Oct 2 19:16:47.849000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.849000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.849000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.849000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.849000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.849000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.849000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.849000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.849000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.849000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.849000 audit: BPF prog-id=154 op=LOAD Oct 2 19:16:47.849000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029e0e8 items=0 ppid=4015 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383039653936336535636330633865376239626164636431666339 Oct 2 19:16:47.861463 env[1311]: time="2023-10-02T19:16:47.861423232Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-9tz2t,Uid:cf67d82a-6eeb-4bf3-adec-800e8c7dc360,Namespace:kube-system,Attempt:1,} returns sandbox id \"c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b\"" Oct 2 19:16:47.864567 env[1311]: time="2023-10-02T19:16:47.864530672Z" level=info msg="CreateContainer within sandbox \"c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:16:47.871678 env[1311]: time="2023-10-02T19:16:47.871633764Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-484pr,Uid:51cdf950-fd56-4099-b416-942f3ef06aee,Namespace:calico-system,Attempt:1,} returns sandbox id \"50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a\"" Oct 2 19:16:47.873291 env[1311]: time="2023-10-02T19:16:47.873261585Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:16:47.902464 env[1311]: time="2023-10-02T19:16:47.902387160Z" level=info msg="CreateContainer within sandbox \"c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d54976f15c945c8972d1bf41fe51acbd750ed4acc65c1d60d4cc153882188abf\"" Oct 2 19:16:47.904721 env[1311]: time="2023-10-02T19:16:47.903518175Z" level=info msg="StartContainer for \"d54976f15c945c8972d1bf41fe51acbd750ed4acc65c1d60d4cc153882188abf\"" Oct 2 19:16:47.920691 systemd[1]: Started cri-containerd-d54976f15c945c8972d1bf41fe51acbd750ed4acc65c1d60d4cc153882188abf.scope. Oct 2 19:16:47.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.935000 audit: BPF prog-id=155 op=LOAD Oct 2 19:16:47.935000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.935000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3967 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435343937366631356339343563383937326431626634316665353161 Oct 2 19:16:47.935000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.935000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3967 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435343937366631356339343563383937326431626634316665353161 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit: BPF prog-id=156 op=LOAD Oct 2 19:16:47.936000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00026b720 items=0 ppid=3967 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435343937366631356339343563383937326431626634316665353161 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.936000 audit: BPF prog-id=157 op=LOAD Oct 2 19:16:47.936000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00026b768 items=0 ppid=3967 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435343937366631356339343563383937326431626634316665353161 Oct 2 19:16:47.937000 audit: BPF prog-id=157 op=UNLOAD Oct 2 19:16:47.937000 audit: BPF prog-id=156 op=UNLOAD Oct 2 19:16:47.937000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.937000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.937000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.937000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.937000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.937000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.937000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.937000 audit[4062]: AVC avc: denied { perfmon } for pid=4062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.937000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.937000 audit[4062]: AVC avc: denied { bpf } for pid=4062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:47.937000 audit: BPF prog-id=158 op=LOAD Oct 2 19:16:47.937000 audit[4062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00026bb78 items=0 ppid=3967 pid=4062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:47.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435343937366631356339343563383937326431626634316665353161 Oct 2 19:16:47.956192 env[1311]: time="2023-10-02T19:16:47.956147253Z" level=info msg="StartContainer for \"d54976f15c945c8972d1bf41fe51acbd750ed4acc65c1d60d4cc153882188abf\" returns successfully" Oct 2 19:16:48.135335 env[1311]: time="2023-10-02T19:16:48.135297141Z" level=info msg="StopPodSandbox for \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\"" Oct 2 19:16:48.178583 env[1311]: time="2023-10-02T19:16:48.178521592Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:16:48.184069 env[1311]: time="2023-10-02T19:16:48.184016262Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:16:48.184514 kubelet[2467]: E1002 19:16:48.184485 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:16:48.184625 kubelet[2467]: E1002 19:16:48.184541 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:16:48.184725 kubelet[2467]: E1002 19:16:48.184690 2467 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:16:48.185783 env[1311]: time="2023-10-02T19:16:48.185756484Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.179 [INFO][4107] k8s.go 576: Cleaning up netns ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Oct 2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.179 [INFO][4107] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" iface="eth0" netns="/var/run/netns/cni-e04acd40-825c-b5b6-0fca-f962179d0fc3" Oct 2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.179 [INFO][4107] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" iface="eth0" netns="/var/run/netns/cni-e04acd40-825c-b5b6-0fca-f962179d0fc3" Oct 2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.179 [INFO][4107] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" iface="eth0" netns="/var/run/netns/cni-e04acd40-825c-b5b6-0fca-f962179d0fc3" Oct 2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.179 [INFO][4107] k8s.go 583: Releasing IP address(es) ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Oct 2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.179 [INFO][4107] utils.go 196: Calico CNI releasing IP address ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Oct 2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.209 [INFO][4114] ipam_plugin.go 416: Releasing address using handleID ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:48.217864 env[1311]: time="2023-10-02T19:16:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:48.217864 env[1311]: time="2023-10-02T19:16:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.214 [WARNING][4114] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.214 [INFO][4114] ipam_plugin.go 444: Releasing address using workloadID ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:48.217864 env[1311]: time="2023-10-02T19:16:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:48.217864 env[1311]: 2023-10-02 19:16:48.216 [INFO][4107] k8s.go 589: Teardown processing complete. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Oct 2 19:16:48.219000 env[1311]: time="2023-10-02T19:16:48.218922806Z" level=info msg="TearDown network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\" successfully" Oct 2 19:16:48.219000 env[1311]: time="2023-10-02T19:16:48.218996207Z" level=info msg="StopPodSandbox for \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\" returns successfully" Oct 2 19:16:48.219547 env[1311]: time="2023-10-02T19:16:48.219518313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mdww6,Uid:6efed0db-4734-47a7-afef-8e4f010b2a81,Namespace:kube-system,Attempt:1,}" Oct 2 19:16:48.283701 systemd[1]: run-netns-cni\x2de04acd40\x2d825c\x2db5b6\x2d0fca\x2df962179d0fc3.mount: Deactivated successfully. Oct 2 19:16:48.330913 kubelet[2467]: I1002 19:16:48.330872 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-9tz2t" podStartSLOduration=41.33082973 pod.CreationTimestamp="2023-10-02 19:16:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:48.303038777 +0000 UTC m=+54.418220518" watchObservedRunningTime="2023-10-02 19:16:48.33082973 +0000 UTC m=+54.446011571" Oct 2 19:16:48.393000 audit[4162]: NETFILTER_CFG table=filter:121 family=2 entries=12 op=nft_register_rule pid=4162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:48.393000 audit[4162]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fffec47cea0 a2=0 a3=7fffec47ce8c items=0 ppid=2658 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:48.393000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:48.394000 audit[4162]: NETFILTER_CFG table=nat:122 family=2 entries=30 op=nft_register_rule pid=4162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:48.394000 audit[4162]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fffec47cea0 a2=0 a3=7fffec47ce8c items=0 ppid=2658 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:48.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:48.455347 systemd-networkd[1452]: cali8901d5a0345: Link UP Oct 2 19:16:48.455356 systemd-networkd[1452]: cali8901d5a0345: Gained carrier Oct 2 19:16:48.461000 audit[4191]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=4191 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:48.461000 audit[4191]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdfc3a5000 a2=0 a3=7ffdfc3a4fec items=0 ppid=2658 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:48.461000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:48.463000 audit[4191]: NETFILTER_CFG table=nat:124 family=2 entries=51 op=nft_register_chain pid=4191 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:48.463000 audit[4191]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffdfc3a5000 a2=0 a3=7ffdfc3a4fec items=0 ppid=2658 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:48.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.333 [INFO][4121] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0 coredns-787d4945fb- kube-system 6efed0db-4734-47a7-afef-8e4f010b2a81 708 0 2023-10-02 19:16:07 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-e4b0ec5c33 coredns-787d4945fb-mdww6 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8901d5a0345 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-" Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.334 [INFO][4121] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.400 [INFO][4144] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" HandleID="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.413 [INFO][4144] ipam_plugin.go 269: Auto assigning IP ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" HandleID="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000423f50), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-e4b0ec5c33", "pod":"coredns-787d4945fb-mdww6", "timestamp":"2023-10-02 19:16:48.40072682 +0000 UTC"}, Hostname:"ci-3510.3.0-a-e4b0ec5c33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:16:48.471451 env[1311]: time="2023-10-02T19:16:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:48.471451 env[1311]: time="2023-10-02T19:16:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.413 [INFO][4144] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-e4b0ec5c33' Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.414 [INFO][4144] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.418 [INFO][4144] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.423 [INFO][4144] ipam.go 489: Trying affinity for 192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.425 [INFO][4144] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.427 [INFO][4144] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.427 [INFO][4144] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.436 [INFO][4144] ipam.go 1682: Creating new handle: k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552 Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.440 [INFO][4144] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.445 [INFO][4144] ipam.go 1216: Successfully claimed IPs: [192.168.25.195/26] block=192.168.25.192/26 handle="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.445 [INFO][4144] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.195/26] handle="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:48.471451 env[1311]: time="2023-10-02T19:16:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:48.471451 env[1311]: 2023-10-02 19:16:48.446 [INFO][4144] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.25.195/26] IPv6=[] ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" HandleID="k8s-pod-network.e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:48.472328 env[1311]: 2023-10-02 19:16:48.447 [INFO][4121] k8s.go 383: Populated endpoint ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6efed0db-4734-47a7-afef-8e4f010b2a81", ResourceVersion:"708", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"", Pod:"coredns-787d4945fb-mdww6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8901d5a0345", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:48.472328 env[1311]: 2023-10-02 19:16:48.448 [INFO][4121] k8s.go 384: Calico CNI using IPs: [192.168.25.195/32] ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:48.472328 env[1311]: 2023-10-02 19:16:48.448 [INFO][4121] dataplane_linux.go 68: Setting the host side veth name to cali8901d5a0345 ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:48.472328 env[1311]: 2023-10-02 19:16:48.449 [INFO][4121] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:48.472328 env[1311]: 2023-10-02 19:16:48.453 [INFO][4121] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6efed0db-4734-47a7-afef-8e4f010b2a81", ResourceVersion:"708", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552", Pod:"coredns-787d4945fb-mdww6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8901d5a0345", MAC:"72:75:2d:17:04:bd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:48.472328 env[1311]: 2023-10-02 19:16:48.469 [INFO][4121] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552" Namespace="kube-system" Pod="coredns-787d4945fb-mdww6" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:48.486397 env[1311]: time="2023-10-02T19:16:48.486351610Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:16:48.490214 env[1311]: time="2023-10-02T19:16:48.490169958Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:16:48.490634 kubelet[2467]: E1002 19:16:48.490595 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:16:48.490726 kubelet[2467]: E1002 19:16:48.490664 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:16:48.490821 kubelet[2467]: E1002 19:16:48.490803 2467 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:16:48.490952 kubelet[2467]: E1002 19:16:48.490898 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:16:48.496298 env[1311]: time="2023-10-02T19:16:48.496203835Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:48.496298 env[1311]: time="2023-10-02T19:16:48.496247836Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:48.496298 env[1311]: time="2023-10-02T19:16:48.496262936Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:48.496000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:48.496000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00239bda0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:16:48.496000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:48.498004 env[1311]: time="2023-10-02T19:16:48.496591540Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552 pid=4212 runtime=io.containerd.runc.v2 Oct 2 19:16:48.509000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:48.509000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002505360 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:16:48.509000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:48.510000 audit[4225]: NETFILTER_CFG table=filter:125 family=2 entries=34 op=nft_register_chain pid=4225 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:16:48.510000 audit[4225]: SYSCALL arch=c000003e syscall=46 success=yes exit=17900 a0=3 a1=7fff482c47a0 a2=0 a3=7fff482c478c items=0 ppid=3629 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:48.510000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:16:48.528716 systemd[1]: Started cri-containerd-e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552.scope. Oct 2 19:16:48.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.539000 audit: BPF prog-id=159 op=LOAD Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4212 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:48.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535323735316233633065353031633866376166636635393837366337 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4212 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:48.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535323735316233633065353031633866376166636635393837366337 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit: BPF prog-id=160 op=LOAD Oct 2 19:16:48.540000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00039d7c0 items=0 ppid=4212 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:48.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535323735316233633065353031633866376166636635393837366337 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit: BPF prog-id=161 op=LOAD Oct 2 19:16:48.540000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00039d808 items=0 ppid=4212 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:48.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535323735316233633065353031633866376166636635393837366337 Oct 2 19:16:48.540000 audit: BPF prog-id=161 op=UNLOAD Oct 2 19:16:48.540000 audit: BPF prog-id=160 op=UNLOAD Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.540000 audit: BPF prog-id=162 op=LOAD Oct 2 19:16:48.540000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00039dc18 items=0 ppid=4212 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:48.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535323735316233633065353031633866376166636635393837366337 Oct 2 19:16:48.569437 env[1311]: time="2023-10-02T19:16:48.569401367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mdww6,Uid:6efed0db-4734-47a7-afef-8e4f010b2a81,Namespace:kube-system,Attempt:1,} returns sandbox id \"e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552\"" Oct 2 19:16:48.572339 env[1311]: time="2023-10-02T19:16:48.572301704Z" level=info msg="CreateContainer within sandbox \"e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:16:48.605517 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2957990756.mount: Deactivated successfully. Oct 2 19:16:48.621178 env[1311]: time="2023-10-02T19:16:48.621131125Z" level=info msg="CreateContainer within sandbox \"e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e2e2886ee9d5977fd1a614fb25400c4cac99fd6b928e759c359a6007882bcdf4\"" Oct 2 19:16:48.621887 env[1311]: time="2023-10-02T19:16:48.621846635Z" level=info msg="StartContainer for \"e2e2886ee9d5977fd1a614fb25400c4cac99fd6b928e759c359a6007882bcdf4\"" Oct 2 19:16:48.641303 systemd[1]: Started cri-containerd-e2e2886ee9d5977fd1a614fb25400c4cac99fd6b928e759c359a6007882bcdf4.scope. Oct 2 19:16:48.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.654000 audit: BPF prog-id=163 op=LOAD Oct 2 19:16:48.656000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.656000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4212 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:48.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532653238383665653964353937376664316136313466623235343030 Oct 2 19:16:48.656000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.656000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4212 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:48.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532653238383665653964353937376664316136313466623235343030 Oct 2 19:16:48.656000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.656000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.656000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.656000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.656000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.656000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.656000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.656000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.656000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.656000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.656000 audit: BPF prog-id=164 op=LOAD Oct 2 19:16:48.656000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009ae60 items=0 ppid=4212 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:48.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532653238383665653964353937376664316136313466623235343030 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit: BPF prog-id=165 op=LOAD Oct 2 19:16:48.657000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009aea8 items=0 ppid=4212 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:48.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532653238383665653964353937376664316136313466623235343030 Oct 2 19:16:48.657000 audit: BPF prog-id=165 op=UNLOAD Oct 2 19:16:48.657000 audit: BPF prog-id=164 op=UNLOAD Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { perfmon } for pid=4257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit[4257]: AVC avc: denied { bpf } for pid=4257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:48.657000 audit: BPF prog-id=166 op=LOAD Oct 2 19:16:48.657000 audit[4257]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009b2b8 items=0 ppid=4212 pid=4257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:48.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532653238383665653964353937376664316136313466623235343030 Oct 2 19:16:48.678707 env[1311]: time="2023-10-02T19:16:48.678629257Z" level=info msg="StartContainer for \"e2e2886ee9d5977fd1a614fb25400c4cac99fd6b928e759c359a6007882bcdf4\" returns successfully" Oct 2 19:16:49.132717 env[1311]: time="2023-10-02T19:16:49.132668616Z" level=info msg="StopPodSandbox for \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\"" Oct 2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.171 [INFO][4302] k8s.go 576: Cleaning up netns ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Oct 2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.171 [INFO][4302] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" iface="eth0" netns="/var/run/netns/cni-235d608d-c5ed-42a3-bc7f-4122185f3fcd" Oct 2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.171 [INFO][4302] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" iface="eth0" netns="/var/run/netns/cni-235d608d-c5ed-42a3-bc7f-4122185f3fcd" Oct 2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.171 [INFO][4302] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" iface="eth0" netns="/var/run/netns/cni-235d608d-c5ed-42a3-bc7f-4122185f3fcd" Oct 2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.171 [INFO][4302] k8s.go 583: Releasing IP address(es) ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Oct 2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.171 [INFO][4302] utils.go 196: Calico CNI releasing IP address ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Oct 2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.192 [INFO][4308] ipam_plugin.go 416: Releasing address using handleID ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:49.200097 env[1311]: time="2023-10-02T19:16:49Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:49.200097 env[1311]: time="2023-10-02T19:16:49Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.197 [WARNING][4308] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.197 [INFO][4308] ipam_plugin.go 444: Releasing address using workloadID ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:49.200097 env[1311]: time="2023-10-02T19:16:49Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:49.200097 env[1311]: 2023-10-02 19:16:49.199 [INFO][4302] k8s.go 589: Teardown processing complete. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Oct 2 19:16:49.200915 env[1311]: time="2023-10-02T19:16:49.200258165Z" level=info msg="TearDown network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\" successfully" Oct 2 19:16:49.200915 env[1311]: time="2023-10-02T19:16:49.200307866Z" level=info msg="StopPodSandbox for \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\" returns successfully" Oct 2 19:16:49.201317 env[1311]: time="2023-10-02T19:16:49.201283678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-z4r7k,Uid:51cd6516-73d5-4525-9aa3-c3b0c6013145,Namespace:calico-system,Attempt:1,}" Oct 2 19:16:49.233167 systemd-networkd[1452]: cali307092f28d3: Gained IPv6LL Oct 2 19:16:49.280057 systemd[1]: run-netns-cni\x2d235d608d\x2dc5ed\x2d42a3\x2dbc7f\x2d4122185f3fcd.mount: Deactivated successfully. Oct 2 19:16:49.301386 kubelet[2467]: E1002 19:16:49.300549 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:16:49.351625 kubelet[2467]: I1002 19:16:49.351589 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-mdww6" podStartSLOduration=42.351551766 pod.CreationTimestamp="2023-10-02 19:16:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:49.334701955 +0000 UTC m=+55.449883696" watchObservedRunningTime="2023-10-02 19:16:49.351551766 +0000 UTC m=+55.466733507" Oct 2 19:16:49.410028 systemd-networkd[1452]: caliaa057d8a91c: Link UP Oct 2 19:16:49.410039 systemd-networkd[1452]: caliaa057d8a91c: Gained carrier Oct 2 19:16:49.425265 systemd-networkd[1452]: calie3e9f3171ab: Gained IPv6LL Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.274 [INFO][4314] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0 calico-kube-controllers-69c848ddc6- calico-system 51cd6516-73d5-4525-9aa3-c3b0c6013145 731 0 2023-10-02 19:16:13 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:69c848ddc6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.0-a-e4b0ec5c33 calico-kube-controllers-69c848ddc6-z4r7k eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliaa057d8a91c [] []}} ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-" Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.274 [INFO][4314] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.342 [INFO][4326] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" HandleID="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.364 [INFO][4326] ipam_plugin.go 269: Auto assigning IP ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" HandleID="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00053a590), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-e4b0ec5c33", "pod":"calico-kube-controllers-69c848ddc6-z4r7k", "timestamp":"2023-10-02 19:16:49.341972846 +0000 UTC"}, Hostname:"ci-3510.3.0-a-e4b0ec5c33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:16:49.430903 env[1311]: time="2023-10-02T19:16:49Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:49.430903 env[1311]: time="2023-10-02T19:16:49Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.364 [INFO][4326] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-e4b0ec5c33' Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.375 [INFO][4326] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.384 [INFO][4326] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.387 [INFO][4326] ipam.go 489: Trying affinity for 192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.389 [INFO][4326] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.391 [INFO][4326] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.391 [INFO][4326] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.392 [INFO][4326] ipam.go 1682: Creating new handle: k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67 Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.396 [INFO][4326] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.402 [INFO][4326] ipam.go 1216: Successfully claimed IPs: [192.168.25.196/26] block=192.168.25.192/26 handle="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.402 [INFO][4326] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.196/26] handle="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:49.430903 env[1311]: time="2023-10-02T19:16:49Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:49.430903 env[1311]: 2023-10-02 19:16:49.402 [INFO][4326] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.25.196/26] IPv6=[] ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" HandleID="k8s-pod-network.9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:49.431789 env[1311]: 2023-10-02 19:16:49.403 [INFO][4314] k8s.go 383: Populated endpoint ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"51cd6516-73d5-4525-9aa3-c3b0c6013145", ResourceVersion:"731", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 13, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"", Pod:"calico-kube-controllers-69c848ddc6-z4r7k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.25.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaa057d8a91c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:49.431789 env[1311]: 2023-10-02 19:16:49.403 [INFO][4314] k8s.go 384: Calico CNI using IPs: [192.168.25.196/32] ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:49.431789 env[1311]: 2023-10-02 19:16:49.403 [INFO][4314] dataplane_linux.go 68: Setting the host side veth name to caliaa057d8a91c ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:49.431789 env[1311]: 2023-10-02 19:16:49.404 [INFO][4314] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:49.431789 env[1311]: 2023-10-02 19:16:49.408 [INFO][4314] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"51cd6516-73d5-4525-9aa3-c3b0c6013145", ResourceVersion:"731", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 13, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67", Pod:"calico-kube-controllers-69c848ddc6-z4r7k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.25.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaa057d8a91c", MAC:"9a:79:8d:36:8b:38", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:49.431789 env[1311]: 2023-10-02 19:16:49.429 [INFO][4314] k8s.go 489: Wrote updated endpoint to datastore ContainerID="9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-z4r7k" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:49.445000 audit[4369]: NETFILTER_CFG table=filter:126 family=2 entries=6 op=nft_register_rule pid=4369 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:49.445000 audit[4369]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdce00ef10 a2=0 a3=7ffdce00eefc items=0 ppid=2658 pid=4369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:49.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:49.453425 env[1311]: time="2023-10-02T19:16:49.453373946Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:49.453579 env[1311]: time="2023-10-02T19:16:49.453557348Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:49.453686 env[1311]: time="2023-10-02T19:16:49.453668150Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:49.453913 env[1311]: time="2023-10-02T19:16:49.453887352Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67 pid=4377 runtime=io.containerd.runc.v2 Oct 2 19:16:49.454000 audit[4369]: NETFILTER_CFG table=nat:127 family=2 entries=60 op=nft_register_rule pid=4369 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:49.454000 audit[4369]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffdce00ef10 a2=0 a3=7ffdce00eefc items=0 ppid=2658 pid=4369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:49.454000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:49.482514 systemd[1]: run-containerd-runc-k8s.io-9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67-runc.dEnO34.mount: Deactivated successfully. Oct 2 19:16:49.489022 systemd[1]: Started cri-containerd-9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67.scope. Oct 2 19:16:49.504000 audit[4406]: NETFILTER_CFG table=filter:128 family=2 entries=42 op=nft_register_chain pid=4406 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:16:49.504000 audit[4406]: SYSCALL arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7ffdab980660 a2=0 a3=7ffdab98064c items=0 ppid=3629 pid=4406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:49.504000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:16:49.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit: BPF prog-id=167 op=LOAD Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4377 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:49.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930303065306338666231343865633139346534656535303537323438 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4377 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:49.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930303065306338666231343865633139346534656535303537323438 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit: BPF prog-id=168 op=LOAD Oct 2 19:16:49.508000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003dc6f0 items=0 ppid=4377 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:49.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930303065306338666231343865633139346534656535303537323438 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit: BPF prog-id=169 op=LOAD Oct 2 19:16:49.508000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003dc738 items=0 ppid=4377 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:49.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930303065306338666231343865633139346534656535303537323438 Oct 2 19:16:49.508000 audit: BPF prog-id=169 op=UNLOAD Oct 2 19:16:49.508000 audit: BPF prog-id=168 op=UNLOAD Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:49.508000 audit: BPF prog-id=170 op=LOAD Oct 2 19:16:49.508000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003dcb48 items=0 ppid=4377 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:49.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930303065306338666231343865633139346534656535303537323438 Oct 2 19:16:49.542237 env[1311]: time="2023-10-02T19:16:49.542192762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-z4r7k,Uid:51cd6516-73d5-4525-9aa3-c3b0c6013145,Namespace:calico-system,Attempt:1,} returns sandbox id \"9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67\"" Oct 2 19:16:49.543799 env[1311]: time="2023-10-02T19:16:49.543773682Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:16:50.129187 systemd-networkd[1452]: cali8901d5a0345: Gained IPv6LL Oct 2 19:16:50.459000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:50.459000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011b99620 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:16:50.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:16:50.481000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:50.481000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00c18be90 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:16:50.481000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:16:50.493000 audit[4439]: NETFILTER_CFG table=filter:129 family=2 entries=6 op=nft_register_rule pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:50.493000 audit[4439]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffea5bfc080 a2=0 a3=7ffea5bfc06c items=0 ppid=2658 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:50.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:50.498000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:50.498000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:50.498000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0022737c0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:16:50.498000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:16:50.498000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c010a86030 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:16:50.498000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:16:50.513130 systemd-networkd[1452]: caliaa057d8a91c: Gained IPv6LL Oct 2 19:16:50.526000 audit[4439]: NETFILTER_CFG table=nat:130 family=2 entries=72 op=nft_register_chain pid=4439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:50.526000 audit[4439]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffea5bfc080 a2=0 a3=7ffea5bfc06c items=0 ppid=2658 pid=4439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:50.526000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:50.551000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:50.551000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:50.551000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c010a860c0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:16:50.551000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:16:50.551000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c002273dc0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:16:50.551000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:16:51.930447 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2763622732.mount: Deactivated successfully. Oct 2 19:16:53.071092 update_engine[1291]: I1002 19:16:53.071048 1291 prefs.cc:51] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Oct 2 19:16:53.071092 update_engine[1291]: I1002 19:16:53.071091 1291 prefs.cc:51] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Oct 2 19:16:53.071865 update_engine[1291]: I1002 19:16:53.071223 1291 prefs.cc:51] aleph-version not present in /var/lib/update_engine/prefs Oct 2 19:16:53.071865 update_engine[1291]: I1002 19:16:53.071733 1291 omaha_request_params.cc:62] Current group set to lts Oct 2 19:16:53.072027 update_engine[1291]: I1002 19:16:53.071924 1291 update_attempter.cc:495] Already updated boot flags. Skipping. Oct 2 19:16:53.072027 update_engine[1291]: I1002 19:16:53.071934 1291 update_attempter.cc:638] Scheduling an action processor start. Oct 2 19:16:53.072027 update_engine[1291]: I1002 19:16:53.071969 1291 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Oct 2 19:16:53.072027 update_engine[1291]: I1002 19:16:53.072001 1291 prefs.cc:51] previous-version not present in /var/lib/update_engine/prefs Oct 2 19:16:53.072181 update_engine[1291]: I1002 19:16:53.072068 1291 omaha_request_action.cc:268] Posting an Omaha request to https://public.update.flatcar-linux.net/v1/update/ Oct 2 19:16:53.072181 update_engine[1291]: I1002 19:16:53.072075 1291 omaha_request_action.cc:269] Request: <?xml version="1.0" encoding="UTF-8"?> Oct 2 19:16:53.072181 update_engine[1291]: <request protocol="3.0" version="update_engine-0.4.10" updaterversion="update_engine-0.4.10" installsource="scheduler" ismachine="1"> Oct 2 19:16:53.072181 update_engine[1291]: <os version="Chateau" platform="CoreOS" sp="3510.3.0_x86_64"></os> Oct 2 19:16:53.072181 update_engine[1291]: <app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" version="3510.3.0" track="lts" bootid="{f6c5ec29-90b4-41ac-a988-84d2a9e7b5da}" oem="azure" oemversion="2.6.0.2-r1" alephversion="3510.3.0" machineid="fbdf4143f308436287d96f9ed77da498" machinealias="" lang="en-US" board="amd64-usr" hardware_class="" delta_okay="false" > Oct 2 19:16:53.072181 update_engine[1291]: <ping active="1"></ping> Oct 2 19:16:53.072181 update_engine[1291]: <updatecheck></updatecheck> Oct 2 19:16:53.072181 update_engine[1291]: <event eventtype="3" eventresult="2" previousversion="0.0.0.0"></event> Oct 2 19:16:53.072181 update_engine[1291]: </app> Oct 2 19:16:53.072181 update_engine[1291]: </request> Oct 2 19:16:53.072181 update_engine[1291]: I1002 19:16:53.072081 1291 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Oct 2 19:16:53.073472 locksmithd[1385]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Oct 2 19:16:53.074143 update_engine[1291]: I1002 19:16:53.074124 1291 libcurl_http_fetcher.cc:174] Setting up curl options for HTTPS Oct 2 19:16:53.074443 update_engine[1291]: I1002 19:16:53.074426 1291 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Oct 2 19:16:53.303652 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.jlDR0a.mount: Deactivated successfully. Oct 2 19:16:53.602000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:53.606867 kernel: kauditd_printk_skb: 392 callbacks suppressed Oct 2 19:16:53.606979 kernel: audit: type=1400 audit(1696274213.602:1287): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:53.602000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:53.642617 kernel: audit: type=1400 audit(1696274213.602:1286): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:53.602000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002832bc0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:16:53.663894 kernel: audit: type=1300 audit(1696274213.602:1287): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002832bc0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:16:53.602000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:53.603000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:53.698490 kernel: audit: type=1327 audit(1696274213.602:1287): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:53.698584 kernel: audit: type=1400 audit(1696274213.603:1288): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:53.698608 kernel: audit: type=1300 audit(1696274213.603:1288): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002832de0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:16:53.603000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002832de0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:16:53.603000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:53.740185 kernel: audit: type=1327 audit(1696274213.603:1288): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:53.603000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:53.756631 kernel: audit: type=1400 audit(1696274213.603:1289): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:16:53.756716 kernel: audit: type=1300 audit(1696274213.603:1289): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002832e00 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:16:53.603000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002832e00 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:16:53.603000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:53.795711 kernel: audit: type=1327 audit(1696274213.603:1289): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:53.602000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002964000 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:16:53.602000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:16:54.013131 env[1311]: time="2023-10-02T19:16:54.013086803Z" level=info msg="StopPodSandbox for \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\"" Oct 2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.122 [WARNING][4492] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"cf67d82a-6eeb-4bf3-adec-800e8c7dc360", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b", Pod:"coredns-787d4945fb-9tz2t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie3e9f3171ab", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.123 [INFO][4492] k8s.go 576: Cleaning up netns ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Oct 2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.123 [INFO][4492] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" iface="eth0" netns="" Oct 2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.123 [INFO][4492] k8s.go 583: Releasing IP address(es) ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Oct 2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.123 [INFO][4492] utils.go 196: Calico CNI releasing IP address ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Oct 2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.170 [INFO][4499] ipam_plugin.go 416: Releasing address using handleID ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:54.183990 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:54.183990 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.179 [WARNING][4499] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.179 [INFO][4499] ipam_plugin.go 444: Releasing address using workloadID ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:54.183990 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:54.183990 env[1311]: 2023-10-02 19:16:54.182 [INFO][4492] k8s.go 589: Teardown processing complete. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Oct 2 19:16:54.187042 update_engine[1291]: I1002 19:16:54.186486 1291 prefs.cc:51] update-server-cert-0-2 not present in /var/lib/update_engine/prefs Oct 2 19:16:54.187042 update_engine[1291]: I1002 19:16:54.186725 1291 prefs.cc:51] update-server-cert-0-1 not present in /var/lib/update_engine/prefs Oct 2 19:16:54.187042 update_engine[1291]: I1002 19:16:54.186877 1291 prefs.cc:51] update-server-cert-0-0 not present in /var/lib/update_engine/prefs Oct 2 19:16:54.188312 env[1311]: time="2023-10-02T19:16:54.188267075Z" level=info msg="TearDown network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\" successfully" Oct 2 19:16:54.188438 env[1311]: time="2023-10-02T19:16:54.188419077Z" level=info msg="StopPodSandbox for \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\" returns successfully" Oct 2 19:16:54.189217 env[1311]: time="2023-10-02T19:16:54.189187386Z" level=info msg="RemovePodSandbox for \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\"" Oct 2 19:16:54.189383 env[1311]: time="2023-10-02T19:16:54.189337387Z" level=info msg="Forcibly stopping sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\"" Oct 2 19:16:54.276465 update_engine[1291]: I1002 19:16:54.275637 1291 libcurl_http_fetcher.cc:263] HTTP response code: 200 Oct 2 19:16:54.278616 update_engine[1291]: I1002 19:16:54.278515 1291 libcurl_http_fetcher.cc:320] Transfer completed (200), 314 bytes downloaded Oct 2 19:16:54.278829 update_engine[1291]: I1002 19:16:54.278540 1291 omaha_request_action.cc:619] Omaha request response: <?xml version="1.0" encoding="UTF-8"?> Oct 2 19:16:54.278829 update_engine[1291]: <response protocol="3.0" server="nebraska"><daystart elapsed_seconds="0"></daystart><app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" status="ok"><ping status="ok"></ping><updatecheck status="noupdate"><urls></urls></updatecheck><event status="ok"></event></app></response> Oct 2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.282 [WARNING][4521] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"cf67d82a-6eeb-4bf3-adec-800e8c7dc360", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"c133c875971206de57397066614e6bbca859304c48043c53658f77e93b25963b", Pod:"coredns-787d4945fb-9tz2t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie3e9f3171ab", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.282 [INFO][4521] k8s.go 576: Cleaning up netns ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Oct 2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.283 [INFO][4521] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" iface="eth0" netns="" Oct 2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.283 [INFO][4521] k8s.go 583: Releasing IP address(es) ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Oct 2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.283 [INFO][4521] utils.go 196: Calico CNI releasing IP address ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Oct 2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.335 [INFO][4527] ipam_plugin.go 416: Releasing address using handleID ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:54.350147 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:54.350147 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.343 [WARNING][4527] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.343 [INFO][4527] ipam_plugin.go 444: Releasing address using workloadID ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" HandleID="k8s-pod-network.28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--9tz2t-eth0" Oct 2 19:16:54.350147 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:54.350147 env[1311]: 2023-10-02 19:16:54.348 [INFO][4521] k8s.go 589: Teardown processing complete. ContainerID="28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e" Oct 2 19:16:54.350808 env[1311]: time="2023-10-02T19:16:54.350190189Z" level=info msg="TearDown network for sandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\" successfully" Oct 2 19:16:54.360910 env[1311]: time="2023-10-02T19:16:54.360860616Z" level=info msg="RemovePodSandbox \"28671e0a775c1542a9ba86969f001e7744fb0f21fd546e3021e9f2900d193f6e\" returns successfully" Oct 2 19:16:54.361556 env[1311]: time="2023-10-02T19:16:54.361518223Z" level=info msg="StopPodSandbox for \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\"" Oct 2 19:16:54.370030 update_engine[1291]: I1002 19:16:54.369988 1291 omaha_request_action.cc:409] No update. Oct 2 19:16:54.370030 update_engine[1291]: I1002 19:16:54.370026 1291 action_processor.cc:82] ActionProcessor::ActionComplete: finished OmahaRequestAction, starting OmahaResponseHandlerAction Oct 2 19:16:54.370030 update_engine[1291]: I1002 19:16:54.370033 1291 omaha_response_handler_action.cc:36] There are no updates. Aborting. Oct 2 19:16:54.370030 update_engine[1291]: I1002 19:16:54.370038 1291 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaResponseHandlerAction action failed. Aborting processing. Oct 2 19:16:54.370262 update_engine[1291]: I1002 19:16:54.370043 1291 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaResponseHandlerAction Oct 2 19:16:54.370262 update_engine[1291]: I1002 19:16:54.370045 1291 update_attempter.cc:302] Processing Done. Oct 2 19:16:54.370262 update_engine[1291]: I1002 19:16:54.370064 1291 update_attempter.cc:338] No update. Oct 2 19:16:54.370262 update_engine[1291]: I1002 19:16:54.370079 1291 update_check_scheduler.cc:74] Next update check in 48m42s Oct 2 19:16:54.370744 locksmithd[1385]: LastCheckedTime=1696274214 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Oct 2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.448 [WARNING][4548] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"51cdf950-fd56-4099-b416-942f3ef06aee", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 32, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a", Pod:"csi-node-driver-484pr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali307092f28d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.448 [INFO][4548] k8s.go 576: Cleaning up netns ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Oct 2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.448 [INFO][4548] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" iface="eth0" netns="" Oct 2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.448 [INFO][4548] k8s.go 583: Releasing IP address(es) ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Oct 2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.448 [INFO][4548] utils.go 196: Calico CNI releasing IP address ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Oct 2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.492 [INFO][4554] ipam_plugin.go 416: Releasing address using handleID ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:54.511121 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:54.511121 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.500 [WARNING][4554] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.500 [INFO][4554] ipam_plugin.go 444: Releasing address using workloadID ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:54.511121 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:54.511121 env[1311]: 2023-10-02 19:16:54.508 [INFO][4548] k8s.go 589: Teardown processing complete. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Oct 2 19:16:54.511910 env[1311]: time="2023-10-02T19:16:54.511867401Z" level=info msg="TearDown network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\" successfully" Oct 2 19:16:54.512067 env[1311]: time="2023-10-02T19:16:54.512043703Z" level=info msg="StopPodSandbox for \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\" returns successfully" Oct 2 19:16:54.513411 env[1311]: time="2023-10-02T19:16:54.513376219Z" level=info msg="RemovePodSandbox for \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\"" Oct 2 19:16:54.513596 env[1311]: time="2023-10-02T19:16:54.513546121Z" level=info msg="Forcibly stopping sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\"" Oct 2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.607 [WARNING][4576] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"51cdf950-fd56-4099-b416-942f3ef06aee", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 32, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"50809e963e5cc0c8e7b9badcd1fc908b10f14dbdac80d9d64e14f1dd4648177a", Pod:"csi-node-driver-484pr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.25.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali307092f28d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.608 [INFO][4576] k8s.go 576: Cleaning up netns ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Oct 2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.611 [INFO][4576] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" iface="eth0" netns="" Oct 2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.611 [INFO][4576] k8s.go 583: Releasing IP address(es) ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Oct 2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.611 [INFO][4576] utils.go 196: Calico CNI releasing IP address ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Oct 2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.642 [INFO][4582] ipam_plugin.go 416: Releasing address using handleID ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:54.652518 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:54.652518 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.649 [WARNING][4582] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.649 [INFO][4582] ipam_plugin.go 444: Releasing address using workloadID ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" HandleID="k8s-pod-network.97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-csi--node--driver--484pr-eth0" Oct 2 19:16:54.652518 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:54.652518 env[1311]: 2023-10-02 19:16:54.651 [INFO][4576] k8s.go 589: Teardown processing complete. ContainerID="97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f" Oct 2 19:16:54.653238 env[1311]: time="2023-10-02T19:16:54.652543864Z" level=info msg="TearDown network for sandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\" successfully" Oct 2 19:16:54.669543 env[1311]: time="2023-10-02T19:16:54.669500765Z" level=info msg="RemovePodSandbox \"97fbc1a31e2e52628e0b39289d9f45a6b01f1aec6332fcd097bd02e74a5b4d9f\" returns successfully" Oct 2 19:16:54.670081 env[1311]: time="2023-10-02T19:16:54.670049871Z" level=info msg="StopPodSandbox for \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\"" Oct 2 19:16:54.746320 env[1311]: time="2023-10-02T19:16:54.746268873Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:54.754851 env[1311]: time="2023-10-02T19:16:54.754806174Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:54.762803 env[1311]: time="2023-10-02T19:16:54.762766668Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.732 [WARNING][4603] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6efed0db-4734-47a7-afef-8e4f010b2a81", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552", Pod:"coredns-787d4945fb-mdww6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8901d5a0345", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.732 [INFO][4603] k8s.go 576: Cleaning up netns ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Oct 2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.732 [INFO][4603] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" iface="eth0" netns="" Oct 2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.732 [INFO][4603] k8s.go 583: Releasing IP address(es) ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Oct 2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.732 [INFO][4603] utils.go 196: Calico CNI releasing IP address ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Oct 2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.753 [INFO][4609] ipam_plugin.go 416: Releasing address using handleID ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:54.765591 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:54.765591 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.761 [WARNING][4609] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.761 [INFO][4609] ipam_plugin.go 444: Releasing address using workloadID ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:54.765591 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:54.765591 env[1311]: 2023-10-02 19:16:54.763 [INFO][4603] k8s.go 589: Teardown processing complete. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Oct 2 19:16:54.766217 env[1311]: time="2023-10-02T19:16:54.765608701Z" level=info msg="TearDown network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\" successfully" Oct 2 19:16:54.766217 env[1311]: time="2023-10-02T19:16:54.765634502Z" level=info msg="StopPodSandbox for \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\" returns successfully" Oct 2 19:16:54.766217 env[1311]: time="2023-10-02T19:16:54.766114307Z" level=info msg="RemovePodSandbox for \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\"" Oct 2 19:16:54.766217 env[1311]: time="2023-10-02T19:16:54.766147708Z" level=info msg="Forcibly stopping sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\"" Oct 2 19:16:54.769139 env[1311]: time="2023-10-02T19:16:54.769100743Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:16:54.769529 env[1311]: time="2023-10-02T19:16:54.769498947Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 19:16:54.774073 env[1311]: time="2023-10-02T19:16:54.774041901Z" level=info msg="CreateContainer within sandbox \"9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:16:54.804781 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2884014475.mount: Deactivated successfully. Oct 2 19:16:54.814863 env[1311]: time="2023-10-02T19:16:54.814804783Z" level=info msg="CreateContainer within sandbox \"9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef\"" Oct 2 19:16:54.817310 env[1311]: time="2023-10-02T19:16:54.815760194Z" level=info msg="StartContainer for \"4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef\"" Oct 2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.813 [WARNING][4630] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"6efed0db-4734-47a7-afef-8e4f010b2a81", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 7, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"e52751b3c0e501c8f7afcf59876c743d64dee7deee4b2459198a7e03ba968552", Pod:"coredns-787d4945fb-mdww6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.25.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8901d5a0345", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.813 [INFO][4630] k8s.go 576: Cleaning up netns ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Oct 2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.814 [INFO][4630] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" iface="eth0" netns="" Oct 2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.814 [INFO][4630] k8s.go 583: Releasing IP address(es) ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Oct 2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.814 [INFO][4630] utils.go 196: Calico CNI releasing IP address ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Oct 2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.846 [INFO][4637] ipam_plugin.go 416: Releasing address using handleID ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:54.865547 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:54.865547 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.853 [WARNING][4637] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.853 [INFO][4637] ipam_plugin.go 444: Releasing address using workloadID ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" HandleID="k8s-pod-network.88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-coredns--787d4945fb--mdww6-eth0" Oct 2 19:16:54.865547 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:54.865547 env[1311]: 2023-10-02 19:16:54.863 [INFO][4630] k8s.go 589: Teardown processing complete. ContainerID="88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44" Oct 2 19:16:54.866252 env[1311]: time="2023-10-02T19:16:54.865583484Z" level=info msg="TearDown network for sandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\" successfully" Oct 2 19:16:54.869181 systemd[1]: Started cri-containerd-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef.scope. Oct 2 19:16:54.878164 env[1311]: time="2023-10-02T19:16:54.878108632Z" level=info msg="RemovePodSandbox \"88a2f0c1686e353163675970b880d057f0802c8bbc68fea0153277b89cb42b44\" returns successfully" Oct 2 19:16:54.878630 env[1311]: time="2023-10-02T19:16:54.878582637Z" level=info msg="StopPodSandbox for \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\"" Oct 2 19:16:54.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.887000 audit: BPF prog-id=171 op=LOAD Oct 2 19:16:54.888000 audit[4648]: AVC avc: denied { bpf } for pid=4648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.888000 audit[4648]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4377 pid=4648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:54.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466653638353664303838316263336534393030643461373935383437 Oct 2 19:16:54.888000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.888000 audit[4648]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4377 pid=4648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:54.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466653638353664303838316263336534393030643461373935383437 Oct 2 19:16:54.888000 audit[4648]: AVC avc: denied { bpf } for pid=4648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.888000 audit[4648]: AVC avc: denied { bpf } for pid=4648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.888000 audit[4648]: AVC avc: denied { bpf } for pid=4648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.888000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.888000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.888000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.888000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.888000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.888000 audit[4648]: AVC avc: denied { bpf } for pid=4648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.888000 audit[4648]: AVC avc: denied { bpf } for pid=4648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.888000 audit: BPF prog-id=172 op=LOAD Oct 2 19:16:54.888000 audit[4648]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000094c50 items=0 ppid=4377 pid=4648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:54.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466653638353664303838316263336534393030643461373935383437 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { bpf } for pid=4648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { bpf } for pid=4648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { bpf } for pid=4648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { bpf } for pid=4648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit: BPF prog-id=173 op=LOAD Oct 2 19:16:54.889000 audit[4648]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000094c98 items=0 ppid=4377 pid=4648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:54.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466653638353664303838316263336534393030643461373935383437 Oct 2 19:16:54.889000 audit: BPF prog-id=173 op=UNLOAD Oct 2 19:16:54.889000 audit: BPF prog-id=172 op=UNLOAD Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { bpf } for pid=4648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { bpf } for pid=4648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { bpf } for pid=4648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { perfmon } for pid=4648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { bpf } for pid=4648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit[4648]: AVC avc: denied { bpf } for pid=4648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:54.889000 audit: BPF prog-id=174 op=LOAD Oct 2 19:16:54.889000 audit[4648]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000950a8 items=0 ppid=4377 pid=4648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:54.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466653638353664303838316263336534393030643461373935383437 Oct 2 19:16:54.920226 env[1311]: time="2023-10-02T19:16:54.917078192Z" level=info msg="StartContainer for \"4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef\" returns successfully" Oct 2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.942 [WARNING][4682] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"51cd6516-73d5-4525-9aa3-c3b0c6013145", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 13, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67", Pod:"calico-kube-controllers-69c848ddc6-z4r7k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.25.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaa057d8a91c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.942 [INFO][4682] k8s.go 576: Cleaning up netns ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Oct 2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.942 [INFO][4682] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" iface="eth0" netns="" Oct 2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.942 [INFO][4682] k8s.go 583: Releasing IP address(es) ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Oct 2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.942 [INFO][4682] utils.go 196: Calico CNI releasing IP address ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Oct 2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.975 [INFO][4699] ipam_plugin.go 416: Releasing address using handleID ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:54.995427 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:54.995427 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.985 [WARNING][4699] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.985 [INFO][4699] ipam_plugin.go 444: Releasing address using workloadID ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:54.995427 env[1311]: time="2023-10-02T19:16:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:54.995427 env[1311]: 2023-10-02 19:16:54.994 [INFO][4682] k8s.go 589: Teardown processing complete. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Oct 2 19:16:54.996326 env[1311]: time="2023-10-02T19:16:54.996286929Z" level=info msg="TearDown network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\" successfully" Oct 2 19:16:54.996428 env[1311]: time="2023-10-02T19:16:54.996405730Z" level=info msg="StopPodSandbox for \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\" returns successfully" Oct 2 19:16:54.997072 env[1311]: time="2023-10-02T19:16:54.997041938Z" level=info msg="RemovePodSandbox for \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\"" Oct 2 19:16:54.997346 env[1311]: time="2023-10-02T19:16:54.997299541Z" level=info msg="Forcibly stopping sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\"" Oct 2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.061 [WARNING][4721] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"51cd6516-73d5-4525-9aa3-c3b0c6013145", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 13, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"9000e0c8fb148ec194e4ee505724800e3d41b55a849a71debf42be9038d7dd67", Pod:"calico-kube-controllers-69c848ddc6-z4r7k", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.25.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaa057d8a91c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.061 [INFO][4721] k8s.go 576: Cleaning up netns ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Oct 2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.061 [INFO][4721] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" iface="eth0" netns="" Oct 2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.061 [INFO][4721] k8s.go 583: Releasing IP address(es) ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Oct 2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.061 [INFO][4721] utils.go 196: Calico CNI releasing IP address ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Oct 2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.091 [INFO][4727] ipam_plugin.go 416: Releasing address using handleID ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:55.104289 env[1311]: time="2023-10-02T19:16:55Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:55.104289 env[1311]: time="2023-10-02T19:16:55Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.100 [WARNING][4727] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.101 [INFO][4727] ipam_plugin.go 444: Releasing address using workloadID ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" HandleID="k8s-pod-network.143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--kube--controllers--69c848ddc6--z4r7k-eth0" Oct 2 19:16:55.104289 env[1311]: time="2023-10-02T19:16:55Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:55.104289 env[1311]: 2023-10-02 19:16:55.103 [INFO][4721] k8s.go 589: Teardown processing complete. ContainerID="143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d" Oct 2 19:16:55.105329 env[1311]: time="2023-10-02T19:16:55.105280604Z" level=info msg="TearDown network for sandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\" successfully" Oct 2 19:16:55.131250 env[1311]: time="2023-10-02T19:16:55.131196307Z" level=info msg="RemovePodSandbox \"143fed2ccc86dd29507cc02e6dae41dbc82134951db385883dbf80655248009d\" returns successfully" Oct 2 19:16:55.405085 kubelet[2467]: I1002 19:16:55.404169 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-69c848ddc6-z4r7k" podStartSLOduration=-9.223371994450651e+09 pod.CreationTimestamp="2023-10-02 19:16:13 +0000 UTC" firstStartedPulling="2023-10-02 19:16:49.543489878 +0000 UTC m=+55.658671619" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:16:55.345242709 +0000 UTC m=+61.460424550" watchObservedRunningTime="2023-10-02 19:16:55.404125097 +0000 UTC m=+61.519306938" Oct 2 19:16:55.798690 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.RUEq0f.mount: Deactivated successfully. Oct 2 19:16:57.390245 kubelet[2467]: I1002 19:16:57.390205 2467 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:16:57.397156 systemd[1]: Created slice kubepods-besteffort-pod565fa6da_ca7f_46dc_99b0_bf7e5cab228f.slice. Oct 2 19:16:57.414365 kubelet[2467]: I1002 19:16:57.414329 2467 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:16:57.421343 systemd[1]: Created slice kubepods-besteffort-pod57e4bdff_509a_4176_905b_82f7b771260a.slice. Oct 2 19:16:57.474909 kubelet[2467]: I1002 19:16:57.474870 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8p57v\" (UniqueName: \"kubernetes.io/projected/57e4bdff-509a-4176-905b-82f7b771260a-kube-api-access-8p57v\") pod \"calico-apiserver-5cd4d54db4-89fvv\" (UID: \"57e4bdff-509a-4176-905b-82f7b771260a\") " pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" Oct 2 19:16:57.475134 kubelet[2467]: I1002 19:16:57.474938 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ltg65\" (UniqueName: \"kubernetes.io/projected/565fa6da-ca7f-46dc-99b0-bf7e5cab228f-kube-api-access-ltg65\") pod \"calico-apiserver-5cd4d54db4-twr8h\" (UID: \"565fa6da-ca7f-46dc-99b0-bf7e5cab228f\") " pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" Oct 2 19:16:57.475134 kubelet[2467]: I1002 19:16:57.475027 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/57e4bdff-509a-4176-905b-82f7b771260a-calico-apiserver-certs\") pod \"calico-apiserver-5cd4d54db4-89fvv\" (UID: \"57e4bdff-509a-4176-905b-82f7b771260a\") " pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" Oct 2 19:16:57.475134 kubelet[2467]: I1002 19:16:57.475079 2467 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/565fa6da-ca7f-46dc-99b0-bf7e5cab228f-calico-apiserver-certs\") pod \"calico-apiserver-5cd4d54db4-twr8h\" (UID: \"565fa6da-ca7f-46dc-99b0-bf7e5cab228f\") " pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" Oct 2 19:16:57.483000 audit[4778]: NETFILTER_CFG table=filter:131 family=2 entries=7 op=nft_register_rule pid=4778 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:57.483000 audit[4778]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fffbb06bf00 a2=0 a3=7fffbb06beec items=0 ppid=2658 pid=4778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:57.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:57.493000 audit[4778]: NETFILTER_CFG table=nat:132 family=2 entries=78 op=nft_register_rule pid=4778 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:57.493000 audit[4778]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fffbb06bf00 a2=0 a3=7fffbb06beec items=0 ppid=2658 pid=4778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:57.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:57.568000 audit[4806]: NETFILTER_CFG table=filter:133 family=2 entries=8 op=nft_register_rule pid=4806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:57.568000 audit[4806]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffefa1fa4d0 a2=0 a3=7ffefa1fa4bc items=0 ppid=2658 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:57.568000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:57.572000 audit[4806]: NETFILTER_CFG table=nat:134 family=2 entries=78 op=nft_register_rule pid=4806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:57.572000 audit[4806]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffefa1fa4d0 a2=0 a3=7ffefa1fa4bc items=0 ppid=2658 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:57.572000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:57.704065 env[1311]: time="2023-10-02T19:16:57.703906270Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cd4d54db4-twr8h,Uid:565fa6da-ca7f-46dc-99b0-bf7e5cab228f,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:16:57.727730 env[1311]: time="2023-10-02T19:16:57.727687041Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cd4d54db4-89fvv,Uid:57e4bdff-509a-4176-905b-82f7b771260a,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:16:57.914977 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:16:57.915107 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid5f5573b2c5: link becomes ready Oct 2 19:16:57.924546 systemd-networkd[1452]: calid5f5573b2c5: Link UP Oct 2 19:16:57.924556 systemd-networkd[1452]: calid5f5573b2c5: Gained carrier Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.790 [INFO][4811] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0 calico-apiserver-5cd4d54db4- calico-apiserver 565fa6da-ca7f-46dc-99b0-bf7e5cab228f 820 0 2023-10-02 19:16:57 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5cd4d54db4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-e4b0ec5c33 calico-apiserver-5cd4d54db4-twr8h eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid5f5573b2c5 [] []}} ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-" Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.790 [INFO][4811] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0" Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.859 [INFO][4834] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" HandleID="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0" Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.870 [INFO][4834] ipam_plugin.go 269: Auto assigning IP ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" HandleID="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000417cb0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-e4b0ec5c33", "pod":"calico-apiserver-5cd4d54db4-twr8h", "timestamp":"2023-10-02 19:16:57.859969354 +0000 UTC"}, Hostname:"ci-3510.3.0-a-e4b0ec5c33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:16:57.935653 env[1311]: time="2023-10-02T19:16:57Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:57.935653 env[1311]: time="2023-10-02T19:16:57Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.872 [INFO][4834] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-e4b0ec5c33' Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.873 [INFO][4834] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.877 [INFO][4834] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.885 [INFO][4834] ipam.go 489: Trying affinity for 192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.887 [INFO][4834] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.893 [INFO][4834] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.893 [INFO][4834] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.894 [INFO][4834] ipam.go 1682: Creating new handle: k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8 Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.898 [INFO][4834] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.902 [INFO][4834] ipam.go 1216: Successfully claimed IPs: [192.168.25.197/26] block=192.168.25.192/26 handle="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.902 [INFO][4834] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.197/26] handle="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:57.935653 env[1311]: time="2023-10-02T19:16:57Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:57.935653 env[1311]: 2023-10-02 19:16:57.902 [INFO][4834] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.25.197/26] IPv6=[] ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" HandleID="k8s-pod-network.11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0" Oct 2 19:16:57.936569 env[1311]: 2023-10-02 19:16:57.903 [INFO][4811] k8s.go 383: Populated endpoint ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0", GenerateName:"calico-apiserver-5cd4d54db4-", Namespace:"calico-apiserver", SelfLink:"", UID:"565fa6da-ca7f-46dc-99b0-bf7e5cab228f", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 57, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cd4d54db4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"", Pod:"calico-apiserver-5cd4d54db4-twr8h", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.25.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid5f5573b2c5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:57.936569 env[1311]: 2023-10-02 19:16:57.903 [INFO][4811] k8s.go 384: Calico CNI using IPs: [192.168.25.197/32] ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0" Oct 2 19:16:57.936569 env[1311]: 2023-10-02 19:16:57.903 [INFO][4811] dataplane_linux.go 68: Setting the host side veth name to calid5f5573b2c5 ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0" Oct 2 19:16:57.936569 env[1311]: 2023-10-02 19:16:57.916 [INFO][4811] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0" Oct 2 19:16:57.936569 env[1311]: 2023-10-02 19:16:57.924 [INFO][4811] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0", GenerateName:"calico-apiserver-5cd4d54db4-", Namespace:"calico-apiserver", SelfLink:"", UID:"565fa6da-ca7f-46dc-99b0-bf7e5cab228f", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 57, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cd4d54db4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8", Pod:"calico-apiserver-5cd4d54db4-twr8h", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.25.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid5f5573b2c5", MAC:"3a:d2:77:a9:de:19", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:57.936569 env[1311]: 2023-10-02 19:16:57.933 [INFO][4811] k8s.go 489: Wrote updated endpoint to datastore ContainerID="11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-twr8h" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--twr8h-eth0" Oct 2 19:16:57.967936 env[1311]: time="2023-10-02T19:16:57.967797787Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:57.968190 env[1311]: time="2023-10-02T19:16:57.968160991Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:57.968328 env[1311]: time="2023-10-02T19:16:57.968305092Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:57.968589 env[1311]: time="2023-10-02T19:16:57.968559095Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8 pid=4866 runtime=io.containerd.runc.v2 Oct 2 19:16:57.996018 systemd[1]: Started cri-containerd-11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8.scope. Oct 2 19:16:58.001004 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali56e6bbb99a7: link becomes ready Oct 2 19:16:58.010151 systemd-networkd[1452]: cali56e6bbb99a7: Link UP Oct 2 19:16:58.010160 systemd-networkd[1452]: cali56e6bbb99a7: Gained carrier Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.825 [INFO][4820] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0 calico-apiserver-5cd4d54db4- calico-apiserver 57e4bdff-509a-4176-905b-82f7b771260a 825 0 2023-10-02 19:16:57 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5cd4d54db4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-e4b0ec5c33 calico-apiserver-5cd4d54db4-89fvv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali56e6bbb99a7 [] []}} ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-" Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.825 [INFO][4820] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0" Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.891 [INFO][4840] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" HandleID="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0" Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.916 [INFO][4840] ipam_plugin.go 269: Auto assigning IP ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" HandleID="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a710), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-e4b0ec5c33", "pod":"calico-apiserver-5cd4d54db4-89fvv", "timestamp":"2023-10-02 19:16:57.891387913 +0000 UTC"}, Hostname:"ci-3510.3.0-a-e4b0ec5c33", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:16:58.024663 env[1311]: time="2023-10-02T19:16:57Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:16:58.024663 env[1311]: time="2023-10-02T19:16:57Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.917 [INFO][4840] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-e4b0ec5c33' Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.918 [INFO][4840] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.948 [INFO][4840] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.957 [INFO][4840] ipam.go 489: Trying affinity for 192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.959 [INFO][4840] ipam.go 155: Attempting to load block cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.962 [INFO][4840] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.25.192/26 host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.962 [INFO][4840] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.25.192/26 handle="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.964 [INFO][4840] ipam.go 1682: Creating new handle: k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97 Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.972 [INFO][4840] ipam.go 1203: Writing block in order to claim IPs block=192.168.25.192/26 handle="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.980 [INFO][4840] ipam.go 1216: Successfully claimed IPs: [192.168.25.198/26] block=192.168.25.192/26 handle="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.980 [INFO][4840] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.25.198/26] handle="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" host="ci-3510.3.0-a-e4b0ec5c33" Oct 2 19:16:58.024663 env[1311]: time="2023-10-02T19:16:57Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:16:58.024663 env[1311]: 2023-10-02 19:16:57.980 [INFO][4840] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.25.198/26] IPv6=[] ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" HandleID="k8s-pod-network.eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Workload="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0" Oct 2 19:16:58.025610 env[1311]: 2023-10-02 19:16:57.986 [INFO][4820] k8s.go 383: Populated endpoint ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0", GenerateName:"calico-apiserver-5cd4d54db4-", Namespace:"calico-apiserver", SelfLink:"", UID:"57e4bdff-509a-4176-905b-82f7b771260a", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 57, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cd4d54db4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"", Pod:"calico-apiserver-5cd4d54db4-89fvv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.25.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali56e6bbb99a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:58.025610 env[1311]: 2023-10-02 19:16:57.986 [INFO][4820] k8s.go 384: Calico CNI using IPs: [192.168.25.198/32] ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0" Oct 2 19:16:58.025610 env[1311]: 2023-10-02 19:16:57.986 [INFO][4820] dataplane_linux.go 68: Setting the host side veth name to cali56e6bbb99a7 ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0" Oct 2 19:16:58.025610 env[1311]: 2023-10-02 19:16:58.004 [INFO][4820] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0" Oct 2 19:16:58.025610 env[1311]: 2023-10-02 19:16:58.009 [INFO][4820] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0", GenerateName:"calico-apiserver-5cd4d54db4-", Namespace:"calico-apiserver", SelfLink:"", UID:"57e4bdff-509a-4176-905b-82f7b771260a", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 16, 57, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cd4d54db4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-e4b0ec5c33", ContainerID:"eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97", Pod:"calico-apiserver-5cd4d54db4-89fvv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.25.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali56e6bbb99a7", MAC:"52:19:a8:34:4b:ca", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:16:58.025610 env[1311]: 2023-10-02 19:16:58.022 [INFO][4820] k8s.go 489: Wrote updated endpoint to datastore ContainerID="eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97" Namespace="calico-apiserver" Pod="calico-apiserver-5cd4d54db4-89fvv" WorkloadEndpoint="ci--3510.3.0--a--e4b0ec5c33-k8s-calico--apiserver--5cd4d54db4--89fvv-eth0" Oct 2 19:16:58.046315 env[1311]: time="2023-10-02T19:16:58.046248678Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:16:58.046539 env[1311]: time="2023-10-02T19:16:58.046512181Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:16:58.046648 env[1311]: time="2023-10-02T19:16:58.046624682Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:16:58.046874 env[1311]: time="2023-10-02T19:16:58.046842385Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97 pid=4913 runtime=io.containerd.runc.v2 Oct 2 19:16:58.074822 systemd[1]: Started cri-containerd-eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97.scope. Oct 2 19:16:58.080000 audit[4933]: NETFILTER_CFG table=filter:135 family=2 entries=59 op=nft_register_chain pid=4933 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:16:58.080000 audit[4933]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffe1dd596d0 a2=0 a3=7ffe1dd596bc items=0 ppid=3629 pid=4933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:58.080000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:16:58.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.081000 audit: BPF prog-id=175 op=LOAD Oct 2 19:16:58.083000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.083000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4866 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:58.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131633335366662396535313233333439653866356234376466346163 Oct 2 19:16:58.083000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.083000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4866 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:58.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131633335366662396535313233333439653866356234376466346163 Oct 2 19:16:58.083000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.083000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.083000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.083000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.083000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.083000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.083000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.083000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.083000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.083000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.083000 audit: BPF prog-id=176 op=LOAD Oct 2 19:16:58.083000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000284f00 items=0 ppid=4866 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:58.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131633335366662396535313233333439653866356234376466346163 Oct 2 19:16:58.084000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.084000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.084000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.084000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.084000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.084000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.084000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.084000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.084000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.084000 audit: BPF prog-id=177 op=LOAD Oct 2 19:16:58.084000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000284f48 items=0 ppid=4866 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:58.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131633335366662396535313233333439653866356234376466346163 Oct 2 19:16:58.085000 audit: BPF prog-id=177 op=UNLOAD Oct 2 19:16:58.085000 audit: BPF prog-id=176 op=UNLOAD Oct 2 19:16:58.085000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.085000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.085000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.085000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.085000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.085000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.085000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.085000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.085000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.085000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.085000 audit: BPF prog-id=178 op=LOAD Oct 2 19:16:58.085000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000285358 items=0 ppid=4866 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:58.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131633335366662396535313233333439653866356234376466346163 Oct 2 19:16:58.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.097000 audit: BPF prog-id=179 op=LOAD Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4913 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:58.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563656565313835633163616535323562363431613635643131626135 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4913 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:58.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563656565313835633163616535323562363431613635643131626135 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit: BPF prog-id=180 op=LOAD Oct 2 19:16:58.098000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00025d3a0 items=0 ppid=4913 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:58.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563656565313835633163616535323562363431613635643131626135 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit: BPF prog-id=181 op=LOAD Oct 2 19:16:58.098000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00025d3e8 items=0 ppid=4913 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:58.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563656565313835633163616535323562363431613635643131626135 Oct 2 19:16:58.098000 audit: BPF prog-id=181 op=UNLOAD Oct 2 19:16:58.098000 audit: BPF prog-id=180 op=UNLOAD Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:16:58.098000 audit: BPF prog-id=182 op=LOAD Oct 2 19:16:58.098000 audit[4924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00025d7f8 items=0 ppid=4913 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:58.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563656565313835633163616535323562363431613635643131626135 Oct 2 19:16:58.150597 env[1311]: time="2023-10-02T19:16:58.150528357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cd4d54db4-twr8h,Uid:565fa6da-ca7f-46dc-99b0-bf7e5cab228f,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"11c356fb9e5123349e8f5b47df4ac48916a3b0e8b0b044490f8e9f9b07e92af8\"" Oct 2 19:16:58.152621 env[1311]: time="2023-10-02T19:16:58.152587881Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:16:58.153000 audit[4954]: NETFILTER_CFG table=filter:136 family=2 entries=50 op=nft_register_chain pid=4954 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:16:58.153000 audit[4954]: SYSCALL arch=c000003e syscall=46 success=yes exit=24496 a0=3 a1=7fff2f2e3b30 a2=0 a3=7fff2f2e3b1c items=0 ppid=3629 pid=4954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:58.153000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:16:58.169683 env[1311]: time="2023-10-02T19:16:58.169651674Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cd4d54db4-89fvv,Uid:57e4bdff-509a-4176-905b-82f7b771260a,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"eceee185c1cae525b641a65d11ba59b019d399ecdd6930105ae28988656a9d97\"" Oct 2 19:16:58.461832 env[1311]: time="2023-10-02T19:16:58.461753477Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:16:58.464714 env[1311]: time="2023-10-02T19:16:58.464654810Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:16:58.464991 kubelet[2467]: E1002 19:16:58.464937 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:16:58.465376 kubelet[2467]: E1002 19:16:58.465020 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:16:58.465376 kubelet[2467]: E1002 19:16:58.465326 2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ltg65,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-twr8h_calico-apiserver(565fa6da-ca7f-46dc-99b0-bf7e5cab228f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:16:58.465376 kubelet[2467]: E1002 19:16:58.465377 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:16:58.465860 env[1311]: time="2023-10-02T19:16:58.465829623Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:16:58.773844 env[1311]: time="2023-10-02T19:16:58.773685605Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:16:58.776756 env[1311]: time="2023-10-02T19:16:58.776693939Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:16:58.777322 kubelet[2467]: E1002 19:16:58.777293 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:16:58.777495 kubelet[2467]: E1002 19:16:58.777344 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:16:58.777577 kubelet[2467]: E1002 19:16:58.777493 2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-8p57v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-89fvv_calico-apiserver(57e4bdff-509a-4176-905b-82f7b771260a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:16:58.777577 kubelet[2467]: E1002 19:16:58.777556 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:16:59.348301 kubelet[2467]: E1002 19:16:59.348102 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:16:59.348301 kubelet[2467]: E1002 19:16:59.348155 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:16:59.412000 audit[4989]: NETFILTER_CFG table=filter:137 family=2 entries=8 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:59.417083 kernel: kauditd_printk_skb: 191 callbacks suppressed Oct 2 19:16:59.417186 kernel: audit: type=1325 audit(1696274219.412:1350): table=filter:137 family=2 entries=8 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:59.428965 kernel: audit: type=1300 audit(1696274219.412:1350): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fffac122780 a2=0 a3=7fffac12276c items=0 ppid=2658 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:59.412000 audit[4989]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fffac122780 a2=0 a3=7fffac12276c items=0 ppid=2658 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:59.447345 kernel: audit: type=1327 audit(1696274219.412:1350): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:59.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:59.412000 audit[4989]: NETFILTER_CFG table=nat:138 family=2 entries=78 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:59.466654 kernel: audit: type=1325 audit(1696274219.412:1351): table=nat:138 family=2 entries=78 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:59.467352 kernel: audit: type=1300 audit(1696274219.412:1351): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fffac122780 a2=0 a3=7fffac12276c items=0 ppid=2658 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:59.412000 audit[4989]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fffac122780 a2=0 a3=7fffac12276c items=0 ppid=2658 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:59.497988 kernel: audit: type=1327 audit(1696274219.412:1351): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:59.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:59.522000 audit[5015]: NETFILTER_CFG table=filter:139 family=2 entries=8 op=nft_register_rule pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:59.522000 audit[5015]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc8bd37b70 a2=0 a3=7ffc8bd37b5c items=0 ppid=2658 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:59.553004 kernel: audit: type=1325 audit(1696274219.522:1352): table=filter:139 family=2 entries=8 op=nft_register_rule pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:59.553107 kernel: audit: type=1300 audit(1696274219.522:1352): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc8bd37b70 a2=0 a3=7ffc8bd37b5c items=0 ppid=2658 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:59.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:59.553976 kernel: audit: type=1327 audit(1696274219.522:1352): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:59.524000 audit[5015]: NETFILTER_CFG table=nat:140 family=2 entries=78 op=nft_register_rule pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:59.563962 kernel: audit: type=1325 audit(1696274219.524:1353): table=nat:140 family=2 entries=78 op=nft_register_rule pid=5015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:16:59.524000 audit[5015]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc8bd37b70 a2=0 a3=7ffc8bd37b5c items=0 ppid=2658 pid=5015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:16:59.524000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:16:59.665185 systemd-networkd[1452]: calid5f5573b2c5: Gained IPv6LL Oct 2 19:16:59.857195 systemd-networkd[1452]: cali56e6bbb99a7: Gained IPv6LL Oct 2 19:17:03.498864 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.0e6dhs.mount: Deactivated successfully. Oct 2 19:17:04.135453 env[1311]: time="2023-10-02T19:17:04.135408852Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:17:04.429097 env[1311]: time="2023-10-02T19:17:04.428735177Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:04.432552 env[1311]: time="2023-10-02T19:17:04.432491317Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:04.432830 kubelet[2467]: E1002 19:17:04.432806 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:17:04.433201 kubelet[2467]: E1002 19:17:04.432851 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:17:04.433201 kubelet[2467]: E1002 19:17:04.432995 2467 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:04.434546 env[1311]: time="2023-10-02T19:17:04.434300036Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:17:04.729337 env[1311]: time="2023-10-02T19:17:04.729202377Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:04.732104 env[1311]: time="2023-10-02T19:17:04.732045207Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:04.732303 kubelet[2467]: E1002 19:17:04.732274 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:17:04.732409 kubelet[2467]: E1002 19:17:04.732325 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:17:04.732463 kubelet[2467]: E1002 19:17:04.732434 2467 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:04.732585 kubelet[2467]: E1002 19:17:04.732501 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:17:11.134054 env[1311]: time="2023-10-02T19:17:11.133982062Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:17:11.422713 env[1311]: time="2023-10-02T19:17:11.422463654Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:11.425716 env[1311]: time="2023-10-02T19:17:11.425654786Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:11.426098 kubelet[2467]: E1002 19:17:11.426068 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:11.426527 kubelet[2467]: E1002 19:17:11.426124 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:11.426527 kubelet[2467]: E1002 19:17:11.426284 2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-8p57v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-89fvv_calico-apiserver(57e4bdff-509a-4176-905b-82f7b771260a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:11.426527 kubelet[2467]: E1002 19:17:11.426344 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:17:13.134209 env[1311]: time="2023-10-02T19:17:13.134115717Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:17:13.303564 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.V2w9Pu.mount: Deactivated successfully. Oct 2 19:17:13.444757 env[1311]: time="2023-10-02T19:17:13.444612782Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:13.448773 env[1311]: time="2023-10-02T19:17:13.448713323Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:13.449068 kubelet[2467]: E1002 19:17:13.449025 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:13.449424 kubelet[2467]: E1002 19:17:13.449095 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:13.449822 kubelet[2467]: E1002 19:17:13.449793 2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ltg65,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-twr8h_calico-apiserver(565fa6da-ca7f-46dc-99b0-bf7e5cab228f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:13.450022 kubelet[2467]: E1002 19:17:13.449873 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:17:14.295979 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.DklSkS.mount: Deactivated successfully. Oct 2 19:17:20.138175 kubelet[2467]: E1002 19:17:20.137932 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:17:23.292276 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.YiUMHQ.mount: Deactivated successfully. Oct 2 19:17:23.501008 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.WENT9H.mount: Deactivated successfully. Oct 2 19:17:24.134513 kubelet[2467]: E1002 19:17:24.134172 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:17:25.133432 kubelet[2467]: E1002 19:17:25.133395 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:17:31.135852 env[1311]: time="2023-10-02T19:17:31.134578882Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:17:31.464678 env[1311]: time="2023-10-02T19:17:31.464496600Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:31.469848 env[1311]: time="2023-10-02T19:17:31.469781947Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:31.470219 kubelet[2467]: E1002 19:17:31.470188 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:17:31.470651 kubelet[2467]: E1002 19:17:31.470259 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:17:31.470651 kubelet[2467]: E1002 19:17:31.470442 2467 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:31.471775 env[1311]: time="2023-10-02T19:17:31.471739164Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:17:31.776809 env[1311]: time="2023-10-02T19:17:31.776637961Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:31.782675 env[1311]: time="2023-10-02T19:17:31.782603014Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:31.782908 kubelet[2467]: E1002 19:17:31.782883 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:17:31.783044 kubelet[2467]: E1002 19:17:31.782968 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:17:31.783123 kubelet[2467]: E1002 19:17:31.783101 2467 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:31.783283 kubelet[2467]: E1002 19:17:31.783184 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:17:33.299492 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.D6vUJM.mount: Deactivated successfully. Oct 2 19:17:34.290215 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.maWEEb.mount: Deactivated successfully. Oct 2 19:17:36.134418 env[1311]: time="2023-10-02T19:17:36.134373278Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:17:36.438178 env[1311]: time="2023-10-02T19:17:36.438023505Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:36.444121 env[1311]: time="2023-10-02T19:17:36.444004856Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:36.444636 kubelet[2467]: E1002 19:17:36.444567 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:36.445302 kubelet[2467]: E1002 19:17:36.444662 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:36.445302 kubelet[2467]: E1002 19:17:36.444988 2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-8p57v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-89fvv_calico-apiserver(57e4bdff-509a-4176-905b-82f7b771260a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:36.445302 kubelet[2467]: E1002 19:17:36.445082 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:17:38.134495 env[1311]: time="2023-10-02T19:17:38.134069230Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:17:38.431957 env[1311]: time="2023-10-02T19:17:38.431653584Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:17:38.438127 env[1311]: time="2023-10-02T19:17:38.437987738Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:17:38.438622 kubelet[2467]: E1002 19:17:38.438571 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:38.439084 kubelet[2467]: E1002 19:17:38.438670 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:17:38.439084 kubelet[2467]: E1002 19:17:38.438827 2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ltg65,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-twr8h_calico-apiserver(565fa6da-ca7f-46dc-99b0-bf7e5cab228f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:17:38.439084 kubelet[2467]: E1002 19:17:38.438871 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:17:46.135369 kubelet[2467]: E1002 19:17:46.135332 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:17:48.497000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:48.502868 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 19:17:48.503003 kernel: audit: type=1400 audit(1696274268.497:1354): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:48.497000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0019b6c30 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:17:48.540820 kernel: audit: type=1300 audit(1696274268.497:1354): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0019b6c30 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:17:48.540973 kernel: audit: type=1327 audit(1696274268.497:1354): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:48.497000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:48.510000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:48.510000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001fd49c0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:17:48.599528 kernel: audit: type=1400 audit(1696274268.510:1355): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:48.599652 kernel: audit: type=1300 audit(1696274268.510:1355): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001fd49c0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:17:48.599685 kernel: audit: type=1327 audit(1696274268.510:1355): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:48.510000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:49.133662 kubelet[2467]: E1002 19:17:49.133624 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:17:50.461000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:50.461000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c009266180 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:17:50.499502 kernel: audit: type=1400 audit(1696274270.461:1356): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:50.499639 kernel: audit: type=1300 audit(1696274270.461:1356): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c009266180 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:17:50.499706 kernel: audit: type=1327 audit(1696274270.461:1356): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:17:50.461000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:17:50.526239 kernel: audit: type=1400 audit(1696274270.482:1357): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:50.482000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:50.482000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0092661b0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:17:50.482000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:17:50.498000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:50.498000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c011d812a0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:17:50.498000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:17:50.500000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:50.500000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c009266300 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:17:50.500000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:17:50.553000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:50.553000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:50.553000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c011d812c0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:17:50.553000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c009266390 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:17:50.553000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:17:50.553000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:17:51.133762 kubelet[2467]: E1002 19:17:51.133728 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:17:53.301769 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.roID4B.mount: Deactivated successfully. Oct 2 19:17:53.603000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:53.608547 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 19:17:53.608661 kernel: audit: type=1400 audit(1696274273.603:1362): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:53.603000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f7baa0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:17:53.647970 kernel: audit: type=1300 audit(1696274273.603:1362): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f7baa0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:17:53.648076 kernel: audit: type=1327 audit(1696274273.603:1362): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:53.603000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:53.664426 kernel: audit: type=1400 audit(1696274273.604:1363): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:53.604000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:53.604000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000f7bac0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:17:53.680017 kernel: audit: type=1300 audit(1696274273.604:1363): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000f7bac0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:17:53.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:53.719239 kernel: audit: type=1327 audit(1696274273.604:1363): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:53.604000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:53.735319 kernel: audit: type=1400 audit(1696274273.604:1364): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:53.735413 kernel: audit: type=1300 audit(1696274273.604:1364): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f7bae0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:17:53.604000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f7bae0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:17:53.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:53.775038 kernel: audit: type=1327 audit(1696274273.604:1364): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:53.775140 kernel: audit: type=1400 audit(1696274273.605:1365): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:53.605000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:17:53.605000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f7bd20 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:17:53.605000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:17:54.291002 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.DaJdi5.mount: Deactivated successfully. Oct 2 19:18:00.133570 kubelet[2467]: E1002 19:18:00.133533 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:18:01.134575 kubelet[2467]: E1002 19:18:01.134529 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:18:03.297270 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.789MM1.mount: Deactivated successfully. Oct 2 19:18:04.133869 kubelet[2467]: E1002 19:18:04.133841 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:18:04.290963 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.t5Enb8.mount: Deactivated successfully. Oct 2 19:18:11.133738 kubelet[2467]: E1002 19:18:11.133691 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:18:13.294018 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.A7bPTt.mount: Deactivated successfully. Oct 2 19:18:13.501198 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.uVGa3b.mount: Deactivated successfully. Oct 2 19:18:14.290446 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.7DQz3E.mount: Deactivated successfully. Oct 2 19:18:15.133826 env[1311]: time="2023-10-02T19:18:15.133772919Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:18:15.439377 env[1311]: time="2023-10-02T19:18:15.439227010Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:18:15.444504 env[1311]: time="2023-10-02T19:18:15.444360971Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:18:15.444743 kubelet[2467]: E1002 19:18:15.444715 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:18:15.445111 kubelet[2467]: E1002 19:18:15.444766 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:18:15.445111 kubelet[2467]: E1002 19:18:15.444910 2467 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:18:15.446089 env[1311]: time="2023-10-02T19:18:15.446057224Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:18:15.738312 env[1311]: time="2023-10-02T19:18:15.738071293Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:18:15.744090 env[1311]: time="2023-10-02T19:18:15.743938977Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:18:15.744308 kubelet[2467]: E1002 19:18:15.744273 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:18:15.744436 kubelet[2467]: E1002 19:18:15.744334 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:18:15.744504 kubelet[2467]: E1002 19:18:15.744467 2467 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:18:15.744666 kubelet[2467]: E1002 19:18:15.744555 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:18:17.133507 kubelet[2467]: E1002 19:18:17.133474 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:18:22.135146 env[1311]: time="2023-10-02T19:18:22.135094523Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:18:22.438350 env[1311]: time="2023-10-02T19:18:22.438182920Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:18:22.443089 env[1311]: time="2023-10-02T19:18:22.443032762Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:18:22.443336 kubelet[2467]: E1002 19:18:22.443313 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:18:22.443715 kubelet[2467]: E1002 19:18:22.443372 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:18:22.443715 kubelet[2467]: E1002 19:18:22.443568 2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-8p57v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-89fvv_calico-apiserver(57e4bdff-509a-4176-905b-82f7b771260a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:18:22.443715 kubelet[2467]: E1002 19:18:22.443634 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:18:23.298913 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.O1GOxX.mount: Deactivated successfully. Oct 2 19:18:23.499874 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.IicKQ1.mount: Deactivated successfully. Oct 2 19:18:27.134456 kubelet[2467]: E1002 19:18:27.134424 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:18:30.135940 env[1311]: time="2023-10-02T19:18:30.135879079Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:18:30.450032 env[1311]: time="2023-10-02T19:18:30.449841744Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:18:30.454432 env[1311]: time="2023-10-02T19:18:30.454373967Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:18:30.454685 kubelet[2467]: E1002 19:18:30.454655 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:18:30.455165 kubelet[2467]: E1002 19:18:30.454713 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:18:30.455165 kubelet[2467]: E1002 19:18:30.454868 2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ltg65,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-twr8h_calico-apiserver(565fa6da-ca7f-46dc-99b0-bf7e5cab228f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:18:30.455165 kubelet[2467]: E1002 19:18:30.454931 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:18:33.523890 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.DTpcYT.mount: Deactivated successfully. Oct 2 19:18:35.133178 kubelet[2467]: E1002 19:18:35.133148 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:18:38.135519 kubelet[2467]: E1002 19:18:38.135481 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:18:42.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.37:22-10.200.12.6:37690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:42.007500 systemd[1]: Started sshd@7-10.200.8.37:22-10.200.12.6:37690.service. Oct 2 19:18:42.012696 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 19:18:42.012765 kernel: audit: type=1130 audit(1696274322.006:1366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.37:22-10.200.12.6:37690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:42.723000 audit[5702]: USER_ACCT pid=5702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:42.725976 sshd[5702]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:42.742858 sshd[5702]: Accepted publickey for core from 10.200.12.6 port 37690 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:18:42.743073 kernel: audit: type=1101 audit(1696274322.723:1367): pid=5702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:42.743112 kernel: audit: type=1103 audit(1696274322.724:1368): pid=5702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:42.724000 audit[5702]: CRED_ACQ pid=5702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:42.761225 systemd-logind[1290]: New session 10 of user core. Oct 2 19:18:42.761868 systemd[1]: Started session-10.scope. Oct 2 19:18:42.724000 audit[5702]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd62718970 a2=3 a3=0 items=0 ppid=1 pid=5702 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.791829 kernel: audit: type=1006 audit(1696274322.724:1369): pid=5702 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 19:18:42.791972 kernel: audit: type=1300 audit(1696274322.724:1369): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd62718970 a2=3 a3=0 items=0 ppid=1 pid=5702 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:42.792005 kernel: audit: type=1327 audit(1696274322.724:1369): proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:42.724000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:42.762000 audit[5702]: USER_START pid=5702 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:42.816449 kernel: audit: type=1105 audit(1696274322.762:1370): pid=5702 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:42.768000 audit[5704]: CRED_ACQ pid=5704 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:42.834672 kernel: audit: type=1103 audit(1696274322.768:1371): pid=5704 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:43.132984 kubelet[2467]: E1002 19:18:43.132961 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:18:43.302813 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.RuIIq7.mount: Deactivated successfully. Oct 2 19:18:43.352931 sshd[5702]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:43.353000 audit[5702]: USER_END pid=5702 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:43.355781 systemd[1]: sshd@7-10.200.8.37:22-10.200.12.6:37690.service: Deactivated successfully. Oct 2 19:18:43.357395 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:18:43.358259 systemd-logind[1290]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:18:43.359122 systemd-logind[1290]: Removed session 10. Oct 2 19:18:43.374968 kernel: audit: type=1106 audit(1696274323.353:1372): pid=5702 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:43.353000 audit[5702]: CRED_DISP pid=5702 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:43.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.37:22-10.200.12.6:37690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:43.397029 kernel: audit: type=1104 audit(1696274323.353:1373): pid=5702 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:44.296381 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.0UYqMK.mount: Deactivated successfully. Oct 2 19:18:48.512981 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:18:48.513145 kernel: audit: type=1400 audit(1696274328.498:1375): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:48.498000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:48.511000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:48.537375 kernel: audit: type=1400 audit(1696274328.511:1376): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:48.511000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002da20e0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:18:48.558950 kernel: audit: type=1300 audit(1696274328.511:1376): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002da20e0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:18:48.511000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:48.559963 kernel: audit: type=1327 audit(1696274328.511:1376): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:48.498000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002d9c060 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:18:48.601001 kernel: audit: type=1300 audit(1696274328.498:1375): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002d9c060 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:18:48.601153 kernel: audit: type=1327 audit(1696274328.498:1375): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:48.498000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:49.133293 kubelet[2467]: E1002 19:18:49.133257 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:18:50.464000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:50.464000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0050f3e60 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:18:50.503955 kernel: audit: type=1400 audit(1696274330.464:1377): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:50.504072 kernel: audit: type=1300 audit(1696274330.464:1377): arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0050f3e60 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:18:50.504104 kernel: audit: type=1327 audit(1696274330.464:1377): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:18:50.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:18:50.483000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:50.538264 kernel: audit: type=1400 audit(1696274330.483:1378): avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:50.483000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c000eb7770 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:18:50.483000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:18:50.499000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:50.499000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00183da00 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:18:50.499000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:18:50.501000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:50.501000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c000d805a0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:18:50.501000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:18:50.552000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:50.553000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:50.553000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00183da40 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:18:50.552000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0009c0390 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:18:50.553000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:18:50.552000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:18:53.133685 kubelet[2467]: E1002 19:18:53.133644 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:18:53.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.37:22-10.200.12.6:47338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:53.451093 systemd[1]: Started sshd@8-10.200.8.37:22-10.200.12.6:47338.service. Oct 2 19:18:53.497519 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.onfc7a.mount: Deactivated successfully. Oct 2 19:18:53.604000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:53.609922 kernel: kauditd_printk_skb: 15 callbacks suppressed Oct 2 19:18:53.610033 kernel: audit: type=1400 audit(1696274333.604:1385): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:53.604000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:53.642582 kernel: audit: type=1400 audit(1696274333.604:1384): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:53.642689 kernel: audit: type=1300 audit(1696274333.604:1384): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e26fa0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:18:53.604000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e26fa0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:18:53.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:53.680875 kernel: audit: type=1327 audit(1696274333.604:1384): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:53.681064 kernel: audit: type=1400 audit(1696274333.604:1386): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:53.604000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:53.699470 kernel: audit: type=1300 audit(1696274333.604:1386): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e270c0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:18:53.604000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e270c0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:18:53.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:53.721057 kernel: audit: type=1327 audit(1696274333.604:1386): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:53.605000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:53.754395 kernel: audit: type=1400 audit(1696274333.605:1387): avc: denied { watch } for pid=2288 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:18:53.605000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e271e0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:18:53.754964 kernel: audit: type=1300 audit(1696274333.605:1387): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e271e0 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:18:53.776649 kernel: audit: type=1327 audit(1696274333.605:1387): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:53.605000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:53.604000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002da3180 a2=fc6 a3=0 items=0 ppid=2148 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:18:53.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:18:54.099000 audit[5814]: USER_ACCT pid=5814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:54.102093 sshd[5814]: Accepted publickey for core from 10.200.12.6 port 47338 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:18:54.101000 audit[5814]: CRED_ACQ pid=5814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:54.101000 audit[5814]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7b087960 a2=3 a3=0 items=0 ppid=1 pid=5814 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:54.101000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:18:54.103438 sshd[5814]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:54.108814 systemd[1]: Started session-11.scope. Oct 2 19:18:54.109444 systemd-logind[1290]: New session 11 of user core. Oct 2 19:18:54.112000 audit[5814]: USER_START pid=5814 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:54.114000 audit[5857]: CRED_ACQ pid=5857 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:54.288817 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.AyB0By.mount: Deactivated successfully. Oct 2 19:18:54.649705 sshd[5814]: pam_unix(sshd:session): session closed for user core Oct 2 19:18:54.649000 audit[5814]: USER_END pid=5814 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:54.649000 audit[5814]: CRED_DISP pid=5814 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:18:54.653199 systemd[1]: sshd@8-10.200.8.37:22-10.200.12.6:47338.service: Deactivated successfully. Oct 2 19:18:54.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.37:22-10.200.12.6:47338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:54.654388 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:18:54.655169 systemd-logind[1290]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:18:54.656023 systemd-logind[1290]: Removed session 11. Oct 2 19:18:55.134830 kubelet[2467]: E1002 19:18:55.134460 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:19:02.134094 kubelet[2467]: E1002 19:19:02.134055 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:19:03.296306 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.WanFkd.mount: Deactivated successfully. Oct 2 19:19:04.289392 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.EBPvwJ.mount: Deactivated successfully. Oct 2 19:19:04.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.37:22-10.200.12.6:48058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:04.755371 systemd[1]: Started sshd@9-10.200.8.37:22-10.200.12.6:48058.service. Oct 2 19:19:04.760615 kernel: kauditd_printk_skb: 12 callbacks suppressed Oct 2 19:19:04.760783 kernel: audit: type=1130 audit(1696274344.754:1396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.37:22-10.200.12.6:48058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:05.133525 kubelet[2467]: E1002 19:19:05.133333 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:19:05.382000 audit[5933]: USER_ACCT pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:05.383639 sshd[5933]: Accepted publickey for core from 10.200.12.6 port 48058 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:19:05.401000 audit[5933]: CRED_ACQ pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:05.402615 sshd[5933]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:19:05.408108 systemd[1]: Started session-12.scope. Oct 2 19:19:05.408887 systemd-logind[1290]: New session 12 of user core. Oct 2 19:19:05.419611 kernel: audit: type=1101 audit(1696274345.382:1397): pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:05.419732 kernel: audit: type=1103 audit(1696274345.401:1398): pid=5933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:05.419763 kernel: audit: type=1006 audit(1696274345.401:1399): pid=5933 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Oct 2 19:19:05.401000 audit[5933]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6bf97a20 a2=3 a3=0 items=0 ppid=1 pid=5933 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:05.448092 kernel: audit: type=1300 audit(1696274345.401:1399): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6bf97a20 a2=3 a3=0 items=0 ppid=1 pid=5933 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:05.401000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:19:05.448968 kernel: audit: type=1327 audit(1696274345.401:1399): proctitle=737368643A20636F7265205B707269765D Oct 2 19:19:05.413000 audit[5933]: USER_START pid=5933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:05.455008 kernel: audit: type=1105 audit(1696274345.413:1400): pid=5933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:05.415000 audit[5935]: CRED_ACQ pid=5935 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:05.490782 kernel: audit: type=1103 audit(1696274345.415:1401): pid=5935 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:05.918359 sshd[5933]: pam_unix(sshd:session): session closed for user core Oct 2 19:19:05.919000 audit[5933]: USER_END pid=5933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:05.922518 systemd-logind[1290]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:19:05.925647 systemd[1]: sshd@9-10.200.8.37:22-10.200.12.6:48058.service: Deactivated successfully. Oct 2 19:19:05.926430 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:19:05.927820 systemd-logind[1290]: Removed session 12. Oct 2 19:19:05.919000 audit[5933]: CRED_DISP pid=5933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:05.954929 kernel: audit: type=1106 audit(1696274345.919:1402): pid=5933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:05.955058 kernel: audit: type=1104 audit(1696274345.919:1403): pid=5933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:05.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.37:22-10.200.12.6:48058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:06.024534 systemd[1]: Started sshd@10-10.200.8.37:22-10.200.12.6:48074.service. Oct 2 19:19:06.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.37:22-10.200.12.6:48074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:06.641000 audit[5947]: USER_ACCT pid=5947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:06.642226 sshd[5947]: Accepted publickey for core from 10.200.12.6 port 48074 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:19:06.643628 sshd[5947]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:19:06.642000 audit[5947]: CRED_ACQ pid=5947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:06.642000 audit[5947]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0417c760 a2=3 a3=0 items=0 ppid=1 pid=5947 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:06.642000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:19:06.648969 systemd[1]: Started session-13.scope. Oct 2 19:19:06.649410 systemd-logind[1290]: New session 13 of user core. Oct 2 19:19:06.653000 audit[5947]: USER_START pid=5947 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:06.654000 audit[5951]: CRED_ACQ pid=5951 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:07.134524 kubelet[2467]: E1002 19:19:07.134411 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:19:07.929829 sshd[5947]: pam_unix(sshd:session): session closed for user core Oct 2 19:19:07.930000 audit[5947]: USER_END pid=5947 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:07.930000 audit[5947]: CRED_DISP pid=5947 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:07.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.37:22-10.200.12.6:48074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:07.933187 systemd[1]: sshd@10-10.200.8.37:22-10.200.12.6:48074.service: Deactivated successfully. Oct 2 19:19:07.934769 systemd-logind[1290]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:19:07.934856 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:19:07.936181 systemd-logind[1290]: Removed session 13. Oct 2 19:19:08.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.37:22-10.200.12.6:36182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:08.038300 systemd[1]: Started sshd@11-10.200.8.37:22-10.200.12.6:36182.service. Oct 2 19:19:08.663000 audit[5961]: USER_ACCT pid=5961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:08.664911 sshd[5961]: Accepted publickey for core from 10.200.12.6 port 36182 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:19:08.665000 audit[5961]: CRED_ACQ pid=5961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:08.665000 audit[5961]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd646d1730 a2=3 a3=0 items=0 ppid=1 pid=5961 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:08.665000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:19:08.666409 sshd[5961]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:19:08.671529 systemd[1]: Started session-14.scope. Oct 2 19:19:08.672042 systemd-logind[1290]: New session 14 of user core. Oct 2 19:19:08.675000 audit[5961]: USER_START pid=5961 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:08.677000 audit[5963]: CRED_ACQ pid=5963 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:09.203417 sshd[5961]: pam_unix(sshd:session): session closed for user core Oct 2 19:19:09.204000 audit[5961]: USER_END pid=5961 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:09.204000 audit[5961]: CRED_DISP pid=5961 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:09.206907 systemd[1]: sshd@11-10.200.8.37:22-10.200.12.6:36182.service: Deactivated successfully. Oct 2 19:19:09.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.37:22-10.200.12.6:36182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:09.208138 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 19:19:09.209052 systemd-logind[1290]: Session 14 logged out. Waiting for processes to exit. Oct 2 19:19:09.209899 systemd-logind[1290]: Removed session 14. Oct 2 19:19:13.525217 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.03qbHz.mount: Deactivated successfully. Oct 2 19:19:14.133807 kubelet[2467]: E1002 19:19:14.133774 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:19:19.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.37:22-10.200.12.6:59592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:19.315397 systemd[1]: Started sshd@12-10.200.8.37:22-10.200.12.6:59592.service. Oct 2 19:19:19.320595 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:19:19.320692 kernel: audit: type=1130 audit(1696274359.314:1423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.37:22-10.200.12.6:59592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:19.938000 audit[6041]: USER_ACCT pid=6041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:19.940982 sshd[6041]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:19:19.958731 sshd[6041]: Accepted publickey for core from 10.200.12.6 port 59592 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:19:19.958971 kernel: audit: type=1101 audit(1696274359.938:1424): pid=6041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:19.939000 audit[6041]: CRED_ACQ pid=6041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:19.963496 systemd[1]: Started session-15.scope. Oct 2 19:19:19.963989 systemd-logind[1290]: New session 15 of user core. Oct 2 19:19:19.982083 kernel: audit: type=1103 audit(1696274359.939:1425): pid=6041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:19.939000 audit[6041]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd0643b00 a2=3 a3=0 items=0 ppid=1 pid=6041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:20.010011 kernel: audit: type=1006 audit(1696274359.939:1426): pid=6041 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 2 19:19:20.010177 kernel: audit: type=1300 audit(1696274359.939:1426): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd0643b00 a2=3 a3=0 items=0 ppid=1 pid=6041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:19.939000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:19:20.011014 kernel: audit: type=1327 audit(1696274359.939:1426): proctitle=737368643A20636F7265205B707269765D Oct 2 19:19:19.969000 audit[6041]: USER_START pid=6041 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:20.016988 kernel: audit: type=1105 audit(1696274359.969:1427): pid=6041 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:19.971000 audit[6043]: CRED_ACQ pid=6043 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:20.035013 kernel: audit: type=1103 audit(1696274359.971:1428): pid=6043 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:20.134810 kubelet[2467]: E1002 19:19:20.134726 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:19:20.515027 sshd[6041]: pam_unix(sshd:session): session closed for user core Oct 2 19:19:20.541988 kernel: audit: type=1106 audit(1696274360.515:1429): pid=6041 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:20.542067 kernel: audit: type=1104 audit(1696274360.515:1430): pid=6041 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:20.515000 audit[6041]: USER_END pid=6041 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:20.515000 audit[6041]: CRED_DISP pid=6041 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:20.518905 systemd-logind[1290]: Session 15 logged out. Waiting for processes to exit. Oct 2 19:19:20.520381 systemd[1]: sshd@12-10.200.8.37:22-10.200.12.6:59592.service: Deactivated successfully. Oct 2 19:19:20.521304 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 19:19:20.522903 systemd-logind[1290]: Removed session 15. Oct 2 19:19:20.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.37:22-10.200.12.6:59592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:21.133482 kubelet[2467]: E1002 19:19:21.133391 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:19:23.499995 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.lncTHo.mount: Deactivated successfully. Oct 2 19:19:24.288859 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.XdTgcm.mount: Deactivated successfully. Oct 2 19:19:29.133765 kubelet[2467]: E1002 19:19:29.133725 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:19:30.621217 systemd[1]: Started sshd@13-10.200.8.37:22-10.200.12.6:42466.service. Oct 2 19:19:30.644790 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:19:30.644907 kernel: audit: type=1130 audit(1696274370.621:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.37:22-10.200.12.6:42466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:30.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.37:22-10.200.12.6:42466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:31.240000 audit[6122]: USER_ACCT pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:31.260597 sshd[6122]: Accepted publickey for core from 10.200.12.6 port 42466 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:19:31.260852 sshd[6122]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:19:31.261166 kernel: audit: type=1101 audit(1696274371.240:1433): pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:31.259000 audit[6122]: CRED_ACQ pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:31.267229 systemd[1]: Started session-16.scope. Oct 2 19:19:31.267993 systemd-logind[1290]: New session 16 of user core. Oct 2 19:19:31.280012 kernel: audit: type=1103 audit(1696274371.259:1434): pid=6122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:31.259000 audit[6122]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6e0d27d0 a2=3 a3=0 items=0 ppid=1 pid=6122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:31.290990 kernel: audit: type=1006 audit(1696274371.259:1435): pid=6122 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Oct 2 19:19:31.291043 kernel: audit: type=1300 audit(1696274371.259:1435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6e0d27d0 a2=3 a3=0 items=0 ppid=1 pid=6122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:31.310358 kernel: audit: type=1327 audit(1696274371.259:1435): proctitle=737368643A20636F7265205B707269765D Oct 2 19:19:31.259000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:19:31.273000 audit[6122]: USER_START pid=6122 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:31.316968 kernel: audit: type=1105 audit(1696274371.273:1436): pid=6122 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:31.335013 kernel: audit: type=1103 audit(1696274371.275:1437): pid=6128 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:31.275000 audit[6128]: CRED_ACQ pid=6128 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:32.076925 sshd[6122]: pam_unix(sshd:session): session closed for user core Oct 2 19:19:32.077000 audit[6122]: USER_END pid=6122 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:32.080277 systemd[1]: sshd@13-10.200.8.37:22-10.200.12.6:42466.service: Deactivated successfully. Oct 2 19:19:32.081098 systemd[1]: session-16.scope: Deactivated successfully. Oct 2 19:19:32.082519 systemd-logind[1290]: Session 16 logged out. Waiting for processes to exit. Oct 2 19:19:32.083396 systemd-logind[1290]: Removed session 16. Oct 2 19:19:32.077000 audit[6122]: CRED_DISP pid=6122 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:32.101972 kernel: audit: type=1106 audit(1696274372.077:1438): pid=6122 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:32.102019 kernel: audit: type=1104 audit(1696274372.077:1439): pid=6122 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:32.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.37:22-10.200.12.6:42466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:32.134684 kubelet[2467]: E1002 19:19:32.134650 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:19:32.135377 kubelet[2467]: E1002 19:19:32.135354 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:19:33.295790 systemd[1]: run-containerd-runc-k8s.io-5e109d77c2b1b3a1f124fb9beedb44bd616f6521ed2b6bd83a8143ac13e683c5-runc.ssUjPz.mount: Deactivated successfully. Oct 2 19:19:34.288176 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.sNmvMK.mount: Deactivated successfully. Oct 2 19:19:43.133697 env[1311]: time="2023-10-02T19:19:43.133646146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:19:43.452816 env[1311]: time="2023-10-02T19:19:43.452660880Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:43.458090 env[1311]: time="2023-10-02T19:19:43.458035070Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:43.458350 kubelet[2467]: E1002 19:19:43.458325 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:19:43.458726 kubelet[2467]: E1002 19:19:43.458376 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:19:43.458726 kubelet[2467]: E1002 19:19:43.458500 2467 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:43.459333 env[1311]: time="2023-10-02T19:19:43.459301091Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:19:43.523870 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.6M8Yiz.mount: Deactivated successfully. Oct 2 19:19:43.755217 env[1311]: time="2023-10-02T19:19:43.755067737Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:43.760231 env[1311]: time="2023-10-02T19:19:43.760117221Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:43.760930 kubelet[2467]: E1002 19:19:43.760582 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:19:43.760930 kubelet[2467]: E1002 19:19:43.760637 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:19:43.760930 kubelet[2467]: E1002 19:19:43.760742 2467 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-44fmr,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-484pr_calico-system(51cdf950-fd56-4099-b416-942f3ef06aee): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:43.760930 kubelet[2467]: E1002 19:19:43.760820 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:19:44.133821 env[1311]: time="2023-10-02T19:19:44.133723158Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:19:44.437770 env[1311]: time="2023-10-02T19:19:44.437610217Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:44.442461 env[1311]: time="2023-10-02T19:19:44.442336595Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:44.442770 kubelet[2467]: E1002 19:19:44.442739 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:19:44.442890 kubelet[2467]: E1002 19:19:44.442786 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:19:44.442978 kubelet[2467]: E1002 19:19:44.442927 2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-8p57v,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-89fvv_calico-apiserver(57e4bdff-509a-4176-905b-82f7b771260a): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:44.443116 kubelet[2467]: E1002 19:19:44.443001 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:19:45.133674 kubelet[2467]: E1002 19:19:45.133638 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:19:46.297375 systemd[1]: cri-containerd-2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324.scope: Deactivated successfully. Oct 2 19:19:46.297695 systemd[1]: cri-containerd-2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324.scope: Consumed 3.152s CPU time. Oct 2 19:19:46.298000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:19:46.305053 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:19:46.305130 kernel: audit: type=1334 audit(1696274386.298:1441): prog-id=77 op=UNLOAD Oct 2 19:19:46.298000 audit: BPF prog-id=101 op=UNLOAD Oct 2 19:19:46.316270 kernel: audit: type=1334 audit(1696274386.298:1442): prog-id=101 op=UNLOAD Oct 2 19:19:46.327840 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324-rootfs.mount: Deactivated successfully. Oct 2 19:19:46.385682 env[1311]: time="2023-10-02T19:19:46.385612609Z" level=info msg="shim disconnected" id=2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324 Oct 2 19:19:46.385682 env[1311]: time="2023-10-02T19:19:46.385678710Z" level=warning msg="cleaning up after shim disconnected" id=2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324 namespace=k8s.io Oct 2 19:19:46.385682 env[1311]: time="2023-10-02T19:19:46.385692111Z" level=info msg="cleaning up dead shim" Oct 2 19:19:46.394667 env[1311]: time="2023-10-02T19:19:46.394621858Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:19:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6282 runtime=io.containerd.runc.v2\n" Oct 2 19:19:46.704480 kubelet[2467]: I1002 19:19:46.704445 2467 scope.go:115] "RemoveContainer" containerID="2e6613f27777fd48f27f364310043035edaa562d5831fc021aab7a7437648324" Oct 2 19:19:46.706694 env[1311]: time="2023-10-02T19:19:46.706646305Z" level=info msg="CreateContainer within sandbox \"7cfd20c37937a8d66ec1929030c7766ffdff3dd8f90e632aeb052fcbc3c6e703\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Oct 2 19:19:46.718062 systemd[1]: cri-containerd-aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d.scope: Deactivated successfully. Oct 2 19:19:46.716000 audit: BPF prog-id=118 op=UNLOAD Oct 2 19:19:46.718396 systemd[1]: cri-containerd-aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d.scope: Consumed 2.904s CPU time. Oct 2 19:19:46.725011 kernel: audit: type=1334 audit(1696274386.716:1443): prog-id=118 op=UNLOAD Oct 2 19:19:46.725000 audit: BPF prog-id=121 op=UNLOAD Oct 2 19:19:46.733969 kernel: audit: type=1334 audit(1696274386.725:1444): prog-id=121 op=UNLOAD Oct 2 19:19:46.740653 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2579578273.mount: Deactivated successfully. Oct 2 19:19:46.757075 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d-rootfs.mount: Deactivated successfully. Oct 2 19:19:46.764487 env[1311]: time="2023-10-02T19:19:46.764436758Z" level=info msg="CreateContainer within sandbox \"7cfd20c37937a8d66ec1929030c7766ffdff3dd8f90e632aeb052fcbc3c6e703\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"64b0065cdb7e6c78350a15be425c1717ee3128312ec5d98d8b8376693ebd1493\"" Oct 2 19:19:46.766892 env[1311]: time="2023-10-02T19:19:46.765020968Z" level=info msg="StartContainer for \"64b0065cdb7e6c78350a15be425c1717ee3128312ec5d98d8b8376693ebd1493\"" Oct 2 19:19:46.774431 kubelet[2467]: E1002 19:19:46.774404 2467 controller.go:189] failed to update lease, error: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.37:41374->10.200.8.24:2379: read: connection timed out Oct 2 19:19:46.776275 env[1311]: time="2023-10-02T19:19:46.775660744Z" level=info msg="shim disconnected" id=aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d Oct 2 19:19:46.776275 env[1311]: time="2023-10-02T19:19:46.775733245Z" level=warning msg="cleaning up after shim disconnected" id=aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d namespace=k8s.io Oct 2 19:19:46.776275 env[1311]: time="2023-10-02T19:19:46.775746945Z" level=info msg="cleaning up dead shim" Oct 2 19:19:46.789961 env[1311]: time="2023-10-02T19:19:46.789898578Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:19:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6314 runtime=io.containerd.runc.v2\n" Oct 2 19:19:46.795273 systemd[1]: Started cri-containerd-64b0065cdb7e6c78350a15be425c1717ee3128312ec5d98d8b8376693ebd1493.scope. Oct 2 19:19:46.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.839364 kernel: audit: type=1400 audit(1696274386.808:1445): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.839500 kernel: audit: type=1400 audit(1696274386.808:1446): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.852830 kernel: audit: type=1400 audit(1696274386.808:1447): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.879077 kernel: audit: type=1400 audit(1696274386.808:1448): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.879188 kernel: audit: type=1400 audit(1696274386.808:1449): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.892597 kernel: audit: type=1400 audit(1696274386.808:1450): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.824000 audit: BPF prog-id=183 op=LOAD Oct 2 19:19:46.825000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.825000 audit[6315]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2148 pid=6315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634623030363563646237653663373833353061313562653432356331 Oct 2 19:19:46.825000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.825000 audit[6315]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2148 pid=6315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634623030363563646237653663373833353061313562653432356331 Oct 2 19:19:46.825000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.825000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.825000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.825000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.825000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.825000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.825000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.825000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.825000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.825000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.825000 audit: BPF prog-id=184 op=LOAD Oct 2 19:19:46.825000 audit[6315]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d2620 items=0 ppid=2148 pid=6315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634623030363563646237653663373833353061313562653432356331 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit: BPF prog-id=185 op=LOAD Oct 2 19:19:46.837000 audit[6315]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d2668 items=0 ppid=2148 pid=6315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634623030363563646237653663373833353061313562653432356331 Oct 2 19:19:46.837000 audit: BPF prog-id=185 op=UNLOAD Oct 2 19:19:46.837000 audit: BPF prog-id=184 op=UNLOAD Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { perfmon } for pid=6315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit[6315]: AVC avc: denied { bpf } for pid=6315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.837000 audit: BPF prog-id=186 op=LOAD Oct 2 19:19:46.837000 audit[6315]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d2a78 items=0 ppid=2148 pid=6315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634623030363563646237653663373833353061313562653432356331 Oct 2 19:19:46.930386 env[1311]: time="2023-10-02T19:19:46.930335595Z" level=info msg="StartContainer for \"64b0065cdb7e6c78350a15be425c1717ee3128312ec5d98d8b8376693ebd1493\" returns successfully" Oct 2 19:19:47.467000 audit[6340]: AVC avc: denied { watch } for pid=6340 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:47.467000 audit[6340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0000566f0 a2=fc6 a3=0 items=0 ppid=2148 pid=6340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:19:47.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:47.468000 audit[6340]: AVC avc: denied { watch } for pid=6340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:47.468000 audit[6340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ae2040 a2=fc6 a3=0 items=0 ppid=2148 pid=6340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c213 key=(null) Oct 2 19:19:47.468000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:47.710400 kubelet[2467]: I1002 19:19:47.710368 2467 scope.go:115] "RemoveContainer" containerID="aaafb762eadc919a45b59399bb7550b570c89de68f6ca45cc29f9701e15a928d" Oct 2 19:19:47.712270 env[1311]: time="2023-10-02T19:19:47.712224341Z" level=info msg="CreateContainer within sandbox \"47f7d670a8c840eae4ef74d5f911355a0a785190f677ac3d8dc3411c0f298b1a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Oct 2 19:19:47.739797 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount482928318.mount: Deactivated successfully. Oct 2 19:19:47.757249 env[1311]: time="2023-10-02T19:19:47.757147179Z" level=info msg="CreateContainer within sandbox \"47f7d670a8c840eae4ef74d5f911355a0a785190f677ac3d8dc3411c0f298b1a\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"8e376fc37a6f236d413b473b6d2de6bcb06435179f12b2c205d4a63dcb20cfdb\"" Oct 2 19:19:47.758266 env[1311]: time="2023-10-02T19:19:47.758186396Z" level=info msg="StartContainer for \"8e376fc37a6f236d413b473b6d2de6bcb06435179f12b2c205d4a63dcb20cfdb\"" Oct 2 19:19:47.779206 systemd[1]: Started cri-containerd-8e376fc37a6f236d413b473b6d2de6bcb06435179f12b2c205d4a63dcb20cfdb.scope. Oct 2 19:19:47.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.794000 audit: BPF prog-id=187 op=LOAD Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { bpf } for pid=6377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2615 pid=6377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865333736666333376136663233366434313362343733623664326465 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2615 pid=6377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865333736666333376136663233366434313362343733623664326465 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { bpf } for pid=6377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { bpf } for pid=6377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { bpf } for pid=6377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { bpf } for pid=6377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { bpf } for pid=6377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit: BPF prog-id=188 op=LOAD Oct 2 19:19:47.795000 audit[6377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001cc1d0 items=0 ppid=2615 pid=6377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865333736666333376136663233366434313362343733623664326465 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { bpf } for pid=6377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { bpf } for pid=6377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { bpf } for pid=6377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { bpf } for pid=6377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit: BPF prog-id=189 op=LOAD Oct 2 19:19:47.795000 audit[6377]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001cc218 items=0 ppid=2615 pid=6377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865333736666333376136663233366434313362343733623664326465 Oct 2 19:19:47.795000 audit: BPF prog-id=189 op=UNLOAD Oct 2 19:19:47.795000 audit: BPF prog-id=188 op=UNLOAD Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { bpf } for pid=6377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { bpf } for pid=6377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { bpf } for pid=6377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { perfmon } for pid=6377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { bpf } for pid=6377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit[6377]: AVC avc: denied { bpf } for pid=6377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.795000 audit: BPF prog-id=190 op=LOAD Oct 2 19:19:47.795000 audit[6377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001cc628 items=0 ppid=2615 pid=6377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865333736666333376136663233366434313362343733623664326465 Oct 2 19:19:47.800790 kubelet[2467]: E1002 19:19:47.798064 2467 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33.178a608f1527e3cc", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.0-a-e4b0ec5c33", UID:"0e9923d274f84de35f2a55d22e743214", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-e4b0ec5c33"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 19, 37, 309938636, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 19, 37, 309938636, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.37:41192->10.200.8.24:2379: read: connection timed out' (will not retry!) Oct 2 19:19:47.820211 env[1311]: time="2023-10-02T19:19:47.820165714Z" level=info msg="StartContainer for \"8e376fc37a6f236d413b473b6d2de6bcb06435179f12b2c205d4a63dcb20cfdb\" returns successfully" Oct 2 19:19:50.466000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:50.466000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c013e77170 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:19:50.466000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:19:50.485000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7151 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:50.485000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c013e77290 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:19:50.485000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:19:50.500000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:50.500000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00e59f840 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:19:50.500000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:19:50.501000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:50.501000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c013fc2f60 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:19:50.501000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:19:50.553000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7147 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:50.553000 audit[2343]: AVC avc: denied { watch } for pid=2343 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6873 scontext=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:50.553000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00e59f880 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:19:50.553000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:19:50.553000 audit[2343]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c013fc30e0 a2=fc6 a3=0 items=0 ppid=2205 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c412,c896 key=(null) Oct 2 19:19:50.553000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:19:51.918411 systemd[1]: cri-containerd-92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966.scope: Deactivated successfully. Oct 2 19:19:51.918732 systemd[1]: cri-containerd-92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966.scope: Consumed 1.322s CPU time. Oct 2 19:19:51.921000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:19:51.929725 kernel: kauditd_printk_skb: 132 callbacks suppressed Oct 2 19:19:51.929821 kernel: audit: type=1334 audit(1696274391.921:1489): prog-id=85 op=UNLOAD Oct 2 19:19:51.937515 kernel: audit: type=1334 audit(1696274391.921:1490): prog-id=92 op=UNLOAD Oct 2 19:19:51.921000 audit: BPF prog-id=92 op=UNLOAD Oct 2 19:19:51.943261 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966-rootfs.mount: Deactivated successfully. Oct 2 19:19:52.022029 env[1311]: time="2023-10-02T19:19:52.021685401Z" level=info msg="shim disconnected" id=92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966 Oct 2 19:19:52.022029 env[1311]: time="2023-10-02T19:19:52.021737602Z" level=warning msg="cleaning up after shim disconnected" id=92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966 namespace=k8s.io Oct 2 19:19:52.022029 env[1311]: time="2023-10-02T19:19:52.021750902Z" level=info msg="cleaning up dead shim" Oct 2 19:19:52.031236 env[1311]: time="2023-10-02T19:19:52.031194454Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:19:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6419 runtime=io.containerd.runc.v2\n" Oct 2 19:19:52.726118 kubelet[2467]: I1002 19:19:52.726088 2467 scope.go:115] "RemoveContainer" containerID="92ea080c2fe2352b2049a2bcda58e3e398ac073c2d90f83f4b5c9fd1dcfcc966" Oct 2 19:19:52.728218 env[1311]: time="2023-10-02T19:19:52.728172758Z" level=info msg="CreateContainer within sandbox \"41eab9d7fec589018a511777f98d420398c4fee6f7543b8fc333624aa63a3303\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Oct 2 19:19:52.759144 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3096708193.mount: Deactivated successfully. Oct 2 19:19:52.776060 env[1311]: time="2023-10-02T19:19:52.776011427Z" level=info msg="CreateContainer within sandbox \"41eab9d7fec589018a511777f98d420398c4fee6f7543b8fc333624aa63a3303\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"654499c01c67a3f261d3ea86e117d924d0762b0b696b80b31ecfb59cba1d3b20\"" Oct 2 19:19:52.776484 env[1311]: time="2023-10-02T19:19:52.776454134Z" level=info msg="StartContainer for \"654499c01c67a3f261d3ea86e117d924d0762b0b696b80b31ecfb59cba1d3b20\"" Oct 2 19:19:52.795326 systemd[1]: Started cri-containerd-654499c01c67a3f261d3ea86e117d924d0762b0b696b80b31ecfb59cba1d3b20.scope. Oct 2 19:19:52.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.838935 kernel: audit: type=1400 audit(1696274392.809:1491): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839078 kernel: audit: type=1400 audit(1696274392.809:1492): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.858000 kernel: audit: type=1400 audit(1696274392.809:1493): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.886206 kernel: audit: type=1400 audit(1696274392.809:1494): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.886293 kernel: audit: type=1400 audit(1696274392.809:1495): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.886317 kernel: audit: type=1400 audit(1696274392.809:1496): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.912590 kernel: audit: type=1400 audit(1696274392.809:1497): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.926766 kernel: audit: type=1400 audit(1696274392.809:1498): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.838000 audit: BPF prog-id=191 op=LOAD Oct 2 19:19:52.838000 audit[6439]: AVC avc: denied { bpf } for pid=6439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.838000 audit[6439]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2172 pid=6439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:52.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343439396330316336376133663236316433656138366531313764 Oct 2 19:19:52.838000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.838000 audit[6439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2172 pid=6439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:52.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343439396330316336376133663236316433656138366531313764 Oct 2 19:19:52.838000 audit[6439]: AVC avc: denied { bpf } for pid=6439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.838000 audit[6439]: AVC avc: denied { bpf } for pid=6439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.838000 audit[6439]: AVC avc: denied { bpf } for pid=6439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.838000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.838000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.838000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.838000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.838000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.838000 audit[6439]: AVC avc: denied { bpf } for pid=6439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.838000 audit[6439]: AVC avc: denied { bpf } for pid=6439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.838000 audit: BPF prog-id=192 op=LOAD Oct 2 19:19:52.838000 audit[6439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00021da60 items=0 ppid=2172 pid=6439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:52.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343439396330316336376133663236316433656138366531313764 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { bpf } for pid=6439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { bpf } for pid=6439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { bpf } for pid=6439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { bpf } for pid=6439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit: BPF prog-id=193 op=LOAD Oct 2 19:19:52.839000 audit[6439]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00021daa8 items=0 ppid=2172 pid=6439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:52.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343439396330316336376133663236316433656138366531313764 Oct 2 19:19:52.839000 audit: BPF prog-id=193 op=UNLOAD Oct 2 19:19:52.839000 audit: BPF prog-id=192 op=UNLOAD Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { bpf } for pid=6439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { bpf } for pid=6439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { bpf } for pid=6439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { perfmon } for pid=6439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { bpf } for pid=6439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit[6439]: AVC avc: denied { bpf } for pid=6439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:52.839000 audit: BPF prog-id=194 op=LOAD Oct 2 19:19:52.839000 audit[6439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00021deb8 items=0 ppid=2172 pid=6439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:52.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343439396330316336376133663236316433656138366531313764 Oct 2 19:19:52.934668 env[1311]: time="2023-10-02T19:19:52.934620877Z" level=info msg="StartContainer for \"654499c01c67a3f261d3ea86e117d924d0762b0b696b80b31ecfb59cba1d3b20\" returns successfully" Oct 2 19:19:53.507109 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.gZUdHA.mount: Deactivated successfully. Oct 2 19:19:56.775469 kubelet[2467]: E1002 19:19:56.775413 2467 controller.go:189] failed to update lease, error: Put "https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-e4b0ec5c33?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Oct 2 19:19:57.133796 kubelet[2467]: E1002 19:19:57.133771 2467 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-484pr" podUID=51cdf950-fd56-4099-b416-942f3ef06aee Oct 2 19:19:58.134169 env[1311]: time="2023-10-02T19:19:58.134100132Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:19:58.135834 kubelet[2467]: E1002 19:19:58.135720 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-89fvv" podUID=57e4bdff-509a-4176-905b-82f7b771260a Oct 2 19:19:58.436719 env[1311]: time="2023-10-02T19:19:58.436478377Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:19:58.439470 env[1311]: time="2023-10-02T19:19:58.439403923Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:19:58.439713 kubelet[2467]: E1002 19:19:58.439683 2467 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:19:58.439814 kubelet[2467]: E1002 19:19:58.439739 2467 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:19:58.439903 kubelet[2467]: E1002 19:19:58.439880 2467 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ltg65,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-5cd4d54db4-twr8h_calico-apiserver(565fa6da-ca7f-46dc-99b0-bf7e5cab228f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:19:58.440107 kubelet[2467]: E1002 19:19:58.439960 2467 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-5cd4d54db4-twr8h" podUID=565fa6da-ca7f-46dc-99b0-bf7e5cab228f Oct 2 19:20:03.549525 systemd[1]: run-containerd-runc-k8s.io-4fe6856d0881bc3e4900d4a795847857148924cc5ee1a96ab491c860bad06aef-runc.nZU5Vn.mount: Deactivated successfully. Oct 2 19:20:06.776293 kubelet[2467]: E1002 19:20:06.776047 2467 controller.go:189] failed to update lease, error: Put "https://10.200.8.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-e4b0ec5c33?timeout=10s": context deadline exceeded (Client.Timeout exceeded while awaiting headers)