Oct 2 19:17:43.023896 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:17:43.023921 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:17:43.023932 kernel: BIOS-provided physical RAM map: Oct 2 19:17:43.023939 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Oct 2 19:17:43.023947 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Oct 2 19:17:43.023953 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Oct 2 19:17:43.023975 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Oct 2 19:17:43.023982 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Oct 2 19:17:43.023987 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Oct 2 19:17:43.023993 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Oct 2 19:17:43.023999 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Oct 2 19:17:43.024004 kernel: printk: bootconsole [earlyser0] enabled Oct 2 19:17:43.024009 kernel: NX (Execute Disable) protection: active Oct 2 19:17:43.024015 kernel: efi: EFI v2.70 by Microsoft Oct 2 19:17:43.024025 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c9a98 RNG=0x3ffd1018 Oct 2 19:17:43.024031 kernel: random: crng init done Oct 2 19:17:43.024039 kernel: SMBIOS 3.1.0 present. Oct 2 19:17:43.024046 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022 Oct 2 19:17:43.024052 kernel: Hypervisor detected: Microsoft Hyper-V Oct 2 19:17:43.024058 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Oct 2 19:17:43.024064 kernel: Hyper-V Host Build:20348-10.0-1-0.1462 Oct 2 19:17:43.024070 kernel: Hyper-V: Nested features: 0x1e0101 Oct 2 19:17:43.024078 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Oct 2 19:17:43.024084 kernel: Hyper-V: Using hypercall for remote TLB flush Oct 2 19:17:43.024090 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Oct 2 19:17:43.024096 kernel: tsc: Marking TSC unstable due to running on Hyper-V Oct 2 19:17:43.024103 kernel: tsc: Detected 2593.907 MHz processor Oct 2 19:17:43.024112 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:17:43.024119 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:17:43.024125 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Oct 2 19:17:43.024134 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:17:43.024141 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Oct 2 19:17:43.024149 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Oct 2 19:17:43.024158 kernel: Using GB pages for direct mapping Oct 2 19:17:43.024165 kernel: Secure boot disabled Oct 2 19:17:43.024171 kernel: ACPI: Early table checksum verification disabled Oct 2 19:17:43.024180 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Oct 2 19:17:43.024187 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:17:43.024194 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:17:43.024203 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Oct 2 19:17:43.024215 kernel: ACPI: FACS 0x000000003FFFE000 000040 Oct 2 19:17:43.024224 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:17:43.024231 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:17:43.024239 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:17:43.024248 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:17:43.024255 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:17:43.024266 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:17:43.024273 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:17:43.024280 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Oct 2 19:17:43.024290 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Oct 2 19:17:43.024296 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Oct 2 19:17:43.024305 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Oct 2 19:17:43.024313 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Oct 2 19:17:43.024320 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Oct 2 19:17:43.024332 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Oct 2 19:17:43.024339 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Oct 2 19:17:43.024346 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Oct 2 19:17:43.024357 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Oct 2 19:17:43.024364 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:17:43.024374 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:17:43.024383 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Oct 2 19:17:43.024391 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Oct 2 19:17:43.024401 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Oct 2 19:17:43.024412 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Oct 2 19:17:43.024421 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Oct 2 19:17:43.024429 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Oct 2 19:17:43.024436 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Oct 2 19:17:43.024445 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Oct 2 19:17:43.024453 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Oct 2 19:17:43.024459 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Oct 2 19:17:43.024469 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Oct 2 19:17:43.024476 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Oct 2 19:17:43.024487 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Oct 2 19:17:43.024495 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Oct 2 19:17:43.024502 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Oct 2 19:17:43.024508 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Oct 2 19:17:43.024518 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Oct 2 19:17:43.024525 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Oct 2 19:17:43.024532 kernel: Zone ranges: Oct 2 19:17:43.024539 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:17:43.024545 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 2 19:17:43.024554 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Oct 2 19:17:43.024561 kernel: Movable zone start for each node Oct 2 19:17:43.024571 kernel: Early memory node ranges Oct 2 19:17:43.024577 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Oct 2 19:17:43.024584 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Oct 2 19:17:43.024591 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Oct 2 19:17:43.024603 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Oct 2 19:17:43.024615 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Oct 2 19:17:43.024622 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:17:43.024632 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Oct 2 19:17:43.024641 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Oct 2 19:17:43.024647 kernel: ACPI: PM-Timer IO Port: 0x408 Oct 2 19:17:43.024656 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Oct 2 19:17:43.024664 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Oct 2 19:17:43.024671 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:17:43.024681 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:17:43.024688 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Oct 2 19:17:43.024695 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:17:43.024706 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Oct 2 19:17:43.024713 kernel: Booting paravirtualized kernel on Hyper-V Oct 2 19:17:43.024722 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:17:43.024730 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:17:43.024746 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:17:43.024753 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:17:43.024761 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:17:43.024770 kernel: Hyper-V: PV spinlocks enabled Oct 2 19:17:43.024777 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:17:43.024789 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Oct 2 19:17:43.024796 kernel: Policy zone: Normal Oct 2 19:17:43.024805 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:17:43.024814 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:17:43.024823 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Oct 2 19:17:43.024831 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 19:17:43.024841 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:17:43.024850 kernel: Memory: 8081204K/8387460K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 305996K reserved, 0K cma-reserved) Oct 2 19:17:43.024861 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:17:43.024869 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:17:43.024886 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:17:43.024896 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:17:43.024906 kernel: rcu: RCU event tracing is enabled. Oct 2 19:17:43.024913 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:17:43.024924 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:17:43.024931 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:17:43.024940 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:17:43.024948 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:17:43.024956 kernel: Using NULL legacy PIC Oct 2 19:17:43.024968 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Oct 2 19:17:43.024975 kernel: Console: colour dummy device 80x25 Oct 2 19:17:43.024983 kernel: printk: console [tty1] enabled Oct 2 19:17:43.024992 kernel: printk: console [ttyS0] enabled Oct 2 19:17:43.024999 kernel: printk: bootconsole [earlyser0] disabled Oct 2 19:17:43.025011 kernel: ACPI: Core revision 20210730 Oct 2 19:17:43.025018 kernel: Failed to register legacy timer interrupt Oct 2 19:17:43.025027 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:17:43.025036 kernel: Hyper-V: Using IPI hypercalls Oct 2 19:17:43.025043 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593907) Oct 2 19:17:43.025059 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:17:43.025067 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:17:43.025074 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:17:43.025084 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:17:43.025091 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:17:43.025104 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:17:43.025111 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Oct 2 19:17:43.025119 kernel: RETBleed: Vulnerable Oct 2 19:17:43.025128 kernel: Speculative Store Bypass: Vulnerable Oct 2 19:17:43.025135 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:17:43.025145 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:17:43.025153 kernel: GDS: Unknown: Dependent on hypervisor status Oct 2 19:17:43.025160 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:17:43.025171 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:17:43.025178 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:17:43.025190 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Oct 2 19:17:43.025198 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Oct 2 19:17:43.025206 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Oct 2 19:17:43.025215 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:17:43.025224 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Oct 2 19:17:43.025233 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Oct 2 19:17:43.025243 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Oct 2 19:17:43.025253 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Oct 2 19:17:43.025261 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:17:43.025270 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:17:43.025280 kernel: LSM: Security Framework initializing Oct 2 19:17:43.025287 kernel: SELinux: Initializing. Oct 2 19:17:43.025298 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:17:43.025307 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:17:43.025314 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Oct 2 19:17:43.025324 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Oct 2 19:17:43.025332 kernel: signal: max sigframe size: 3632 Oct 2 19:17:43.025340 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:17:43.025349 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:17:43.025356 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:17:43.025367 kernel: x86: Booting SMP configuration: Oct 2 19:17:43.025374 kernel: .... node #0, CPUs: #1 Oct 2 19:17:43.025386 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Oct 2 19:17:43.025395 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:17:43.025402 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:17:43.025412 kernel: smpboot: Max logical packages: 1 Oct 2 19:17:43.025419 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Oct 2 19:17:43.025428 kernel: devtmpfs: initialized Oct 2 19:17:43.025437 kernel: x86/mm: Memory block size: 128MB Oct 2 19:17:43.025444 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Oct 2 19:17:43.025456 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:17:43.025463 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:17:43.025471 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:17:43.025481 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:17:43.025488 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:17:43.025499 kernel: audit: type=2000 audit(1696274262.023:1): state=initialized audit_enabled=0 res=1 Oct 2 19:17:43.025506 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:17:43.025514 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:17:43.025524 kernel: cpuidle: using governor menu Oct 2 19:17:43.025533 kernel: ACPI: bus type PCI registered Oct 2 19:17:43.025543 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:17:43.025551 kernel: dca service started, version 1.12.1 Oct 2 19:17:43.025559 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:17:43.025568 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:17:43.025576 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:17:43.025586 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:17:43.025593 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:17:43.025601 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:17:43.025613 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:17:43.025624 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:17:43.025633 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:17:43.025641 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:17:43.025652 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 19:17:43.025661 kernel: ACPI: Interpreter enabled Oct 2 19:17:43.025669 kernel: ACPI: PM: (supports S0 S5) Oct 2 19:17:43.025679 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:17:43.025686 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:17:43.025698 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Oct 2 19:17:43.025706 kernel: iommu: Default domain type: Translated Oct 2 19:17:43.025714 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:17:43.025723 kernel: vgaarb: loaded Oct 2 19:17:43.025730 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:17:43.025745 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:17:43.025756 kernel: PTP clock support registered Oct 2 19:17:43.025765 kernel: Registered efivars operations Oct 2 19:17:43.025777 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:17:43.025786 kernel: PCI: System does not support PCI Oct 2 19:17:43.025800 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Oct 2 19:17:43.025809 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:17:43.025819 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:17:43.025829 kernel: pnp: PnP ACPI init Oct 2 19:17:43.025837 kernel: pnp: PnP ACPI: found 3 devices Oct 2 19:17:43.025844 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:17:43.025854 kernel: NET: Registered PF_INET protocol family Oct 2 19:17:43.025862 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:17:43.025874 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Oct 2 19:17:43.025882 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:17:43.025890 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:17:43.025900 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 2 19:17:43.025910 kernel: TCP: Hash tables configured (established 65536 bind 65536) Oct 2 19:17:43.025919 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:17:43.025929 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:17:43.025939 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:17:43.025947 kernel: NET: Registered PF_XDP protocol family Oct 2 19:17:43.025960 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:17:43.025970 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 2 19:17:43.025979 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Oct 2 19:17:43.025989 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:17:43.026000 kernel: Initialise system trusted keyrings Oct 2 19:17:43.026010 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Oct 2 19:17:43.026020 kernel: Key type asymmetric registered Oct 2 19:17:43.026032 kernel: Asymmetric key parser 'x509' registered Oct 2 19:17:43.026044 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:17:43.026059 kernel: io scheduler mq-deadline registered Oct 2 19:17:43.026070 kernel: io scheduler kyber registered Oct 2 19:17:43.026081 kernel: io scheduler bfq registered Oct 2 19:17:43.026091 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:17:43.026100 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:17:43.026109 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:17:43.026120 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Oct 2 19:17:43.026129 kernel: i8042: PNP: No PS/2 controller found. Oct 2 19:17:43.026260 kernel: rtc_cmos 00:02: registered as rtc0 Oct 2 19:17:43.026340 kernel: rtc_cmos 00:02: setting system clock to 2023-10-02T19:17:42 UTC (1696274262) Oct 2 19:17:43.026411 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Oct 2 19:17:43.026422 kernel: fail to initialize ptp_kvm Oct 2 19:17:43.026430 kernel: intel_pstate: CPU model not supported Oct 2 19:17:43.026441 kernel: efifb: probing for efifb Oct 2 19:17:43.026450 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Oct 2 19:17:43.026459 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Oct 2 19:17:43.026467 kernel: efifb: scrolling: redraw Oct 2 19:17:43.026477 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Oct 2 19:17:43.026487 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 19:17:43.026496 kernel: fb0: EFI VGA frame buffer device Oct 2 19:17:43.026504 kernel: pstore: Registered efi as persistent store backend Oct 2 19:17:43.026512 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:17:43.026522 kernel: Segment Routing with IPv6 Oct 2 19:17:43.026532 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:17:43.026539 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:17:43.026549 kernel: Key type dns_resolver registered Oct 2 19:17:43.026560 kernel: IPI shorthand broadcast: enabled Oct 2 19:17:43.026569 kernel: sched_clock: Marking stable (725606000, 21757400)->(931602900, -184239500) Oct 2 19:17:43.026577 kernel: registered taskstats version 1 Oct 2 19:17:43.026587 kernel: Loading compiled-in X.509 certificates Oct 2 19:17:43.026595 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:17:43.026605 kernel: Key type .fscrypt registered Oct 2 19:17:43.026612 kernel: Key type fscrypt-provisioning registered Oct 2 19:17:43.026621 kernel: pstore: Using crash dump compression: deflate Oct 2 19:17:43.026632 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:17:43.026642 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:17:43.026649 kernel: ima: No architecture policies found Oct 2 19:17:43.026659 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:17:43.026667 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:17:43.026677 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:17:43.026684 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:17:43.026694 kernel: Run /init as init process Oct 2 19:17:43.026702 kernel: with arguments: Oct 2 19:17:43.026713 kernel: /init Oct 2 19:17:43.026722 kernel: with environment: Oct 2 19:17:43.026732 kernel: HOME=/ Oct 2 19:17:43.026765 kernel: TERM=linux Oct 2 19:17:43.026774 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:17:43.026786 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:17:43.026796 systemd[1]: Detected virtualization microsoft. Oct 2 19:17:43.026807 systemd[1]: Detected architecture x86-64. Oct 2 19:17:43.026819 systemd[1]: Running in initrd. Oct 2 19:17:43.026827 systemd[1]: No hostname configured, using default hostname. Oct 2 19:17:43.026835 systemd[1]: Hostname set to . Oct 2 19:17:43.026846 systemd[1]: Initializing machine ID from random generator. Oct 2 19:17:43.026857 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:17:43.026864 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:17:43.026874 systemd[1]: Reached target cryptsetup.target. Oct 2 19:17:43.026883 systemd[1]: Reached target paths.target. Oct 2 19:17:43.026893 systemd[1]: Reached target slices.target. Oct 2 19:17:43.026903 systemd[1]: Reached target swap.target. Oct 2 19:17:43.026913 systemd[1]: Reached target timers.target. Oct 2 19:17:43.026922 systemd[1]: Listening on iscsid.socket. Oct 2 19:17:43.026932 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:17:43.026940 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:17:43.026951 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:17:43.026960 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:17:43.026972 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:17:43.026980 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:17:43.026990 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:17:43.027001 systemd[1]: Reached target sockets.target. Oct 2 19:17:43.027009 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:17:43.027018 systemd[1]: Finished network-cleanup.service. Oct 2 19:17:43.027028 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:17:43.027039 systemd[1]: Starting systemd-journald.service... Oct 2 19:17:43.027047 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:17:43.027058 systemd[1]: Starting systemd-resolved.service... Oct 2 19:17:43.027067 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:17:43.027076 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:17:43.027086 kernel: audit: type=1130 audit(1696274263.025:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.027098 systemd-journald[183]: Journal started Oct 2 19:17:43.027145 systemd-journald[183]: Runtime Journal (/run/log/journal/59f7edd9abdd485c99d0b2110f39f681) is 8.0M, max 159.0M, 151.0M free. Oct 2 19:17:43.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.013795 systemd-modules-load[184]: Inserted module 'overlay' Oct 2 19:17:43.044865 systemd[1]: Started systemd-journald.service. Oct 2 19:17:43.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.070770 kernel: audit: type=1130 audit(1696274263.051:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.070821 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:17:43.062541 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:17:43.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.074685 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:17:43.089448 kernel: audit: type=1130 audit(1696274263.074:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.090546 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:17:43.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.108977 kernel: audit: type=1130 audit(1696274263.089:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.106150 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:17:43.119683 kernel: Bridge firewalling registered Oct 2 19:17:43.118645 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:17:43.122760 systemd-modules-load[184]: Inserted module 'br_netfilter' Oct 2 19:17:43.135581 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:17:43.138714 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:17:43.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.158889 kernel: audit: type=1130 audit(1696274263.117:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.159589 systemd-resolved[185]: Positive Trust Anchors: Oct 2 19:17:43.159606 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:17:43.159655 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:17:43.181999 systemd-resolved[185]: Defaulting to hostname 'linux'. Oct 2 19:17:43.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.195385 systemd[1]: Started systemd-resolved.service. Oct 2 19:17:43.205200 kernel: audit: type=1130 audit(1696274263.137:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.205230 kernel: SCSI subsystem initialized Oct 2 19:17:43.205247 dracut-cmdline[202]: dracut-dracut-053 Oct 2 19:17:43.200453 systemd[1]: Reached target nss-lookup.target. Oct 2 19:17:43.209853 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:17:43.233787 kernel: audit: type=1130 audit(1696274263.200:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.256440 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:17:43.256500 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:17:43.257014 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:17:43.265705 systemd-modules-load[184]: Inserted module 'dm_multipath' Oct 2 19:17:43.268720 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:17:43.287534 kernel: audit: type=1130 audit(1696274263.271:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.287808 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:17:43.300101 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:17:43.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.315754 kernel: audit: type=1130 audit(1696274263.303:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.319755 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:17:43.333764 kernel: iscsi: registered transport (tcp) Oct 2 19:17:43.357732 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:17:43.357805 kernel: QLogic iSCSI HBA Driver Oct 2 19:17:43.386887 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:17:43.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.392443 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:17:43.443761 kernel: raid6: avx512x4 gen() 18593 MB/s Oct 2 19:17:43.463753 kernel: raid6: avx512x4 xor() 8650 MB/s Oct 2 19:17:43.483752 kernel: raid6: avx512x2 gen() 18733 MB/s Oct 2 19:17:43.503756 kernel: raid6: avx512x2 xor() 29531 MB/s Oct 2 19:17:43.523750 kernel: raid6: avx512x1 gen() 18663 MB/s Oct 2 19:17:43.543751 kernel: raid6: avx512x1 xor() 26420 MB/s Oct 2 19:17:43.564750 kernel: raid6: avx2x4 gen() 18679 MB/s Oct 2 19:17:43.584752 kernel: raid6: avx2x4 xor() 7950 MB/s Oct 2 19:17:43.604749 kernel: raid6: avx2x2 gen() 18607 MB/s Oct 2 19:17:43.624754 kernel: raid6: avx2x2 xor() 21927 MB/s Oct 2 19:17:43.644749 kernel: raid6: avx2x1 gen() 13971 MB/s Oct 2 19:17:43.664751 kernel: raid6: avx2x1 xor() 19378 MB/s Oct 2 19:17:43.684753 kernel: raid6: sse2x4 gen() 11534 MB/s Oct 2 19:17:43.704751 kernel: raid6: sse2x4 xor() 7072 MB/s Oct 2 19:17:43.724749 kernel: raid6: sse2x2 gen() 12764 MB/s Oct 2 19:17:43.745752 kernel: raid6: sse2x2 xor() 7545 MB/s Oct 2 19:17:43.765749 kernel: raid6: sse2x1 gen() 11497 MB/s Oct 2 19:17:43.788494 kernel: raid6: sse2x1 xor() 5859 MB/s Oct 2 19:17:43.788525 kernel: raid6: using algorithm avx512x2 gen() 18733 MB/s Oct 2 19:17:43.788538 kernel: raid6: .... xor() 29531 MB/s, rmw enabled Oct 2 19:17:43.795510 kernel: raid6: using avx512x2 recovery algorithm Oct 2 19:17:43.810764 kernel: xor: automatically using best checksumming function avx Oct 2 19:17:43.905767 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:17:43.913837 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:17:43.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.918000 audit: BPF prog-id=7 op=LOAD Oct 2 19:17:43.918000 audit: BPF prog-id=8 op=LOAD Oct 2 19:17:43.920130 systemd[1]: Starting systemd-udevd.service... Oct 2 19:17:43.933636 systemd-udevd[384]: Using default interface naming scheme 'v252'. Oct 2 19:17:43.938296 systemd[1]: Started systemd-udevd.service. Oct 2 19:17:43.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.947107 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:17:43.962358 dracut-pre-trigger[400]: rd.md=0: removing MD RAID activation Oct 2 19:17:43.992574 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:17:43.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:43.997937 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:17:44.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:44.030806 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:17:44.075759 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:17:44.115486 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:17:44.115546 kernel: AES CTR mode by8 optimization enabled Oct 2 19:17:44.118460 kernel: hv_vmbus: Vmbus version:5.2 Oct 2 19:17:44.141759 kernel: hv_vmbus: registering driver hyperv_keyboard Oct 2 19:17:44.141807 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Oct 2 19:17:44.158185 kernel: hv_vmbus: registering driver hv_netvsc Oct 2 19:17:44.166351 kernel: hv_vmbus: registering driver hv_storvsc Oct 2 19:17:44.166416 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 19:17:44.170763 kernel: scsi host0: storvsc_host_t Oct 2 19:17:44.170831 kernel: scsi host1: storvsc_host_t Oct 2 19:17:44.178104 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Oct 2 19:17:44.184771 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Oct 2 19:17:44.198753 kernel: hv_vmbus: registering driver hid_hyperv Oct 2 19:17:44.213730 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Oct 2 19:17:44.213779 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Oct 2 19:17:44.223819 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Oct 2 19:17:44.224025 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Oct 2 19:17:44.224153 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 2 19:17:44.224164 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Oct 2 19:17:44.227765 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 2 19:17:44.238980 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Oct 2 19:17:44.239179 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Oct 2 19:17:44.240763 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Oct 2 19:17:44.245753 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:17:44.249759 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 2 19:17:44.375959 kernel: hv_netvsc 000d3adb-e4b8-000d-3adb-e4b8000d3adb eth0: VF slot 1 added Oct 2 19:17:44.390569 kernel: hv_vmbus: registering driver hv_pci Oct 2 19:17:44.390617 kernel: hv_pci 9c3cec37-0769-44e4-8eb7-00a2980d6837: PCI VMBus probing: Using version 0x10004 Oct 2 19:17:44.402438 kernel: hv_pci 9c3cec37-0769-44e4-8eb7-00a2980d6837: PCI host bridge to bus 0769:00 Oct 2 19:17:44.402617 kernel: pci_bus 0769:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Oct 2 19:17:44.402760 kernel: pci_bus 0769:00: No busn resource found for root bus, will use [bus 00-ff] Oct 2 19:17:44.411967 kernel: pci 0769:00:02.0: [15b3:1016] type 00 class 0x020000 Oct 2 19:17:44.422038 kernel: pci 0769:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Oct 2 19:17:44.439924 kernel: pci 0769:00:02.0: enabling Extended Tags Oct 2 19:17:44.457841 kernel: pci 0769:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 0769:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Oct 2 19:17:44.458066 kernel: pci_bus 0769:00: busn_res: [bus 00-ff] end is updated to 00 Oct 2 19:17:44.458192 kernel: pci 0769:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Oct 2 19:17:44.561761 kernel: mlx5_core 0769:00:02.0: firmware version: 14.30.1224 Oct 2 19:17:44.660801 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:17:44.668188 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (449) Oct 2 19:17:44.684599 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:17:44.723753 kernel: mlx5_core 0769:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Oct 2 19:17:44.835040 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:17:44.873890 kernel: mlx5_core 0769:00:02.0: Supported tc offload range - chains: 1, prios: 1 Oct 2 19:17:44.874094 kernel: mlx5_core 0769:00:02.0: mlx5e_tc_post_act_init:40:(pid 7): firmware level support is missing Oct 2 19:17:44.885824 kernel: hv_netvsc 000d3adb-e4b8-000d-3adb-e4b8000d3adb eth0: VF registering: eth1 Oct 2 19:17:44.886054 kernel: mlx5_core 0769:00:02.0 eth1: joined to eth0 Oct 2 19:17:44.891588 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:17:44.898652 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:17:44.904115 systemd[1]: Starting disk-uuid.service... Oct 2 19:17:44.920195 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:17:44.925758 kernel: mlx5_core 0769:00:02.0 enP1897s1: renamed from eth1 Oct 2 19:17:44.932002 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:17:44.941762 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:17:45.940759 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:17:45.942922 disk-uuid[555]: The operation has completed successfully. Oct 2 19:17:46.008401 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:17:46.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:46.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:46.008500 systemd[1]: Finished disk-uuid.service. Oct 2 19:17:46.023359 systemd[1]: Starting verity-setup.service... Oct 2 19:17:46.058763 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:17:46.303647 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:17:46.309263 systemd[1]: Finished verity-setup.service. Oct 2 19:17:46.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:46.313677 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:17:46.390782 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:17:46.390668 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:17:46.394243 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:17:46.398251 systemd[1]: Starting ignition-setup.service... Oct 2 19:17:46.406033 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:17:46.426598 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:17:46.426660 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:17:46.426680 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:17:46.473053 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:17:46.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:46.476000 audit: BPF prog-id=9 op=LOAD Oct 2 19:17:46.478145 systemd[1]: Starting systemd-networkd.service... Oct 2 19:17:46.490376 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:17:46.506906 systemd-networkd[823]: lo: Link UP Oct 2 19:17:46.506915 systemd-networkd[823]: lo: Gained carrier Oct 2 19:17:46.511089 systemd-networkd[823]: Enumeration completed Oct 2 19:17:46.511178 systemd[1]: Started systemd-networkd.service. Oct 2 19:17:46.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:46.515100 systemd[1]: Reached target network.target. Oct 2 19:17:46.515335 systemd-networkd[823]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:17:46.520659 systemd[1]: Starting iscsiuio.service... Oct 2 19:17:46.528615 systemd[1]: Started iscsiuio.service. Oct 2 19:17:46.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:46.531644 systemd[1]: Starting iscsid.service... Oct 2 19:17:46.538282 iscsid[832]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:17:46.538282 iscsid[832]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:17:46.538282 iscsid[832]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:17:46.538282 iscsid[832]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:17:46.559864 iscsid[832]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:17:46.559864 iscsid[832]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:17:46.567388 systemd[1]: Started iscsid.service. Oct 2 19:17:46.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:46.570030 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:17:46.581789 kernel: mlx5_core 0769:00:02.0 enP1897s1: Link up Oct 2 19:17:46.582474 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:17:46.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:46.586629 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:17:46.590241 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:17:46.593676 systemd[1]: Reached target remote-fs.target. Oct 2 19:17:46.598300 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:17:46.608127 systemd[1]: Finished ignition-setup.service. Oct 2 19:17:46.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:46.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:46.610322 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:17:46.614621 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:17:46.668782 kernel: hv_netvsc 000d3adb-e4b8-000d-3adb-e4b8000d3adb eth0: Data path switched to VF: enP1897s1 Oct 2 19:17:46.669124 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:17:46.669592 systemd-networkd[823]: enP1897s1: Link UP Oct 2 19:17:46.670076 systemd-networkd[823]: eth0: Link UP Oct 2 19:17:46.670549 systemd-networkd[823]: eth0: Gained carrier Oct 2 19:17:46.678945 systemd-networkd[823]: enP1897s1: Gained carrier Oct 2 19:17:46.705818 systemd-networkd[823]: eth0: DHCPv4 address 10.200.8.17/24, gateway 10.200.8.1 acquired from 168.63.129.16 Oct 2 19:17:48.061986 systemd-networkd[823]: eth0: Gained IPv6LL Oct 2 19:17:49.552153 ignition[847]: Ignition 2.14.0 Oct 2 19:17:49.552170 ignition[847]: Stage: fetch-offline Oct 2 19:17:49.552257 ignition[847]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:17:49.552309 ignition[847]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:17:49.662403 ignition[847]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:17:49.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:49.664157 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:17:49.688600 kernel: kauditd_printk_skb: 18 callbacks suppressed Oct 2 19:17:49.688632 kernel: audit: type=1130 audit(1696274269.667:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:49.662638 ignition[847]: parsed url from cmdline: "" Oct 2 19:17:49.669982 systemd[1]: Starting ignition-fetch.service... Oct 2 19:17:49.662644 ignition[847]: no config URL provided Oct 2 19:17:49.662651 ignition[847]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:17:49.662660 ignition[847]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:17:49.662667 ignition[847]: failed to fetch config: resource requires networking Oct 2 19:17:49.662983 ignition[847]: Ignition finished successfully Oct 2 19:17:49.678842 ignition[854]: Ignition 2.14.0 Oct 2 19:17:49.678849 ignition[854]: Stage: fetch Oct 2 19:17:49.678947 ignition[854]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:17:49.678972 ignition[854]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:17:49.682175 ignition[854]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:17:49.683930 ignition[854]: parsed url from cmdline: "" Oct 2 19:17:49.683938 ignition[854]: no config URL provided Oct 2 19:17:49.683950 ignition[854]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:17:49.683965 ignition[854]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:17:49.684025 ignition[854]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Oct 2 19:17:49.714447 ignition[854]: GET result: OK Oct 2 19:17:49.714639 ignition[854]: config has been read from IMDS userdata Oct 2 19:17:49.714682 ignition[854]: parsing config with SHA512: 73c7158eb956af97e36136e29f98a19a6b0428160666afcd68e1267da612f20d03423be18fc7a368e1ca2e4adf3b84d19ef8873379e7f843f2c09ef8d38218ee Oct 2 19:17:49.737503 unknown[854]: fetched base config from "system" Oct 2 19:17:49.740773 unknown[854]: fetched base config from "system" Oct 2 19:17:49.740787 unknown[854]: fetched user config from "azure" Oct 2 19:17:49.741279 ignition[854]: fetch: fetch complete Oct 2 19:17:49.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:49.745007 systemd[1]: Finished ignition-fetch.service. Oct 2 19:17:49.764435 kernel: audit: type=1130 audit(1696274269.748:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:49.741285 ignition[854]: fetch: fetch passed Oct 2 19:17:49.749758 systemd[1]: Starting ignition-kargs.service... Oct 2 19:17:49.741345 ignition[854]: Ignition finished successfully Oct 2 19:17:49.768806 ignition[860]: Ignition 2.14.0 Oct 2 19:17:49.768814 ignition[860]: Stage: kargs Oct 2 19:17:49.768927 ignition[860]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:17:49.768949 ignition[860]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:17:49.771393 ignition[860]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:17:49.792644 kernel: audit: type=1130 audit(1696274269.776:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:49.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:49.776967 systemd[1]: Finished ignition-kargs.service. Oct 2 19:17:49.774953 ignition[860]: kargs: kargs passed Oct 2 19:17:49.778726 systemd[1]: Starting ignition-disks.service... Oct 2 19:17:49.775003 ignition[860]: Ignition finished successfully Oct 2 19:17:49.798050 ignition[866]: Ignition 2.14.0 Oct 2 19:17:49.798057 ignition[866]: Stage: disks Oct 2 19:17:49.798154 ignition[866]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:17:49.798176 ignition[866]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:17:49.806382 systemd[1]: Finished ignition-disks.service. Oct 2 19:17:49.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:49.802003 ignition[866]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:17:49.827376 kernel: audit: type=1130 audit(1696274269.808:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:49.808568 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:17:49.804965 ignition[866]: disks: disks passed Oct 2 19:17:49.822875 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:17:49.805015 ignition[866]: Ignition finished successfully Oct 2 19:17:49.827396 systemd[1]: Reached target local-fs.target. Oct 2 19:17:49.831616 systemd[1]: Reached target sysinit.target. Oct 2 19:17:49.834807 systemd[1]: Reached target basic.target. Oct 2 19:17:49.841003 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:17:49.895568 systemd-fsck[874]: ROOT: clean, 603/7326000 files, 481068/7359488 blocks Oct 2 19:17:49.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:49.903711 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:17:49.922909 kernel: audit: type=1130 audit(1696274269.905:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:49.907198 systemd[1]: Mounting sysroot.mount... Oct 2 19:17:49.935756 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:17:49.935774 systemd[1]: Mounted sysroot.mount. Oct 2 19:17:49.937675 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:17:49.969458 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:17:49.972752 systemd[1]: Starting flatcar-metadata-hostname.service... Oct 2 19:17:49.974983 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:17:49.975029 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:17:49.980878 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:17:50.019184 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:17:50.022562 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:17:50.036762 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (885) Oct 2 19:17:50.041759 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:17:50.041797 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:17:50.047411 initrd-setup-root[890]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:17:50.052510 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:17:50.054592 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:17:50.066010 initrd-setup-root[916]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:17:50.082385 initrd-setup-root[924]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:17:50.090402 initrd-setup-root[932]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:17:50.508813 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:17:50.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:50.526519 kernel: audit: type=1130 audit(1696274270.510:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:50.525525 systemd[1]: Starting ignition-mount.service... Oct 2 19:17:50.529203 systemd[1]: Starting sysroot-boot.service... Oct 2 19:17:50.539233 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:17:50.539355 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:17:50.554130 systemd[1]: Finished sysroot-boot.service. Oct 2 19:17:50.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:50.570880 kernel: audit: type=1130 audit(1696274270.556:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:50.576553 ignition[954]: INFO : Ignition 2.14.0 Oct 2 19:17:50.576553 ignition[954]: INFO : Stage: mount Oct 2 19:17:50.580078 ignition[954]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:17:50.580078 ignition[954]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:17:50.592841 ignition[954]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:17:50.596877 ignition[954]: INFO : mount: mount passed Oct 2 19:17:50.598625 ignition[954]: INFO : Ignition finished successfully Oct 2 19:17:50.601287 systemd[1]: Finished ignition-mount.service. Oct 2 19:17:50.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:50.616770 kernel: audit: type=1130 audit(1696274270.603:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:51.352264 coreos-metadata[884]: Oct 02 19:17:51.352 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Oct 2 19:17:51.369285 coreos-metadata[884]: Oct 02 19:17:51.369 INFO Fetch successful Oct 2 19:17:51.404240 coreos-metadata[884]: Oct 02 19:17:51.404 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Oct 2 19:17:51.418648 coreos-metadata[884]: Oct 02 19:17:51.418 INFO Fetch successful Oct 2 19:17:51.436220 coreos-metadata[884]: Oct 02 19:17:51.436 INFO wrote hostname ci-3510.3.0-a-ed15fb6ad9 to /sysroot/etc/hostname Oct 2 19:17:51.442450 systemd[1]: Finished flatcar-metadata-hostname.service. Oct 2 19:17:51.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:51.445815 systemd[1]: Starting ignition-files.service... Oct 2 19:17:51.464708 kernel: audit: type=1130 audit(1696274271.444:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:17:51.468575 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:17:51.487934 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (964) Oct 2 19:17:51.487975 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:17:51.487994 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:17:51.494975 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:17:51.500003 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:17:51.512642 ignition[983]: INFO : Ignition 2.14.0 Oct 2 19:17:51.512642 ignition[983]: INFO : Stage: files Oct 2 19:17:51.516285 ignition[983]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:17:51.516285 ignition[983]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:17:51.530007 ignition[983]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:17:51.544783 ignition[983]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:17:51.547999 ignition[983]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:17:51.547999 ignition[983]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:17:51.587136 ignition[983]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:17:51.590857 ignition[983]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:17:51.603323 unknown[983]: wrote ssh authorized keys file for user: core Oct 2 19:17:51.605961 ignition[983]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:17:51.609393 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:17:51.613819 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 19:17:52.024104 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 19:17:52.235125 ignition[983]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 19:17:52.242437 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 19:17:52.242437 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:17:52.242437 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:17:52.600763 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 19:17:53.013853 ignition[983]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 19:17:53.022274 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 19:17:53.026994 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:17:53.026994 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:17:53.258532 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 19:17:55.048217 ignition[983]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Oct 2 19:17:55.057199 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:17:55.057199 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:17:55.057199 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:17:55.236644 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 19:17:58.897973 ignition[983]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Oct 2 19:17:58.905288 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:17:58.905288 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:17:58.905288 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:17:59.035000 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 19:18:00.482523 ignition[983]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Oct 2 19:18:00.491270 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:18:00.491270 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:18:00.491270 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:18:00.491270 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:18:00.491270 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:18:00.491270 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:18:00.491270 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:18:00.491270 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 19:18:00.491270 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:18:00.539550 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1453594868" Oct 2 19:18:00.539550 ignition[983]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1453594868": device or resource busy Oct 2 19:18:00.539550 ignition[983]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1453594868", trying btrfs: device or resource busy Oct 2 19:18:00.539550 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1453594868" Oct 2 19:18:00.559797 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (986) Oct 2 19:18:00.559821 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1453594868" Oct 2 19:18:00.559821 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem1453594868" Oct 2 19:18:00.559821 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem1453594868" Oct 2 19:18:00.559821 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 19:18:00.559821 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:18:00.559821 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:18:00.594832 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3119052420" Oct 2 19:18:00.594832 ignition[983]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3119052420": device or resource busy Oct 2 19:18:00.594832 ignition[983]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3119052420", trying btrfs: device or resource busy Oct 2 19:18:00.594832 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3119052420" Oct 2 19:18:00.614841 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3119052420" Oct 2 19:18:00.619791 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem3119052420" Oct 2 19:18:00.625687 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem3119052420" Oct 2 19:18:00.625687 ignition[983]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(13): [started] processing unit "nvidia.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(13): [finished] processing unit "nvidia.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(14): [started] processing unit "waagent.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(14): [finished] processing unit "waagent.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(1a): [started] setting preset to enabled for "waagent.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(1a): [finished] setting preset to enabled for "waagent.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:18:00.625687 ignition[983]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:18:00.663365 kernel: audit: type=1130 audit(1696274280.632:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.621272 systemd[1]: mnt-oem3119052420.mount: Deactivated successfully. Oct 2 19:18:00.663862 ignition[983]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:18:00.663862 ignition[983]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:18:00.663862 ignition[983]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:18:00.663862 ignition[983]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:18:00.663862 ignition[983]: INFO : files: files passed Oct 2 19:18:00.663862 ignition[983]: INFO : Ignition finished successfully Oct 2 19:18:00.775611 kernel: audit: type=1130 audit(1696274280.730:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.775650 kernel: audit: type=1130 audit(1696274280.747:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.775673 kernel: audit: type=1131 audit(1696274280.747:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.625694 systemd[1]: Finished ignition-files.service. Oct 2 19:18:00.645102 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:18:00.784654 initrd-setup-root-after-ignition[1007]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:18:00.648334 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:18:00.650523 systemd[1]: Starting ignition-quench.service... Oct 2 19:18:00.673894 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:18:00.822986 kernel: audit: type=1130 audit(1696274280.797:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.823012 kernel: audit: type=1131 audit(1696274280.797:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.730694 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:18:00.730817 systemd[1]: Finished ignition-quench.service. Oct 2 19:18:00.748088 systemd[1]: Reached target ignition-complete.target. Oct 2 19:18:00.772598 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:18:00.791878 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:18:00.791966 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:18:00.809369 systemd[1]: Reached target initrd-fs.target. Oct 2 19:18:00.827446 systemd[1]: Reached target initrd.target. Oct 2 19:18:00.842157 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:18:00.846224 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:18:00.857109 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:18:00.874554 kernel: audit: type=1130 audit(1696274280.859:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.874896 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:18:00.884329 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:18:00.888643 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:18:00.890759 systemd[1]: Stopped target timers.target. Oct 2 19:18:00.894427 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:18:00.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.894560 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:18:00.913707 kernel: audit: type=1131 audit(1696274280.898:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.910231 systemd[1]: Stopped target initrd.target. Oct 2 19:18:00.913780 systemd[1]: Stopped target basic.target. Oct 2 19:18:00.917412 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:18:00.921271 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:18:00.925460 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:18:00.929837 systemd[1]: Stopped target remote-fs.target. Oct 2 19:18:00.933913 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:18:00.937915 systemd[1]: Stopped target sysinit.target. Oct 2 19:18:00.941594 systemd[1]: Stopped target local-fs.target. Oct 2 19:18:00.945080 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:18:00.948797 systemd[1]: Stopped target swap.target. Oct 2 19:18:00.952213 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:18:00.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.952362 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:18:00.972412 kernel: audit: type=1131 audit(1696274280.955:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.967910 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:18:00.972473 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:18:00.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.972622 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:18:00.993285 kernel: audit: type=1131 audit(1696274280.976:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.989216 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:18:00.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.989371 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:18:00.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.993405 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:18:01.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:00.993501 systemd[1]: Stopped ignition-files.service. Oct 2 19:18:00.998142 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Oct 2 19:18:00.998269 systemd[1]: Stopped flatcar-metadata-hostname.service. Oct 2 19:18:01.005297 systemd[1]: Stopping ignition-mount.service... Oct 2 19:18:01.018810 ignition[1021]: INFO : Ignition 2.14.0 Oct 2 19:18:01.018810 ignition[1021]: INFO : Stage: umount Oct 2 19:18:01.018810 ignition[1021]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:18:01.018810 ignition[1021]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:18:01.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.014974 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:18:01.038933 ignition[1021]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:18:01.038933 ignition[1021]: INFO : umount: umount passed Oct 2 19:18:01.038933 ignition[1021]: INFO : Ignition finished successfully Oct 2 19:18:01.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.015168 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:18:01.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.021758 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:18:01.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.036566 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:18:01.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.037977 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:18:01.044352 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:18:01.044476 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:18:01.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.050530 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:18:01.050630 systemd[1]: Stopped ignition-mount.service. Oct 2 19:18:01.053719 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:18:01.053825 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:18:01.058411 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:18:01.058457 systemd[1]: Stopped ignition-disks.service. Oct 2 19:18:01.061530 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:18:01.061578 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:18:01.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.063450 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:18:01.063497 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:18:01.067778 systemd[1]: Stopped target network.target. Oct 2 19:18:01.073887 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:18:01.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.073937 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:18:01.078058 systemd[1]: Stopped target paths.target. Oct 2 19:18:01.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.081970 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:18:01.083793 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:18:01.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.085852 systemd[1]: Stopped target slices.target. Oct 2 19:18:01.133000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:18:01.089711 systemd[1]: Stopped target sockets.target. Oct 2 19:18:01.091672 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:18:01.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.091702 systemd[1]: Closed iscsid.socket. Oct 2 19:18:01.095009 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:18:01.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.095043 systemd[1]: Closed iscsiuio.socket. Oct 2 19:18:01.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.103079 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:18:01.103130 systemd[1]: Stopped ignition-setup.service. Oct 2 19:18:01.106841 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:18:01.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.110966 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:18:01.117556 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:18:01.118029 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:18:01.118121 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:18:01.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.118845 systemd-networkd[823]: eth0: DHCPv6 lease lost Oct 2 19:18:01.189000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:18:01.124028 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:18:01.124128 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:18:01.130426 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:18:01.130511 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:18:01.134185 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:18:01.134222 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:18:01.137612 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:18:01.137661 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:18:01.142451 systemd[1]: Stopping network-cleanup.service... Oct 2 19:18:01.146887 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:18:01.146945 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:18:01.149027 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:18:01.149067 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:18:01.153030 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:18:01.153077 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:18:01.156996 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:18:01.162814 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:18:01.162937 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:18:01.168929 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:18:01.168976 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:18:01.175002 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:18:01.175103 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:18:01.176444 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:18:01.176482 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:18:01.176875 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:18:01.176905 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:18:01.177250 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:18:01.177281 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:18:01.178297 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:18:01.260273 kernel: hv_netvsc 000d3adb-e4b8-000d-3adb-e4b8000d3adb eth0: Data path switched from VF: enP1897s1 Oct 2 19:18:01.178438 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:18:01.178482 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:18:01.185718 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:18:01.185812 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:18:01.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:01.280238 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:18:01.280336 systemd[1]: Stopped network-cleanup.service. Oct 2 19:18:01.282688 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:18:01.291222 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:18:01.302315 systemd[1]: Switching root. Oct 2 19:18:01.322223 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Oct 2 19:18:01.322297 iscsid[832]: iscsid shutting down. Oct 2 19:18:01.324244 systemd-journald[183]: Journal stopped Oct 2 19:18:14.034498 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:18:14.034526 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:18:14.034538 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:18:14.034548 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:18:14.034557 kernel: SELinux: policy capability open_perms=1 Oct 2 19:18:14.034565 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:18:14.034576 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:18:14.034586 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:18:14.034594 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:18:14.034605 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:18:14.034613 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:18:14.034624 systemd[1]: Successfully loaded SELinux policy in 324.351ms. Oct 2 19:18:14.034637 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 25.537ms. Oct 2 19:18:14.034649 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:18:14.034664 systemd[1]: Detected virtualization microsoft. Oct 2 19:18:14.034675 systemd[1]: Detected architecture x86-64. Oct 2 19:18:14.034687 systemd[1]: Detected first boot. Oct 2 19:18:14.034697 systemd[1]: Hostname set to . Oct 2 19:18:14.034709 systemd[1]: Initializing machine ID from random generator. Oct 2 19:18:14.034723 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:18:14.034747 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:18:14.034767 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:18:14.034787 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:18:14.034805 kernel: kauditd_printk_skb: 39 callbacks suppressed Oct 2 19:18:14.034820 kernel: audit: type=1334 audit(1696274293.536:87): prog-id=12 op=LOAD Oct 2 19:18:14.034839 kernel: audit: type=1334 audit(1696274293.536:88): prog-id=3 op=UNLOAD Oct 2 19:18:14.034863 kernel: audit: type=1334 audit(1696274293.541:89): prog-id=13 op=LOAD Oct 2 19:18:14.034880 kernel: audit: type=1334 audit(1696274293.546:90): prog-id=14 op=LOAD Oct 2 19:18:14.034897 kernel: audit: type=1334 audit(1696274293.546:91): prog-id=4 op=UNLOAD Oct 2 19:18:14.034914 kernel: audit: type=1334 audit(1696274293.546:92): prog-id=5 op=UNLOAD Oct 2 19:18:14.034930 kernel: audit: type=1334 audit(1696274293.555:93): prog-id=15 op=LOAD Oct 2 19:18:14.034946 kernel: audit: type=1334 audit(1696274293.555:94): prog-id=12 op=UNLOAD Oct 2 19:18:14.034963 kernel: audit: type=1334 audit(1696274293.578:95): prog-id=16 op=LOAD Oct 2 19:18:14.034980 kernel: audit: type=1334 audit(1696274293.582:96): prog-id=17 op=LOAD Oct 2 19:18:14.035003 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:18:14.035023 systemd[1]: Stopped iscsiuio.service. Oct 2 19:18:14.035041 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:18:14.035061 systemd[1]: Stopped iscsid.service. Oct 2 19:18:14.035080 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:18:14.035097 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:18:14.035126 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:18:14.035147 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:18:14.035165 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:18:14.035185 systemd[1]: Created slice system-getty.slice. Oct 2 19:18:14.035202 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:18:14.035222 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:18:14.035242 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:18:14.035262 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:18:14.035281 systemd[1]: Created slice user.slice. Oct 2 19:18:14.035300 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:18:14.035323 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:18:14.035342 systemd[1]: Set up automount boot.automount. Oct 2 19:18:14.035362 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:18:14.035379 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:18:14.035397 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:18:14.035418 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:18:14.035435 systemd[1]: Reached target integritysetup.target. Oct 2 19:18:14.035455 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:18:14.035475 systemd[1]: Reached target remote-fs.target. Oct 2 19:18:14.035493 systemd[1]: Reached target slices.target. Oct 2 19:18:14.035517 systemd[1]: Reached target swap.target. Oct 2 19:18:14.035536 systemd[1]: Reached target torcx.target. Oct 2 19:18:14.035554 systemd[1]: Reached target veritysetup.target. Oct 2 19:18:14.035573 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:18:14.035597 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:18:14.035612 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:18:14.035625 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:18:14.037592 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:18:14.037617 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:18:14.037632 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:18:14.037659 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:18:14.037674 systemd[1]: Mounting media.mount... Oct 2 19:18:14.037694 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:18:14.037711 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:18:14.037727 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:18:14.037821 systemd[1]: Mounting tmp.mount... Oct 2 19:18:14.037839 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:18:14.037857 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:18:14.037874 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:18:14.037891 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:18:14.037908 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:18:14.037930 systemd[1]: Starting modprobe@drm.service... Oct 2 19:18:14.037949 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:18:14.037968 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:18:14.037985 systemd[1]: Starting modprobe@loop.service... Oct 2 19:18:14.038001 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:18:14.038015 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:18:14.038027 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:18:14.038039 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:18:14.038052 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:18:14.038065 systemd[1]: Stopped systemd-journald.service. Oct 2 19:18:14.038077 systemd[1]: Starting systemd-journald.service... Oct 2 19:18:14.038088 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:18:14.038100 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:18:14.038112 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:18:14.038123 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:18:14.038135 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:18:14.038147 systemd[1]: Stopped verity-setup.service. Oct 2 19:18:14.038161 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:18:14.038174 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:18:14.038186 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:18:14.038196 systemd[1]: Mounted media.mount. Oct 2 19:18:14.038208 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:18:14.038219 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:18:14.038231 systemd[1]: Mounted tmp.mount. Oct 2 19:18:14.038242 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:18:14.038255 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:18:14.038278 systemd-journald[1136]: Journal started Oct 2 19:18:14.038331 systemd-journald[1136]: Runtime Journal (/run/log/journal/f4b04e3de0974792a114178f9b8952c6) is 8.0M, max 159.0M, 151.0M free. Oct 2 19:18:03.669000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:18:04.350000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:18:04.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:18:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:18:04.365000 audit: BPF prog-id=10 op=LOAD Oct 2 19:18:04.365000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:18:04.365000 audit: BPF prog-id=11 op=LOAD Oct 2 19:18:04.365000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:18:13.536000 audit: BPF prog-id=12 op=LOAD Oct 2 19:18:13.536000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:18:13.541000 audit: BPF prog-id=13 op=LOAD Oct 2 19:18:13.546000 audit: BPF prog-id=14 op=LOAD Oct 2 19:18:13.546000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:18:13.546000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:18:13.555000 audit: BPF prog-id=15 op=LOAD Oct 2 19:18:13.555000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:18:13.578000 audit: BPF prog-id=16 op=LOAD Oct 2 19:18:13.582000 audit: BPF prog-id=17 op=LOAD Oct 2 19:18:13.582000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:18:13.582000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:18:13.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:13.595000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:18:13.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:13.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:13.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:13.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:13.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:13.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:13.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:13.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:13.916000 audit: BPF prog-id=18 op=LOAD Oct 2 19:18:13.916000 audit: BPF prog-id=19 op=LOAD Oct 2 19:18:13.916000 audit: BPF prog-id=20 op=LOAD Oct 2 19:18:13.916000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:18:13.916000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:18:13.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.031000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:18:14.031000 audit[1136]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffea1047bb0 a2=4000 a3=7ffea1047c4c items=0 ppid=1 pid=1136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:14.031000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:18:14.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:05.604678 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:18:13.535168 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:18:05.605146 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:18:13.584541 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:18:05.605169 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:18:05.605207 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:18:05.605219 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:18:05.605274 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:18:05.605290 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:18:05.605517 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:18:05.605559 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:18:05.605574 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:18:05.606013 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:18:05.606052 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:18:05.606073 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:18:05.606090 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:18:05.606109 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:18:05.606124 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:05Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:18:12.354719 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:12Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:18:12.354986 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:12Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:18:12.355115 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:12Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:18:12.355283 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:12Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:18:12.355331 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:12Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:18:12.355383 /usr/lib/systemd/system-generators/torcx-generator[1054]: time="2023-10-02T19:18:12Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:18:14.049857 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:18:14.057933 kernel: loop: module loaded Oct 2 19:18:14.057981 systemd[1]: Started systemd-journald.service. Oct 2 19:18:14.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.060032 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:18:14.063538 kernel: fuse: init (API version 7.34) Oct 2 19:18:14.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.064266 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:18:14.064419 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:18:14.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.066940 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:18:14.067085 systemd[1]: Finished modprobe@drm.service. Oct 2 19:18:14.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.069272 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:18:14.069411 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:18:14.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.071843 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:18:14.071983 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:18:14.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.074319 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:18:14.074453 systemd[1]: Finished modprobe@loop.service. Oct 2 19:18:14.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.076800 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:18:14.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.079256 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:18:14.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.083145 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:18:14.086088 systemd[1]: Reached target network-pre.target. Oct 2 19:18:14.090121 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:18:14.094193 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:18:14.096318 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:18:14.113039 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:18:14.116617 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:18:14.119247 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:18:14.120687 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:18:14.123505 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:18:14.124929 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:18:14.128838 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:18:14.134436 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:18:14.139103 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:18:14.147976 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:18:14.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.150404 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:18:14.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.152688 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:18:14.156229 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:18:14.167307 systemd-journald[1136]: Time spent on flushing to /var/log/journal/f4b04e3de0974792a114178f9b8952c6 is 25.931ms for 1161 entries. Oct 2 19:18:14.167307 systemd-journald[1136]: System Journal (/var/log/journal/f4b04e3de0974792a114178f9b8952c6) is 8.0M, max 2.6G, 2.6G free. Oct 2 19:18:14.261425 systemd-journald[1136]: Received client request to flush runtime journal. Oct 2 19:18:14.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.261616 udevadm[1178]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 19:18:14.211484 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:18:14.262411 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:18:14.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:14.645570 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:18:14.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.397913 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:18:15.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.400000 audit: BPF prog-id=21 op=LOAD Oct 2 19:18:15.400000 audit: BPF prog-id=22 op=LOAD Oct 2 19:18:15.400000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:18:15.400000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:18:15.402156 systemd[1]: Starting systemd-udevd.service... Oct 2 19:18:15.419184 systemd-udevd[1181]: Using default interface naming scheme 'v252'. Oct 2 19:18:15.701494 systemd[1]: Started systemd-udevd.service. Oct 2 19:18:15.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:15.710000 audit: BPF prog-id=23 op=LOAD Oct 2 19:18:15.712079 systemd[1]: Starting systemd-networkd.service... Oct 2 19:18:15.748799 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:18:15.824625 kernel: hv_vmbus: registering driver hyperv_fb Oct 2 19:18:15.833718 kernel: hv_utils: Registering HyperV Utility Driver Oct 2 19:18:15.833820 kernel: hv_vmbus: registering driver hv_utils Oct 2 19:18:17.004214 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Oct 2 19:18:17.011468 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Oct 2 19:18:17.011521 kernel: hv_utils: Heartbeat IC version 3.0 Oct 2 19:18:17.011552 kernel: hv_utils: Shutdown IC version 3.2 Oct 2 19:18:17.011582 kernel: hv_utils: TimeSync IC version 4.0 Oct 2 19:18:17.011611 kernel: hv_vmbus: registering driver hv_balloon Oct 2 19:18:15.833000 audit[1198]: AVC avc: denied { confidentiality } for pid=1198 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:18:17.007000 audit: BPF prog-id=24 op=LOAD Oct 2 19:18:17.007000 audit: BPF prog-id=25 op=LOAD Oct 2 19:18:17.007000 audit: BPF prog-id=26 op=LOAD Oct 2 19:18:17.009197 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:18:17.020683 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Oct 2 19:18:17.027753 kernel: Console: switching to colour dummy device 80x25 Oct 2 19:18:17.028652 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 19:18:15.833000 audit[1198]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555571971aa0 a1=f884 a2=7f247747dbc5 a3=5 items=10 ppid=1181 pid=1198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:15.833000 audit: CWD cwd="/" Oct 2 19:18:15.833000 audit: PATH item=0 name=(null) inode=15850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:15.833000 audit: PATH item=1 name=(null) inode=15851 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:15.833000 audit: PATH item=2 name=(null) inode=15850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:15.833000 audit: PATH item=3 name=(null) inode=15852 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:15.833000 audit: PATH item=4 name=(null) inode=15850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:15.833000 audit: PATH item=5 name=(null) inode=15853 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:15.833000 audit: PATH item=6 name=(null) inode=15850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:15.833000 audit: PATH item=7 name=(null) inode=15854 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:15.833000 audit: PATH item=8 name=(null) inode=15850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:15.833000 audit: PATH item=9 name=(null) inode=15855 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:18:15.833000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:18:17.045661 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:18:17.076204 systemd[1]: Started systemd-userdbd.service. Oct 2 19:18:17.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:17.285712 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1202) Oct 2 19:18:17.328870 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:18:17.352658 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Oct 2 19:18:17.387078 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:18:17.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:17.391000 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:18:17.437533 systemd-networkd[1197]: lo: Link UP Oct 2 19:18:17.437545 systemd-networkd[1197]: lo: Gained carrier Oct 2 19:18:17.438202 systemd-networkd[1197]: Enumeration completed Oct 2 19:18:17.438330 systemd[1]: Started systemd-networkd.service. Oct 2 19:18:17.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:17.442425 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:18:17.466653 systemd-networkd[1197]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:18:17.523671 kernel: mlx5_core 0769:00:02.0 enP1897s1: Link up Oct 2 19:18:17.562665 kernel: hv_netvsc 000d3adb-e4b8-000d-3adb-e4b8000d3adb eth0: Data path switched to VF: enP1897s1 Oct 2 19:18:17.563414 systemd-networkd[1197]: enP1897s1: Link UP Oct 2 19:18:17.563587 systemd-networkd[1197]: eth0: Link UP Oct 2 19:18:17.563594 systemd-networkd[1197]: eth0: Gained carrier Oct 2 19:18:17.568923 systemd-networkd[1197]: enP1897s1: Gained carrier Oct 2 19:18:17.596773 systemd-networkd[1197]: eth0: DHCPv4 address 10.200.8.17/24, gateway 10.200.8.1 acquired from 168.63.129.16 Oct 2 19:18:18.479020 lvm[1258]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:18:18.509775 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:18:18.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:18.512445 systemd[1]: Reached target cryptsetup.target. Oct 2 19:18:18.515835 systemd[1]: Starting lvm2-activation.service... Oct 2 19:18:18.520370 lvm[1260]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:18:18.547128 systemd[1]: Finished lvm2-activation.service. Oct 2 19:18:18.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:18.549845 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:18:18.552066 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:18:18.552103 systemd[1]: Reached target local-fs.target. Oct 2 19:18:18.554453 systemd[1]: Reached target machines.target. Oct 2 19:18:18.558536 systemd[1]: Starting ldconfig.service... Oct 2 19:18:18.576695 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:18:18.576765 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:18:18.577894 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:18:18.581313 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:18:18.585194 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:18:18.587487 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:18:18.587601 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:18:18.588724 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:18:18.626470 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1262 (bootctl) Oct 2 19:18:18.627765 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:18:18.641270 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:18:18.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:19.163901 systemd-networkd[1197]: eth0: Gained IPv6LL Oct 2 19:18:19.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:19.169441 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:18:19.172016 systemd-tmpfiles[1265]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:18:19.206735 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:18:19.207348 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:18:19.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:19.298136 systemd-tmpfiles[1265]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:18:19.377992 systemd-tmpfiles[1265]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:18:19.602784 systemd-fsck[1270]: fsck.fat 4.2 (2021-01-31) Oct 2 19:18:19.602784 systemd-fsck[1270]: /dev/sda1: 789 files, 115069/258078 clusters Oct 2 19:18:19.605600 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:18:19.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:19.610095 systemd[1]: Mounting boot.mount... Oct 2 19:18:19.635303 systemd[1]: Mounted boot.mount. Oct 2 19:18:19.648808 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:18:19.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:20.916458 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:18:20.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:20.920779 systemd[1]: Starting audit-rules.service... Oct 2 19:18:20.922660 kernel: kauditd_printk_skb: 78 callbacks suppressed Oct 2 19:18:20.922727 kernel: audit: type=1130 audit(1696274300.918:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:20.937266 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:18:20.940990 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:18:20.944000 audit: BPF prog-id=27 op=LOAD Oct 2 19:18:20.948956 systemd[1]: Starting systemd-resolved.service... Oct 2 19:18:20.952527 kernel: audit: type=1334 audit(1696274300.944:161): prog-id=27 op=LOAD Oct 2 19:18:20.952844 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:18:20.951000 audit: BPF prog-id=28 op=LOAD Oct 2 19:18:20.956914 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:18:20.960657 kernel: audit: type=1334 audit(1696274300.951:162): prog-id=28 op=LOAD Oct 2 19:18:21.023057 kernel: audit: type=1127 audit(1696274301.010:163): pid=1282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:18:21.010000 audit[1282]: SYSTEM_BOOT pid=1282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:18:21.012162 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:18:21.037720 kernel: audit: type=1130 audit(1696274301.023:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:21.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:21.040542 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:18:21.043142 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:18:21.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:21.054807 kernel: audit: type=1130 audit(1696274301.042:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:21.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:21.069065 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:18:21.083656 kernel: audit: type=1130 audit(1696274301.070:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:21.153480 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:18:21.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:21.156592 systemd[1]: Reached target time-set.target. Oct 2 19:18:21.171242 kernel: audit: type=1130 audit(1696274301.155:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:18:21.221544 systemd-resolved[1280]: Positive Trust Anchors: Oct 2 19:18:21.221560 systemd-resolved[1280]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:18:21.221598 systemd-resolved[1280]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:18:21.264000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:18:21.265498 augenrules[1297]: No rules Oct 2 19:18:21.266384 systemd[1]: Finished audit-rules.service. Oct 2 19:18:21.275662 kernel: audit: type=1305 audit(1696274301.264:168): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:18:21.275733 kernel: audit: type=1300 audit(1696274301.264:168): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1c2da0c0 a2=420 a3=0 items=0 ppid=1276 pid=1297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:21.264000 audit[1297]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1c2da0c0 a2=420 a3=0 items=0 ppid=1276 pid=1297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:18:21.264000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:18:21.307317 systemd-timesyncd[1281]: Contacted time server 188.125.64.6:123 (0.flatcar.pool.ntp.org). Oct 2 19:18:21.307385 systemd-timesyncd[1281]: Initial clock synchronization to Mon 2023-10-02 19:18:21.308099 UTC. Oct 2 19:18:21.359010 systemd-resolved[1280]: Using system hostname 'ci-3510.3.0-a-ed15fb6ad9'. Oct 2 19:18:21.360901 systemd[1]: Started systemd-resolved.service. Oct 2 19:18:21.363439 systemd[1]: Reached target network.target. Oct 2 19:18:21.365618 systemd[1]: Reached target network-online.target. Oct 2 19:18:21.368041 systemd[1]: Reached target nss-lookup.target. Oct 2 19:18:26.351219 ldconfig[1261]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:18:26.360670 systemd[1]: Finished ldconfig.service. Oct 2 19:18:26.364783 systemd[1]: Starting systemd-update-done.service... Oct 2 19:18:26.406759 systemd[1]: Finished systemd-update-done.service. Oct 2 19:18:26.409769 systemd[1]: Reached target sysinit.target. Oct 2 19:18:26.412131 systemd[1]: Started motdgen.path. Oct 2 19:18:26.414099 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:18:26.417025 systemd[1]: Started logrotate.timer. Oct 2 19:18:26.418816 systemd[1]: Started mdadm.timer. Oct 2 19:18:26.420451 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:18:26.422466 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:18:26.422509 systemd[1]: Reached target paths.target. Oct 2 19:18:26.424266 systemd[1]: Reached target timers.target. Oct 2 19:18:26.426413 systemd[1]: Listening on dbus.socket. Oct 2 19:18:26.429075 systemd[1]: Starting docker.socket... Oct 2 19:18:26.447005 systemd[1]: Listening on sshd.socket. Oct 2 19:18:26.449307 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:18:26.449899 systemd[1]: Listening on docker.socket. Oct 2 19:18:26.451828 systemd[1]: Reached target sockets.target. Oct 2 19:18:26.453793 systemd[1]: Reached target basic.target. Oct 2 19:18:26.455773 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:18:26.455809 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:18:26.456851 systemd[1]: Starting containerd.service... Oct 2 19:18:26.460117 systemd[1]: Starting dbus.service... Oct 2 19:18:26.463420 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:18:26.466531 systemd[1]: Starting extend-filesystems.service... Oct 2 19:18:26.468548 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:18:26.469920 systemd[1]: Starting motdgen.service... Oct 2 19:18:26.476796 systemd[1]: Started nvidia.service. Oct 2 19:18:26.480197 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:18:26.483310 systemd[1]: Starting prepare-critools.service... Oct 2 19:18:26.486094 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:18:26.489243 systemd[1]: Starting sshd-keygen.service... Oct 2 19:18:26.497762 systemd[1]: Starting systemd-logind.service... Oct 2 19:18:26.499805 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:18:26.499894 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:18:26.500418 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:18:26.501319 systemd[1]: Starting update-engine.service... Oct 2 19:18:26.505496 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:18:26.511566 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:18:26.511830 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:18:26.546916 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:18:26.547121 systemd[1]: Finished motdgen.service. Oct 2 19:18:26.556781 extend-filesystems[1308]: Found sda Oct 2 19:18:26.560859 extend-filesystems[1308]: Found sda1 Oct 2 19:18:26.560859 extend-filesystems[1308]: Found sda2 Oct 2 19:18:26.560859 extend-filesystems[1308]: Found sda3 Oct 2 19:18:26.560859 extend-filesystems[1308]: Found usr Oct 2 19:18:26.560859 extend-filesystems[1308]: Found sda4 Oct 2 19:18:26.560859 extend-filesystems[1308]: Found sda6 Oct 2 19:18:26.560859 extend-filesystems[1308]: Found sda7 Oct 2 19:18:26.560859 extend-filesystems[1308]: Found sda9 Oct 2 19:18:26.560859 extend-filesystems[1308]: Checking size of /dev/sda9 Oct 2 19:18:26.600285 env[1334]: time="2023-10-02T19:18:26.600235176Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:18:26.619141 env[1334]: time="2023-10-02T19:18:26.619047570Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:18:26.619314 env[1334]: time="2023-10-02T19:18:26.619186776Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:26.620450 env[1334]: time="2023-10-02T19:18:26.620414028Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:18:26.620450 env[1334]: time="2023-10-02T19:18:26.620444029Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:26.620712 env[1334]: time="2023-10-02T19:18:26.620686739Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:18:26.620712 env[1334]: time="2023-10-02T19:18:26.620708040Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:26.620816 env[1334]: time="2023-10-02T19:18:26.620725741Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:18:26.620816 env[1334]: time="2023-10-02T19:18:26.620739142Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:26.620894 env[1334]: time="2023-10-02T19:18:26.620832946Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:26.621081 env[1334]: time="2023-10-02T19:18:26.621054555Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:18:26.621249 env[1334]: time="2023-10-02T19:18:26.621224562Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:18:26.621249 env[1334]: time="2023-10-02T19:18:26.621244763Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:18:26.621343 env[1334]: time="2023-10-02T19:18:26.621308266Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:18:26.621343 env[1334]: time="2023-10-02T19:18:26.621323666Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:18:26.622662 jq[1307]: false Oct 2 19:18:26.622937 jq[1325]: true Oct 2 19:18:26.624534 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:18:26.624754 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:18:26.646327 jq[1348]: true Oct 2 19:18:26.646515 tar[1328]: ./ Oct 2 19:18:26.646515 tar[1328]: ./loopback Oct 2 19:18:26.651305 tar[1329]: crictl Oct 2 19:18:26.664435 systemd-logind[1320]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:18:26.674633 env[1334]: time="2023-10-02T19:18:26.673011549Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:18:26.674633 env[1334]: time="2023-10-02T19:18:26.673078251Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:18:26.674633 env[1334]: time="2023-10-02T19:18:26.673101752Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:18:26.674633 env[1334]: time="2023-10-02T19:18:26.673183356Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:18:26.674633 env[1334]: time="2023-10-02T19:18:26.673222157Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:18:26.674633 env[1334]: time="2023-10-02T19:18:26.673244358Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:18:26.674633 env[1334]: time="2023-10-02T19:18:26.673264459Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:18:26.674633 env[1334]: time="2023-10-02T19:18:26.673285360Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:18:26.674633 env[1334]: time="2023-10-02T19:18:26.673320162Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:18:26.674633 env[1334]: time="2023-10-02T19:18:26.673338262Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:18:26.674633 env[1334]: time="2023-10-02T19:18:26.673356163Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:18:26.674633 env[1334]: time="2023-10-02T19:18:26.673385764Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:18:26.674633 env[1334]: time="2023-10-02T19:18:26.673557272Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:18:26.674633 env[1334]: time="2023-10-02T19:18:26.673684677Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:18:26.675154 env[1334]: time="2023-10-02T19:18:26.674043592Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:18:26.675154 env[1334]: time="2023-10-02T19:18:26.674087694Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:18:26.675154 env[1334]: time="2023-10-02T19:18:26.674107295Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:18:26.675154 env[1334]: time="2023-10-02T19:18:26.674169497Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:18:26.675154 env[1334]: time="2023-10-02T19:18:26.674187998Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:18:26.675154 env[1334]: time="2023-10-02T19:18:26.674205899Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:18:26.675154 env[1334]: time="2023-10-02T19:18:26.674221700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:18:26.675154 env[1334]: time="2023-10-02T19:18:26.674253601Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:18:26.675154 env[1334]: time="2023-10-02T19:18:26.674271502Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:18:26.675154 env[1334]: time="2023-10-02T19:18:26.674287602Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:18:26.675154 env[1334]: time="2023-10-02T19:18:26.674303503Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:18:26.675154 env[1334]: time="2023-10-02T19:18:26.674332904Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:18:26.675154 env[1334]: time="2023-10-02T19:18:26.674499211Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:18:26.675154 env[1334]: time="2023-10-02T19:18:26.674518912Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:18:26.675154 env[1334]: time="2023-10-02T19:18:26.674535813Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:18:26.676589 env[1334]: time="2023-10-02T19:18:26.674562614Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:18:26.676589 env[1334]: time="2023-10-02T19:18:26.674583515Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:18:26.676589 env[1334]: time="2023-10-02T19:18:26.674599916Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:18:26.676589 env[1334]: time="2023-10-02T19:18:26.675706962Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:18:26.676589 env[1334]: time="2023-10-02T19:18:26.675789666Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:18:26.676928 env[1334]: time="2023-10-02T19:18:26.676107579Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:18:26.676928 env[1334]: time="2023-10-02T19:18:26.676197583Z" level=info msg="Connect containerd service" Oct 2 19:18:26.676928 env[1334]: time="2023-10-02T19:18:26.676253585Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:18:26.720695 env[1334]: time="2023-10-02T19:18:26.680030045Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:18:26.720695 env[1334]: time="2023-10-02T19:18:26.680354559Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:18:26.720695 env[1334]: time="2023-10-02T19:18:26.680419661Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:18:26.720695 env[1334]: time="2023-10-02T19:18:26.680593469Z" level=info msg="containerd successfully booted in 0.081059s" Oct 2 19:18:26.720695 env[1334]: time="2023-10-02T19:18:26.714504600Z" level=info msg="Start subscribing containerd event" Oct 2 19:18:26.720695 env[1334]: time="2023-10-02T19:18:26.714628706Z" level=info msg="Start recovering state" Oct 2 19:18:26.720695 env[1334]: time="2023-10-02T19:18:26.714742310Z" level=info msg="Start event monitor" Oct 2 19:18:26.720695 env[1334]: time="2023-10-02T19:18:26.714781912Z" level=info msg="Start snapshots syncer" Oct 2 19:18:26.720695 env[1334]: time="2023-10-02T19:18:26.714795313Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:18:26.720695 env[1334]: time="2023-10-02T19:18:26.714809413Z" level=info msg="Start streaming server" Oct 2 19:18:26.721053 extend-filesystems[1308]: Old size kept for /dev/sda9 Oct 2 19:18:26.721053 extend-filesystems[1308]: Found sr0 Oct 2 19:18:26.680557 systemd[1]: Started containerd.service. Oct 2 19:18:26.684615 systemd-logind[1320]: New seat seat0. Oct 2 19:18:26.694361 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:18:26.694554 systemd[1]: Finished extend-filesystems.service. Oct 2 19:18:26.746823 tar[1328]: ./bandwidth Oct 2 19:18:26.771844 dbus-daemon[1306]: [system] SELinux support is enabled Oct 2 19:18:26.777825 dbus-daemon[1306]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:18:26.772023 systemd[1]: Started dbus.service. Oct 2 19:18:26.777278 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:18:26.777309 systemd[1]: Reached target system-config.target. Oct 2 19:18:26.780323 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:18:26.780345 systemd[1]: Reached target user-config.target. Oct 2 19:18:26.782917 systemd[1]: Started systemd-logind.service. Oct 2 19:18:26.800429 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 19:18:26.848876 tar[1328]: ./ptp Oct 2 19:18:26.859009 bash[1371]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:18:26.859758 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:18:26.926783 tar[1328]: ./vlan Oct 2 19:18:26.997384 tar[1328]: ./host-device Oct 2 19:18:27.042214 tar[1328]: ./tuning Oct 2 19:18:27.085432 tar[1328]: ./vrf Oct 2 19:18:27.125749 tar[1328]: ./sbr Oct 2 19:18:27.166836 tar[1328]: ./tap Oct 2 19:18:27.214197 tar[1328]: ./dhcp Oct 2 19:18:27.336530 tar[1328]: ./static Oct 2 19:18:27.370592 tar[1328]: ./firewall Oct 2 19:18:27.424390 tar[1328]: ./macvlan Oct 2 19:18:27.444144 update_engine[1323]: I1002 19:18:27.430524 1323 main.cc:92] Flatcar Update Engine starting Oct 2 19:18:27.470683 tar[1328]: ./dummy Oct 2 19:18:27.496377 systemd[1]: Started update-engine.service. Oct 2 19:18:27.501606 systemd[1]: Started locksmithd.service. Oct 2 19:18:27.504755 update_engine[1323]: I1002 19:18:27.504726 1323 update_check_scheduler.cc:74] Next update check in 7m3s Oct 2 19:18:27.514860 tar[1328]: ./bridge Oct 2 19:18:27.564273 tar[1328]: ./ipvlan Oct 2 19:18:27.639685 tar[1328]: ./portmap Oct 2 19:18:27.682579 tar[1328]: ./host-local Oct 2 19:18:27.770003 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:18:27.816392 systemd[1]: Finished prepare-critools.service. Oct 2 19:18:28.333480 sshd_keygen[1326]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:18:28.353460 systemd[1]: Finished sshd-keygen.service. Oct 2 19:18:28.357751 systemd[1]: Starting issuegen.service... Oct 2 19:18:28.361551 systemd[1]: Started waagent.service. Oct 2 19:18:28.364390 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:18:28.364598 systemd[1]: Finished issuegen.service. Oct 2 19:18:28.368246 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:18:28.389820 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:18:28.393877 systemd[1]: Started getty@tty1.service. Oct 2 19:18:28.397444 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:18:28.399983 systemd[1]: Reached target getty.target. Oct 2 19:18:28.401962 systemd[1]: Reached target multi-user.target. Oct 2 19:18:28.405476 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:18:28.414032 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:18:28.414198 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:18:28.416856 systemd[1]: Startup finished in 905ms (firmware) + 25.685s (loader) + 886ms (kernel) + 20.399s (initrd) + 24.156s (userspace) = 1min 12.033s. Oct 2 19:18:28.786714 login[1426]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Oct 2 19:18:28.801288 login[1427]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:18:28.826067 systemd[1]: Created slice user-500.slice. Oct 2 19:18:28.827572 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:18:28.829684 systemd-logind[1320]: New session 2 of user core. Oct 2 19:18:28.850411 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:18:28.852274 systemd[1]: Starting user@500.service... Oct 2 19:18:28.857037 (systemd)[1430]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:18:28.963521 locksmithd[1405]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:18:29.010443 systemd[1430]: Queued start job for default target default.target. Oct 2 19:18:29.011185 systemd[1430]: Reached target paths.target. Oct 2 19:18:29.011221 systemd[1430]: Reached target sockets.target. Oct 2 19:18:29.011242 systemd[1430]: Reached target timers.target. Oct 2 19:18:29.011260 systemd[1430]: Reached target basic.target. Oct 2 19:18:29.011402 systemd[1]: Started user@500.service. Oct 2 19:18:29.012849 systemd[1]: Started session-2.scope. Oct 2 19:18:29.014226 systemd[1430]: Reached target default.target. Oct 2 19:18:29.014455 systemd[1430]: Startup finished in 151ms. Oct 2 19:18:29.787178 login[1426]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:18:29.792588 systemd[1]: Started session-1.scope. Oct 2 19:18:29.793086 systemd-logind[1320]: New session 1 of user core. Oct 2 19:18:34.899431 waagent[1421]: 2023-10-02T19:18:34.899320Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Oct 2 19:18:34.904107 waagent[1421]: 2023-10-02T19:18:34.904026Z INFO Daemon Daemon OS: flatcar 3510.3.0 Oct 2 19:18:34.906984 waagent[1421]: 2023-10-02T19:18:34.906919Z INFO Daemon Daemon Python: 3.9.16 Oct 2 19:18:34.909581 waagent[1421]: 2023-10-02T19:18:34.909508Z INFO Daemon Daemon Run daemon Oct 2 19:18:34.912156 waagent[1421]: 2023-10-02T19:18:34.912017Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.0' Oct 2 19:18:34.924995 waagent[1421]: 2023-10-02T19:18:34.924871Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 19:18:34.932762 waagent[1421]: 2023-10-02T19:18:34.932653Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 19:18:34.937666 waagent[1421]: 2023-10-02T19:18:34.937587Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 19:18:34.940277 waagent[1421]: 2023-10-02T19:18:34.940214Z INFO Daemon Daemon Using waagent for provisioning Oct 2 19:18:34.943304 waagent[1421]: 2023-10-02T19:18:34.943242Z INFO Daemon Daemon Activate resource disk Oct 2 19:18:34.945706 waagent[1421]: 2023-10-02T19:18:34.945648Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Oct 2 19:18:34.955803 waagent[1421]: 2023-10-02T19:18:34.955738Z INFO Daemon Daemon Found device: None Oct 2 19:18:34.958241 waagent[1421]: 2023-10-02T19:18:34.958181Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Oct 2 19:18:34.962220 waagent[1421]: 2023-10-02T19:18:34.962162Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Oct 2 19:18:34.968307 waagent[1421]: 2023-10-02T19:18:34.968244Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 19:18:34.971226 waagent[1421]: 2023-10-02T19:18:34.971166Z INFO Daemon Daemon Running default provisioning handler Oct 2 19:18:34.981458 waagent[1421]: 2023-10-02T19:18:34.981332Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 19:18:34.988140 waagent[1421]: 2023-10-02T19:18:34.988032Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 19:18:34.996082 waagent[1421]: 2023-10-02T19:18:34.988415Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 19:18:34.996082 waagent[1421]: 2023-10-02T19:18:34.989212Z INFO Daemon Daemon Copying ovf-env.xml Oct 2 19:18:35.080806 waagent[1421]: 2023-10-02T19:18:35.076470Z INFO Daemon Daemon Successfully mounted dvd Oct 2 19:18:35.153288 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Oct 2 19:18:35.172479 waagent[1421]: 2023-10-02T19:18:35.172351Z INFO Daemon Daemon Detect protocol endpoint Oct 2 19:18:35.187924 waagent[1421]: 2023-10-02T19:18:35.172883Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 19:18:35.187924 waagent[1421]: 2023-10-02T19:18:35.174159Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Oct 2 19:18:35.187924 waagent[1421]: 2023-10-02T19:18:35.174541Z INFO Daemon Daemon Test for route to 168.63.129.16 Oct 2 19:18:35.187924 waagent[1421]: 2023-10-02T19:18:35.175594Z INFO Daemon Daemon Route to 168.63.129.16 exists Oct 2 19:18:35.187924 waagent[1421]: 2023-10-02T19:18:35.176323Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Oct 2 19:18:35.308477 waagent[1421]: 2023-10-02T19:18:35.308401Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Oct 2 19:18:35.316467 waagent[1421]: 2023-10-02T19:18:35.309362Z INFO Daemon Daemon Wire protocol version:2012-11-30 Oct 2 19:18:35.316467 waagent[1421]: 2023-10-02T19:18:35.310273Z INFO Daemon Daemon Server preferred version:2015-04-05 Oct 2 19:18:35.639287 waagent[1421]: 2023-10-02T19:18:35.639132Z INFO Daemon Daemon Initializing goal state during protocol detection Oct 2 19:18:35.652045 waagent[1421]: 2023-10-02T19:18:35.651970Z INFO Daemon Daemon Forcing an update of the goal state.. Oct 2 19:18:35.655046 waagent[1421]: 2023-10-02T19:18:35.654983Z INFO Daemon Daemon Fetching goal state [incarnation 1] Oct 2 19:18:35.735388 waagent[1421]: 2023-10-02T19:18:35.735265Z INFO Daemon Daemon Found private key matching thumbprint 697B7E81F31829A1CA0A6EFA8224A5D358D645A6 Oct 2 19:18:35.746744 waagent[1421]: 2023-10-02T19:18:35.735827Z INFO Daemon Daemon Certificate with thumbprint 13F848092523AE1B290380775DB529575E58B4B7 has no matching private key. Oct 2 19:18:35.746744 waagent[1421]: 2023-10-02T19:18:35.736960Z INFO Daemon Daemon Fetch goal state completed Oct 2 19:18:35.783371 waagent[1421]: 2023-10-02T19:18:35.783277Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: d156eb4b-a1e1-473c-aca0-ebab3f2ce84d New eTag: 11130426018474899264] Oct 2 19:18:35.791832 waagent[1421]: 2023-10-02T19:18:35.784376Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 19:18:35.794715 waagent[1421]: 2023-10-02T19:18:35.794646Z INFO Daemon Daemon Starting provisioning Oct 2 19:18:35.801511 waagent[1421]: 2023-10-02T19:18:35.794949Z INFO Daemon Daemon Handle ovf-env.xml. Oct 2 19:18:35.801511 waagent[1421]: 2023-10-02T19:18:35.796430Z INFO Daemon Daemon Set hostname [ci-3510.3.0-a-ed15fb6ad9] Oct 2 19:18:35.816941 waagent[1421]: 2023-10-02T19:18:35.816816Z INFO Daemon Daemon Publish hostname [ci-3510.3.0-a-ed15fb6ad9] Oct 2 19:18:35.824732 waagent[1421]: 2023-10-02T19:18:35.817679Z INFO Daemon Daemon Examine /proc/net/route for primary interface Oct 2 19:18:35.824732 waagent[1421]: 2023-10-02T19:18:35.818697Z INFO Daemon Daemon Primary interface is [eth0] Oct 2 19:18:35.832033 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Oct 2 19:18:35.832279 systemd[1]: Stopped systemd-networkd-wait-online.service. Oct 2 19:18:35.832353 systemd[1]: Stopping systemd-networkd-wait-online.service... Oct 2 19:18:35.832732 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:18:35.838684 systemd-networkd[1197]: eth0: DHCPv6 lease lost Oct 2 19:18:35.839974 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:18:35.840171 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:18:35.842435 systemd[1]: Starting systemd-networkd.service... Oct 2 19:18:35.872924 systemd-networkd[1477]: enP1897s1: Link UP Oct 2 19:18:35.872935 systemd-networkd[1477]: enP1897s1: Gained carrier Oct 2 19:18:35.874413 systemd-networkd[1477]: eth0: Link UP Oct 2 19:18:35.874423 systemd-networkd[1477]: eth0: Gained carrier Oct 2 19:18:35.874883 systemd-networkd[1477]: lo: Link UP Oct 2 19:18:35.874891 systemd-networkd[1477]: lo: Gained carrier Oct 2 19:18:35.875206 systemd-networkd[1477]: eth0: Gained IPv6LL Oct 2 19:18:35.875482 systemd-networkd[1477]: Enumeration completed Oct 2 19:18:35.875597 systemd[1]: Started systemd-networkd.service. Oct 2 19:18:35.877658 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:18:35.880927 waagent[1421]: 2023-10-02T19:18:35.880758Z INFO Daemon Daemon Create user account if not exists Oct 2 19:18:35.888087 waagent[1421]: 2023-10-02T19:18:35.881453Z INFO Daemon Daemon User core already exists, skip useradd Oct 2 19:18:35.888087 waagent[1421]: 2023-10-02T19:18:35.882350Z INFO Daemon Daemon Configure sudoer Oct 2 19:18:35.888087 waagent[1421]: 2023-10-02T19:18:35.884180Z INFO Daemon Daemon Configure sshd Oct 2 19:18:35.888087 waagent[1421]: 2023-10-02T19:18:35.885046Z INFO Daemon Daemon Deploy ssh public key. Oct 2 19:18:35.888788 systemd-networkd[1477]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:18:35.934749 systemd-networkd[1477]: eth0: DHCPv4 address 10.200.8.17/24, gateway 10.200.8.1 acquired from 168.63.129.16 Oct 2 19:18:35.939207 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:18:37.211521 waagent[1421]: 2023-10-02T19:18:37.211422Z INFO Daemon Daemon Provisioning complete Oct 2 19:18:37.228178 waagent[1421]: 2023-10-02T19:18:37.228093Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Oct 2 19:18:37.235311 waagent[1421]: 2023-10-02T19:18:37.228578Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Oct 2 19:18:37.235311 waagent[1421]: 2023-10-02T19:18:37.230340Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Oct 2 19:18:37.497833 waagent[1486]: 2023-10-02T19:18:37.497655Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Oct 2 19:18:37.498550 waagent[1486]: 2023-10-02T19:18:37.498481Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:18:37.498712 waagent[1486]: 2023-10-02T19:18:37.498654Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:18:37.509839 waagent[1486]: 2023-10-02T19:18:37.509768Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Oct 2 19:18:37.510000 waagent[1486]: 2023-10-02T19:18:37.509947Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Oct 2 19:18:37.572478 waagent[1486]: 2023-10-02T19:18:37.572349Z INFO ExtHandler ExtHandler Found private key matching thumbprint 697B7E81F31829A1CA0A6EFA8224A5D358D645A6 Oct 2 19:18:37.572744 waagent[1486]: 2023-10-02T19:18:37.572677Z INFO ExtHandler ExtHandler Certificate with thumbprint 13F848092523AE1B290380775DB529575E58B4B7 has no matching private key. Oct 2 19:18:37.572989 waagent[1486]: 2023-10-02T19:18:37.572939Z INFO ExtHandler ExtHandler Fetch goal state completed Oct 2 19:18:37.588102 waagent[1486]: 2023-10-02T19:18:37.588036Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: aaebcbb8-b3b5-443f-8824-0ce170401c70 New eTag: 11130426018474899264] Oct 2 19:18:37.588711 waagent[1486]: 2023-10-02T19:18:37.588650Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 19:18:38.095047 waagent[1486]: 2023-10-02T19:18:38.094882Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 19:18:38.105018 waagent[1486]: 2023-10-02T19:18:38.104931Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1486 Oct 2 19:18:38.108475 waagent[1486]: 2023-10-02T19:18:38.108404Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 19:18:38.109724 waagent[1486]: 2023-10-02T19:18:38.109662Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 19:18:38.178207 waagent[1486]: 2023-10-02T19:18:38.178126Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 19:18:38.178709 waagent[1486]: 2023-10-02T19:18:38.178612Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 19:18:38.187354 waagent[1486]: 2023-10-02T19:18:38.187297Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 19:18:38.187858 waagent[1486]: 2023-10-02T19:18:38.187799Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 19:18:38.188960 waagent[1486]: 2023-10-02T19:18:38.188885Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Oct 2 19:18:38.190216 waagent[1486]: 2023-10-02T19:18:38.190158Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 19:18:38.190994 waagent[1486]: 2023-10-02T19:18:38.190938Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 19:18:38.191107 waagent[1486]: 2023-10-02T19:18:38.191049Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:18:38.191471 waagent[1486]: 2023-10-02T19:18:38.191418Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:18:38.191585 waagent[1486]: 2023-10-02T19:18:38.191517Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:18:38.191813 waagent[1486]: 2023-10-02T19:18:38.191763Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:18:38.192478 waagent[1486]: 2023-10-02T19:18:38.192421Z INFO EnvHandler ExtHandler Configure routes Oct 2 19:18:38.192896 waagent[1486]: 2023-10-02T19:18:38.192836Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 19:18:38.193177 waagent[1486]: 2023-10-02T19:18:38.193127Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 19:18:38.193730 waagent[1486]: 2023-10-02T19:18:38.193673Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 19:18:38.193912 waagent[1486]: 2023-10-02T19:18:38.193839Z INFO EnvHandler ExtHandler Gateway:None Oct 2 19:18:38.194271 waagent[1486]: 2023-10-02T19:18:38.194215Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 19:18:38.194271 waagent[1486]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 19:18:38.194271 waagent[1486]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 19:18:38.194271 waagent[1486]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 19:18:38.194271 waagent[1486]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:18:38.194271 waagent[1486]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:18:38.194271 waagent[1486]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:18:38.197142 waagent[1486]: 2023-10-02T19:18:38.196927Z INFO EnvHandler ExtHandler Routes:None Oct 2 19:18:38.198970 waagent[1486]: 2023-10-02T19:18:38.198911Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 19:18:38.199134 waagent[1486]: 2023-10-02T19:18:38.199076Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 19:18:38.200210 waagent[1486]: 2023-10-02T19:18:38.200157Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 19:18:38.208364 waagent[1486]: 2023-10-02T19:18:38.208308Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Oct 2 19:18:38.209744 waagent[1486]: 2023-10-02T19:18:38.209699Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 19:18:38.210610 waagent[1486]: 2023-10-02T19:18:38.210564Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Oct 2 19:18:38.226182 waagent[1486]: 2023-10-02T19:18:38.226123Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1477' Oct 2 19:18:38.252150 waagent[1486]: 2023-10-02T19:18:38.252058Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Oct 2 19:18:38.309296 waagent[1486]: 2023-10-02T19:18:38.309177Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 19:18:38.309296 waagent[1486]: Executing ['ip', '-a', '-o', 'link']: Oct 2 19:18:38.309296 waagent[1486]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 19:18:38.309296 waagent[1486]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:db:e4:b8 brd ff:ff:ff:ff:ff:ff Oct 2 19:18:38.309296 waagent[1486]: 3: enP1897s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:db:e4:b8 brd ff:ff:ff:ff:ff:ff\ altname enP1897p0s2 Oct 2 19:18:38.309296 waagent[1486]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 19:18:38.309296 waagent[1486]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 19:18:38.309296 waagent[1486]: 2: eth0 inet 10.200.8.17/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 19:18:38.309296 waagent[1486]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 19:18:38.309296 waagent[1486]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 19:18:38.309296 waagent[1486]: 2: eth0 inet6 fe80::20d:3aff:fedb:e4b8/64 scope link \ valid_lft forever preferred_lft forever Oct 2 19:18:38.628271 waagent[1486]: 2023-10-02T19:18:38.628145Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Oct 2 19:18:38.631439 waagent[1486]: 2023-10-02T19:18:38.631333Z INFO EnvHandler ExtHandler Firewall rules: Oct 2 19:18:38.631439 waagent[1486]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:18:38.631439 waagent[1486]: pkts bytes target prot opt in out source destination Oct 2 19:18:38.631439 waagent[1486]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:18:38.631439 waagent[1486]: pkts bytes target prot opt in out source destination Oct 2 19:18:38.631439 waagent[1486]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:18:38.631439 waagent[1486]: pkts bytes target prot opt in out source destination Oct 2 19:18:38.631439 waagent[1486]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 19:18:38.631439 waagent[1486]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 19:18:38.632824 waagent[1486]: 2023-10-02T19:18:38.632770Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Oct 2 19:18:38.791088 waagent[1486]: 2023-10-02T19:18:38.791013Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.10.0.3 -- exiting Oct 2 19:18:39.234860 waagent[1421]: 2023-10-02T19:18:39.234704Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Oct 2 19:18:39.241206 waagent[1421]: 2023-10-02T19:18:39.241134Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.10.0.3 to be the latest agent Oct 2 19:18:40.229432 waagent[1524]: 2023-10-02T19:18:40.229326Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.10.0.3) Oct 2 19:18:40.230131 waagent[1524]: 2023-10-02T19:18:40.230067Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.0 Oct 2 19:18:40.230275 waagent[1524]: 2023-10-02T19:18:40.230223Z INFO ExtHandler ExtHandler Python: 3.9.16 Oct 2 19:18:40.239534 waagent[1524]: 2023-10-02T19:18:40.239436Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 19:18:40.239930 waagent[1524]: 2023-10-02T19:18:40.239873Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:18:40.240085 waagent[1524]: 2023-10-02T19:18:40.240037Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:18:40.252168 waagent[1524]: 2023-10-02T19:18:40.252096Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Oct 2 19:18:40.265526 waagent[1524]: 2023-10-02T19:18:40.265461Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Oct 2 19:18:40.266463 waagent[1524]: 2023-10-02T19:18:40.266403Z INFO ExtHandler Oct 2 19:18:40.266610 waagent[1524]: 2023-10-02T19:18:40.266562Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 3d525b5c-57f5-4411-85de-2de64ff2063d eTag: 11130426018474899264 source: Fabric] Oct 2 19:18:40.267303 waagent[1524]: 2023-10-02T19:18:40.267247Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Oct 2 19:18:40.268381 waagent[1524]: 2023-10-02T19:18:40.268323Z INFO ExtHandler Oct 2 19:18:40.268511 waagent[1524]: 2023-10-02T19:18:40.268460Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Oct 2 19:18:40.275532 waagent[1524]: 2023-10-02T19:18:40.275480Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Oct 2 19:18:40.275965 waagent[1524]: 2023-10-02T19:18:40.275917Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 19:18:40.297007 waagent[1524]: 2023-10-02T19:18:40.296935Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Oct 2 19:18:40.359960 waagent[1524]: 2023-10-02T19:18:40.359832Z INFO ExtHandler Downloaded certificate {'thumbprint': '697B7E81F31829A1CA0A6EFA8224A5D358D645A6', 'hasPrivateKey': True} Oct 2 19:18:40.360937 waagent[1524]: 2023-10-02T19:18:40.360869Z INFO ExtHandler Downloaded certificate {'thumbprint': '13F848092523AE1B290380775DB529575E58B4B7', 'hasPrivateKey': False} Oct 2 19:18:40.361929 waagent[1524]: 2023-10-02T19:18:40.361870Z INFO ExtHandler Fetch goal state completed Oct 2 19:18:40.387513 waagent[1524]: 2023-10-02T19:18:40.387447Z INFO ExtHandler ExtHandler WALinuxAgent-2.10.0.3 running as process 1524 Oct 2 19:18:40.390744 waagent[1524]: 2023-10-02T19:18:40.390682Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 19:18:40.392173 waagent[1524]: 2023-10-02T19:18:40.392119Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 19:18:40.396792 waagent[1524]: 2023-10-02T19:18:40.396741Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 19:18:40.397145 waagent[1524]: 2023-10-02T19:18:40.397090Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 19:18:40.404913 waagent[1524]: 2023-10-02T19:18:40.404859Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 19:18:40.405351 waagent[1524]: 2023-10-02T19:18:40.405295Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 19:18:40.427800 waagent[1524]: 2023-10-02T19:18:40.427701Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Oct 2 19:18:40.430487 waagent[1524]: 2023-10-02T19:18:40.430388Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Oct 2 19:18:40.435780 waagent[1524]: 2023-10-02T19:18:40.435723Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Oct 2 19:18:40.437131 waagent[1524]: 2023-10-02T19:18:40.437075Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 19:18:40.437323 waagent[1524]: 2023-10-02T19:18:40.437265Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:18:40.437520 waagent[1524]: 2023-10-02T19:18:40.437472Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:18:40.438079 waagent[1524]: 2023-10-02T19:18:40.438018Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 19:18:40.438588 waagent[1524]: 2023-10-02T19:18:40.438530Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 19:18:40.438588 waagent[1524]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 19:18:40.438588 waagent[1524]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 19:18:40.438588 waagent[1524]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 19:18:40.438588 waagent[1524]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:18:40.438588 waagent[1524]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:18:40.438588 waagent[1524]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:18:40.440784 waagent[1524]: 2023-10-02T19:18:40.440675Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 19:18:40.443968 waagent[1524]: 2023-10-02T19:18:40.443849Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 19:18:40.444113 waagent[1524]: 2023-10-02T19:18:40.444028Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:18:40.444218 waagent[1524]: 2023-10-02T19:18:40.444159Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 19:18:40.445107 waagent[1524]: 2023-10-02T19:18:40.445035Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:18:40.445491 waagent[1524]: 2023-10-02T19:18:40.445434Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 19:18:40.447785 waagent[1524]: 2023-10-02T19:18:40.447724Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 19:18:40.448514 waagent[1524]: 2023-10-02T19:18:40.448457Z INFO EnvHandler ExtHandler Configure routes Oct 2 19:18:40.453175 waagent[1524]: 2023-10-02T19:18:40.453114Z INFO EnvHandler ExtHandler Gateway:None Oct 2 19:18:40.453565 waagent[1524]: 2023-10-02T19:18:40.453511Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 19:18:40.453565 waagent[1524]: Executing ['ip', '-a', '-o', 'link']: Oct 2 19:18:40.453565 waagent[1524]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 19:18:40.453565 waagent[1524]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:db:e4:b8 brd ff:ff:ff:ff:ff:ff Oct 2 19:18:40.453565 waagent[1524]: 3: enP1897s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:db:e4:b8 brd ff:ff:ff:ff:ff:ff\ altname enP1897p0s2 Oct 2 19:18:40.453565 waagent[1524]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 19:18:40.453565 waagent[1524]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 19:18:40.453565 waagent[1524]: 2: eth0 inet 10.200.8.17/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 19:18:40.453565 waagent[1524]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 19:18:40.453565 waagent[1524]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 19:18:40.453565 waagent[1524]: 2: eth0 inet6 fe80::20d:3aff:fedb:e4b8/64 scope link \ valid_lft forever preferred_lft forever Oct 2 19:18:40.454023 waagent[1524]: 2023-10-02T19:18:40.453692Z INFO EnvHandler ExtHandler Routes:None Oct 2 19:18:40.457590 waagent[1524]: 2023-10-02T19:18:40.457531Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 19:18:40.473263 waagent[1524]: 2023-10-02T19:18:40.473182Z INFO ExtHandler ExtHandler Downloading agent manifest Oct 2 19:18:40.523918 waagent[1524]: 2023-10-02T19:18:40.523807Z INFO ExtHandler ExtHandler Oct 2 19:18:40.524198 waagent[1524]: 2023-10-02T19:18:40.524153Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 8c3c717b-12a3-4a1f-9a0d-640b18ad5ebb correlation bc3cc511-54cc-4a07-a8b2-508af20e84a2 created: 2023-10-02T19:17:05.621452Z] Oct 2 19:18:40.525079 waagent[1524]: 2023-10-02T19:18:40.525031Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Oct 2 19:18:40.526894 waagent[1524]: 2023-10-02T19:18:40.526849Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Oct 2 19:18:40.568831 waagent[1524]: 2023-10-02T19:18:40.568760Z INFO ExtHandler ExtHandler Looking for existing remote access users. Oct 2 19:18:40.581906 waagent[1524]: 2023-10-02T19:18:40.581779Z INFO EnvHandler ExtHandler Current Firewall rules: Oct 2 19:18:40.581906 waagent[1524]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:18:40.581906 waagent[1524]: pkts bytes target prot opt in out source destination Oct 2 19:18:40.581906 waagent[1524]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:18:40.581906 waagent[1524]: pkts bytes target prot opt in out source destination Oct 2 19:18:40.581906 waagent[1524]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:18:40.581906 waagent[1524]: pkts bytes target prot opt in out source destination Oct 2 19:18:40.581906 waagent[1524]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Oct 2 19:18:40.581906 waagent[1524]: 149 19580 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 19:18:40.581906 waagent[1524]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 19:18:40.586508 waagent[1524]: 2023-10-02T19:18:40.586448Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.10.0.3 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 65938383-E840-4735-B50C-6E476688231A;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Oct 2 19:19:05.171782 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Oct 2 19:19:12.402588 systemd[1]: Created slice system-sshd.slice. Oct 2 19:19:12.404500 systemd[1]: Started sshd@0-10.200.8.17:22-10.200.12.6:55592.service. Oct 2 19:19:12.999947 update_engine[1323]: I1002 19:19:12.999891 1323 update_attempter.cc:505] Updating boot flags... Oct 2 19:19:13.396314 sshd[1563]: Accepted publickey for core from 10.200.12.6 port 55592 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:19:13.398021 sshd[1563]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:19:13.401723 systemd-logind[1320]: New session 3 of user core. Oct 2 19:19:13.403148 systemd[1]: Started session-3.scope. Oct 2 19:19:13.961403 systemd[1]: Started sshd@1-10.200.8.17:22-10.200.12.6:55600.service. Oct 2 19:19:14.588188 sshd[1634]: Accepted publickey for core from 10.200.12.6 port 55600 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:19:14.589842 sshd[1634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:19:14.593306 systemd-logind[1320]: New session 4 of user core. Oct 2 19:19:14.594518 systemd[1]: Started session-4.scope. Oct 2 19:19:15.029833 sshd[1634]: pam_unix(sshd:session): session closed for user core Oct 2 19:19:15.033221 systemd[1]: sshd@1-10.200.8.17:22-10.200.12.6:55600.service: Deactivated successfully. Oct 2 19:19:15.034192 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:19:15.034967 systemd-logind[1320]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:19:15.036066 systemd-logind[1320]: Removed session 4. Oct 2 19:19:15.134022 systemd[1]: Started sshd@2-10.200.8.17:22-10.200.12.6:55602.service. Oct 2 19:19:15.764110 sshd[1640]: Accepted publickey for core from 10.200.12.6 port 55602 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:19:15.765747 sshd[1640]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:19:15.770311 systemd[1]: Started session-5.scope. Oct 2 19:19:15.770793 systemd-logind[1320]: New session 5 of user core. Oct 2 19:19:16.205236 sshd[1640]: pam_unix(sshd:session): session closed for user core Oct 2 19:19:16.208517 systemd[1]: sshd@2-10.200.8.17:22-10.200.12.6:55602.service: Deactivated successfully. Oct 2 19:19:16.209457 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:19:16.210241 systemd-logind[1320]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:19:16.211159 systemd-logind[1320]: Removed session 5. Oct 2 19:19:16.312274 systemd[1]: Started sshd@3-10.200.8.17:22-10.200.12.6:55608.service. Oct 2 19:19:16.954838 sshd[1646]: Accepted publickey for core from 10.200.12.6 port 55608 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:19:16.956455 sshd[1646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:19:16.961765 systemd[1]: Started session-6.scope. Oct 2 19:19:16.962439 systemd-logind[1320]: New session 6 of user core. Oct 2 19:19:17.434926 sshd[1646]: pam_unix(sshd:session): session closed for user core Oct 2 19:19:17.438095 systemd[1]: sshd@3-10.200.8.17:22-10.200.12.6:55608.service: Deactivated successfully. Oct 2 19:19:17.439035 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:19:17.439777 systemd-logind[1320]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:19:17.440693 systemd-logind[1320]: Removed session 6. Oct 2 19:19:17.537586 systemd[1]: Started sshd@4-10.200.8.17:22-10.200.12.6:55624.service. Oct 2 19:19:18.161893 sshd[1655]: Accepted publickey for core from 10.200.12.6 port 55624 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:19:18.163501 sshd[1655]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:19:18.169038 systemd[1]: Started session-7.scope. Oct 2 19:19:18.169904 systemd-logind[1320]: New session 7 of user core. Oct 2 19:19:18.744743 sudo[1658]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:19:18.745084 sudo[1658]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:19:18.767844 dbus-daemon[1306]: Э+\xdcvU: received setenforce notice (enforcing=225837952) Oct 2 19:19:18.769661 sudo[1658]: pam_unix(sudo:session): session closed for user root Oct 2 19:19:18.885190 sshd[1655]: pam_unix(sshd:session): session closed for user core Oct 2 19:19:18.888787 systemd[1]: sshd@4-10.200.8.17:22-10.200.12.6:55624.service: Deactivated successfully. Oct 2 19:19:18.889798 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:19:18.890537 systemd-logind[1320]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:19:18.891474 systemd-logind[1320]: Removed session 7. Oct 2 19:19:18.989623 systemd[1]: Started sshd@5-10.200.8.17:22-10.200.12.6:41866.service. Oct 2 19:19:19.617023 sshd[1662]: Accepted publickey for core from 10.200.12.6 port 41866 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:19:19.618726 sshd[1662]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:19:19.624270 systemd[1]: Started session-8.scope. Oct 2 19:19:19.625136 systemd-logind[1320]: New session 8 of user core. Oct 2 19:19:19.957774 sudo[1666]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:19:19.958041 sudo[1666]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:19:19.960979 sudo[1666]: pam_unix(sudo:session): session closed for user root Oct 2 19:19:19.965418 sudo[1665]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:19:19.965703 sudo[1665]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:19:19.974318 systemd[1]: Stopping audit-rules.service... Oct 2 19:19:19.974000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:19:19.978789 auditctl[1669]: No rules Oct 2 19:19:19.978992 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:19:19.979035 kernel: audit: type=1305 audit(1696274359.974:169): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:19:19.979302 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:19:19.979454 systemd[1]: Stopped audit-rules.service. Oct 2 19:19:19.980969 systemd[1]: Starting audit-rules.service... Oct 2 19:19:19.974000 audit[1669]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc27e7c380 a2=420 a3=0 items=0 ppid=1 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:20.001662 kernel: audit: type=1300 audit(1696274359.974:169): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc27e7c380 a2=420 a3=0 items=0 ppid=1 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:20.006651 kernel: audit: type=1327 audit(1696274359.974:169): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:19:19.974000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:19:20.003163 systemd[1]: Finished audit-rules.service. Oct 2 19:19:20.004129 sudo[1665]: pam_unix(sudo:session): session closed for user root Oct 2 19:19:20.006878 augenrules[1686]: No rules Oct 2 19:19:19.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:20.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:20.018649 kernel: audit: type=1131 audit(1696274359.977:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:20.018691 kernel: audit: type=1130 audit(1696274360.000:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:20.000000 audit[1665]: USER_END pid=1665 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:19:20.041110 kernel: audit: type=1106 audit(1696274360.000:172): pid=1665 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:19:20.000000 audit[1665]: CRED_DISP pid=1665 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:19:20.041660 kernel: audit: type=1104 audit(1696274360.000:173): pid=1665 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:19:20.103750 sshd[1662]: pam_unix(sshd:session): session closed for user core Oct 2 19:19:20.103000 audit[1662]: USER_END pid=1662 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:20.107301 systemd[1]: sshd@5-10.200.8.17:22-10.200.12.6:41866.service: Deactivated successfully. Oct 2 19:19:20.108117 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:19:20.109154 systemd-logind[1320]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:19:20.110025 systemd-logind[1320]: Removed session 8. Oct 2 19:19:20.103000 audit[1662]: CRED_DISP pid=1662 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:20.134427 kernel: audit: type=1106 audit(1696274360.103:174): pid=1662 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:20.134483 kernel: audit: type=1104 audit(1696274360.103:175): pid=1662 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:20.134510 kernel: audit: type=1131 audit(1696274360.105:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.17:22-10.200.12.6:41866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:20.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.17:22-10.200.12.6:41866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:20.219930 systemd[1]: Started sshd@6-10.200.8.17:22-10.200.12.6:41880.service. Oct 2 19:19:20.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.17:22-10.200.12.6:41880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:20.846000 audit[1692]: USER_ACCT pid=1692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:20.848974 sshd[1692]: Accepted publickey for core from 10.200.12.6 port 41880 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:19:20.848000 audit[1692]: CRED_ACQ pid=1692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:20.848000 audit[1692]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5aa4c890 a2=3 a3=0 items=0 ppid=1 pid=1692 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:20.848000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:19:20.851395 sshd[1692]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:19:20.856900 systemd[1]: Started session-9.scope. Oct 2 19:19:20.857325 systemd-logind[1320]: New session 9 of user core. Oct 2 19:19:20.860000 audit[1692]: USER_START pid=1692 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:20.861000 audit[1694]: CRED_ACQ pid=1694 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:21.190000 audit[1695]: USER_ACCT pid=1695 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:19:21.190000 audit[1695]: CRED_REFR pid=1695 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:19:21.192286 sudo[1695]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:19:21.192624 sudo[1695]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:19:21.193000 audit[1695]: USER_START pid=1695 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:19:21.896743 systemd[1]: Starting docker.service... Oct 2 19:19:21.933946 env[1710]: time="2023-10-02T19:19:21.933891783Z" level=info msg="Starting up" Oct 2 19:19:21.935406 env[1710]: time="2023-10-02T19:19:21.935371085Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:19:21.935406 env[1710]: time="2023-10-02T19:19:21.935390885Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:19:21.935564 env[1710]: time="2023-10-02T19:19:21.935410185Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:19:21.935564 env[1710]: time="2023-10-02T19:19:21.935422785Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:19:21.937031 env[1710]: time="2023-10-02T19:19:21.937000487Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:19:21.937031 env[1710]: time="2023-10-02T19:19:21.937018387Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:19:21.937167 env[1710]: time="2023-10-02T19:19:21.937034987Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:19:21.937167 env[1710]: time="2023-10-02T19:19:21.937046487Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:19:21.942903 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3600417761-merged.mount: Deactivated successfully. Oct 2 19:19:22.064681 env[1710]: time="2023-10-02T19:19:22.064614338Z" level=info msg="Loading containers: start." Oct 2 19:19:22.101000 audit[1738]: NETFILTER_CFG table=nat:6 family=2 entries=2 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.101000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffef04698d0 a2=0 a3=7ffef04698bc items=0 ppid=1710 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.101000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:19:22.103000 audit[1740]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.103000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe85295350 a2=0 a3=7ffe8529533c items=0 ppid=1710 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.103000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:19:22.105000 audit[1742]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.105000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdfc0e26f0 a2=0 a3=7ffdfc0e26dc items=0 ppid=1710 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.105000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:19:22.107000 audit[1744]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.107000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffb4d6e7b0 a2=0 a3=7fffb4d6e79c items=0 ppid=1710 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.107000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:19:22.109000 audit[1746]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.109000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1cafa4c0 a2=0 a3=7fff1cafa4ac items=0 ppid=1710 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.109000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:19:22.111000 audit[1748]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.111000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc5da601e0 a2=0 a3=7ffc5da601cc items=0 ppid=1710 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.111000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:19:22.126000 audit[1750]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.126000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffa7983a60 a2=0 a3=7fffa7983a4c items=0 ppid=1710 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.126000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:19:22.128000 audit[1752]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.128000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe99b636e0 a2=0 a3=7ffe99b636cc items=0 ppid=1710 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.128000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:19:22.130000 audit[1754]: NETFILTER_CFG table=filter:14 family=2 entries=2 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.130000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe0ec67b40 a2=0 a3=7ffe0ec67b2c items=0 ppid=1710 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.130000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:19:22.147000 audit[1758]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_unregister_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.147000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff3dce3890 a2=0 a3=7fff3dce387c items=0 ppid=1710 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.147000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:19:22.148000 audit[1759]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.148000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffec68ab220 a2=0 a3=7ffec68ab20c items=0 ppid=1710 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.148000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:19:22.188666 kernel: Initializing XFRM netlink socket Oct 2 19:19:22.224429 env[1710]: time="2023-10-02T19:19:22.224386020Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:19:22.284000 audit[1767]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.284000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffb1df93d0 a2=0 a3=7fffb1df93bc items=0 ppid=1710 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.284000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:19:22.309000 audit[1770]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.309000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffed2b58160 a2=0 a3=7ffed2b5814c items=0 ppid=1710 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.309000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:19:22.313000 audit[1773]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.313000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe3c6c50a0 a2=0 a3=7ffe3c6c508c items=0 ppid=1710 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.313000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:19:22.314000 audit[1775]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.314000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd8cbbee10 a2=0 a3=7ffd8cbbedfc items=0 ppid=1710 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.314000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:19:22.316000 audit[1777]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.316000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff154a54e0 a2=0 a3=7fff154a54cc items=0 ppid=1710 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.316000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:19:22.318000 audit[1779]: NETFILTER_CFG table=nat:22 family=2 entries=2 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.318000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd5b3f0750 a2=0 a3=7ffd5b3f073c items=0 ppid=1710 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.318000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:19:22.320000 audit[1781]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.320000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc61aaaec0 a2=0 a3=7ffc61aaaeac items=0 ppid=1710 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.320000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:19:22.322000 audit[1783]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.322000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffee89fee00 a2=0 a3=7ffee89fedec items=0 ppid=1710 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.322000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:19:22.324000 audit[1785]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.324000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc50c3b4c0 a2=0 a3=7ffc50c3b4ac items=0 ppid=1710 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.324000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:19:22.326000 audit[1787]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.326000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffce8060b40 a2=0 a3=7ffce8060b2c items=0 ppid=1710 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.326000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:19:22.328000 audit[1789]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.328000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd64bd4f40 a2=0 a3=7ffd64bd4f2c items=0 ppid=1710 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.328000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:19:22.330740 systemd-networkd[1477]: docker0: Link UP Oct 2 19:19:22.346000 audit[1793]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_unregister_rule pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.346000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffce4792c00 a2=0 a3=7ffce4792bec items=0 ppid=1710 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.346000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:19:22.347000 audit[1794]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:22.347000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcf3688990 a2=0 a3=7ffcf368897c items=0 ppid=1710 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:22.347000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:19:22.350044 env[1710]: time="2023-10-02T19:19:22.350004463Z" level=info msg="Loading containers: done." Oct 2 19:19:22.380436 env[1710]: time="2023-10-02T19:19:22.380397597Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:19:22.380633 env[1710]: time="2023-10-02T19:19:22.380609597Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:19:22.380762 env[1710]: time="2023-10-02T19:19:22.380742197Z" level=info msg="Daemon has completed initialization" Oct 2 19:19:22.412783 systemd[1]: Started docker.service. Oct 2 19:19:22.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:22.423778 env[1710]: time="2023-10-02T19:19:22.423727346Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:19:22.441212 systemd[1]: Reloading. Oct 2 19:19:22.529573 /usr/lib/systemd/system-generators/torcx-generator[1840]: time="2023-10-02T19:19:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:19:22.530017 /usr/lib/systemd/system-generators/torcx-generator[1840]: time="2023-10-02T19:19:22Z" level=info msg="torcx already run" Oct 2 19:19:22.614684 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:19:22.614703 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:19:22.630685 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:19:22.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.697000 audit: BPF prog-id=35 op=LOAD Oct 2 19:19:22.697000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit: BPF prog-id=36 op=LOAD Oct 2 19:19:22.699000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit: BPF prog-id=37 op=LOAD Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit: BPF prog-id=38 op=LOAD Oct 2 19:19:22.700000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:19:22.700000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit: BPF prog-id=39 op=LOAD Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.700000 audit: BPF prog-id=40 op=LOAD Oct 2 19:19:22.700000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:19:22.700000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:19:22.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.701000 audit: BPF prog-id=41 op=LOAD Oct 2 19:19:22.701000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:19:22.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.705000 audit: BPF prog-id=42 op=LOAD Oct 2 19:19:22.705000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit: BPF prog-id=43 op=LOAD Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.706000 audit: BPF prog-id=44 op=LOAD Oct 2 19:19:22.706000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:19:22.706000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:19:22.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit: BPF prog-id=45 op=LOAD Oct 2 19:19:22.708000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit: BPF prog-id=46 op=LOAD Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.708000 audit: BPF prog-id=47 op=LOAD Oct 2 19:19:22.708000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:19:22.708000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:19:22.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.710000 audit: BPF prog-id=48 op=LOAD Oct 2 19:19:22.710000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:19:22.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:22.710000 audit: BPF prog-id=49 op=LOAD Oct 2 19:19:22.710000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:19:22.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:22.722954 systemd[1]: Started kubelet.service. Oct 2 19:19:22.800068 kubelet[1903]: E1002 19:19:22.800019 1903 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:19:22.801778 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:19:22.801938 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:19:22.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:19:26.902019 env[1334]: time="2023-10-02T19:19:26.901947948Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\"" Oct 2 19:19:28.011328 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1855550862.mount: Deactivated successfully. Oct 2 19:19:29.875554 env[1334]: time="2023-10-02T19:19:29.875494326Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:29.881196 env[1334]: time="2023-10-02T19:19:29.881154364Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:19b9246d37c8b8c754a8af86facf1975604cfc709fc0ff736531917402189d9c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:29.884191 env[1334]: time="2023-10-02T19:19:29.884158119Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:29.888146 env[1334]: time="2023-10-02T19:19:29.888109496Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5e7a0196a7908cb49bcbf751d2546a008c329ff1e70c26c1cd542e0ada4b623c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:29.888770 env[1334]: time="2023-10-02T19:19:29.888740445Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\" returns image reference \"sha256:19b9246d37c8b8c754a8af86facf1975604cfc709fc0ff736531917402189d9c\"" Oct 2 19:19:29.898469 env[1334]: time="2023-10-02T19:19:29.898442453Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\"" Oct 2 19:19:31.812076 env[1334]: time="2023-10-02T19:19:31.812028723Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:31.817274 env[1334]: time="2023-10-02T19:19:31.817234821Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7810e6aed9778a5f84fc93f48b0c52edfc55333d7b8de7c71972df8c5b925988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:31.822717 env[1334]: time="2023-10-02T19:19:31.822680900Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:31.827705 env[1334]: time="2023-10-02T19:19:31.827670415Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:c76ca5b0cf607f82c54d51c3c6766da30c9a9f684065e1cac761ea9b07b74e97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:31.828302 env[1334]: time="2023-10-02T19:19:31.828270969Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\" returns image reference \"sha256:7810e6aed9778a5f84fc93f48b0c52edfc55333d7b8de7c71972df8c5b925988\"" Oct 2 19:19:31.838827 env[1334]: time="2023-10-02T19:19:31.838787657Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\"" Oct 2 19:19:33.060416 kernel: kauditd_printk_skb: 258 callbacks suppressed Oct 2 19:19:33.060547 kernel: audit: type=1130 audit(1696274373.042:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:33.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:33.042773 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:19:33.043041 systemd[1]: Stopped kubelet.service. Oct 2 19:19:33.059945 systemd[1]: Started kubelet.service. Oct 2 19:19:33.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:33.089215 kernel: audit: type=1131 audit(1696274373.042:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:33.089340 kernel: audit: type=1130 audit(1696274373.059:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:33.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:33.150809 kubelet[1932]: E1002 19:19:33.150756 1932 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:19:33.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:19:33.154665 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:19:33.154824 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:19:33.169692 kernel: audit: type=1131 audit(1696274373.154:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:19:33.267975 env[1334]: time="2023-10-02T19:19:33.267918131Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:33.275712 env[1334]: time="2023-10-02T19:19:33.275667065Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:993d768b9b96e874c4a171298200661de0d28e52f4d8764e6b2ed1c42470851d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:33.281181 env[1334]: time="2023-10-02T19:19:33.281143765Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:33.285739 env[1334]: time="2023-10-02T19:19:33.285708631Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:bb227512d96e93dd3fe356cef552cc3f78905f36330b762adde23c3f0943d57b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:33.286357 env[1334]: time="2023-10-02T19:19:33.286324186Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\" returns image reference \"sha256:993d768b9b96e874c4a171298200661de0d28e52f4d8764e6b2ed1c42470851d\"" Oct 2 19:19:33.296614 env[1334]: time="2023-10-02T19:19:33.296583537Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\"" Oct 2 19:19:34.548178 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1258533470.mount: Deactivated successfully. Oct 2 19:19:35.090077 env[1334]: time="2023-10-02T19:19:35.090024555Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:35.097029 env[1334]: time="2023-10-02T19:19:35.096930677Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:35.101533 env[1334]: time="2023-10-02T19:19:35.101495561Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:35.107367 env[1334]: time="2023-10-02T19:19:35.107279761Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8e9eff2f6d0b398f9ac5f5a15c1cb7d5f468f28d64a78d593d57f72a969a54ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:35.108439 env[1334]: time="2023-10-02T19:19:35.108406683Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\" returns image reference \"sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985\"" Oct 2 19:19:35.119232 env[1334]: time="2023-10-02T19:19:35.119198337Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:19:35.613787 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1895932939.mount: Deactivated successfully. Oct 2 19:19:35.639307 env[1334]: time="2023-10-02T19:19:35.639256370Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:35.649875 env[1334]: time="2023-10-02T19:19:35.649836039Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:35.654234 env[1334]: time="2023-10-02T19:19:35.654203437Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:35.659627 env[1334]: time="2023-10-02T19:19:35.659596364Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:35.660082 env[1334]: time="2023-10-02T19:19:35.660048632Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 19:19:35.669817 env[1334]: time="2023-10-02T19:19:35.669776560Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Oct 2 19:19:36.589671 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount372376426.mount: Deactivated successfully. Oct 2 19:19:40.700998 env[1334]: time="2023-10-02T19:19:40.700934742Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:40.709425 env[1334]: time="2023-10-02T19:19:40.709386231Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:40.714657 env[1334]: time="2023-10-02T19:19:40.714612915Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:40.719160 env[1334]: time="2023-10-02T19:19:40.719129242Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:40.719895 env[1334]: time="2023-10-02T19:19:40.719860498Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Oct 2 19:19:40.729573 env[1334]: time="2023-10-02T19:19:40.729544412Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 19:19:41.307646 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4131878837.mount: Deactivated successfully. Oct 2 19:19:41.989519 env[1334]: time="2023-10-02T19:19:41.989463003Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:41.998611 env[1334]: time="2023-10-02T19:19:41.998562167Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:42.004076 env[1334]: time="2023-10-02T19:19:42.004037649Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:42.011871 env[1334]: time="2023-10-02T19:19:42.011834501Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:42.012343 env[1334]: time="2023-10-02T19:19:42.012311574Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Oct 2 19:19:43.292775 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 19:19:43.309700 kernel: audit: type=1130 audit(1696274383.291:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:43.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:43.293040 systemd[1]: Stopped kubelet.service. Oct 2 19:19:43.313768 systemd[1]: Started kubelet.service. Oct 2 19:19:43.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:43.329670 kernel: audit: type=1131 audit(1696274383.291:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:43.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:43.347664 kernel: audit: type=1130 audit(1696274383.312:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:43.407185 kubelet[2017]: E1002 19:19:43.407125 2017 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:19:43.409069 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:19:43.409226 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:19:43.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:19:43.425753 kernel: audit: type=1131 audit(1696274383.407:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:19:44.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:44.776186 systemd[1]: Stopped kubelet.service. Oct 2 19:19:44.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:44.804356 kernel: audit: type=1130 audit(1696274384.775:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:44.804453 kernel: audit: type=1131 audit(1696274384.778:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:44.805788 systemd[1]: Reloading. Oct 2 19:19:44.890571 /usr/lib/systemd/system-generators/torcx-generator[2047]: time="2023-10-02T19:19:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:19:44.890608 /usr/lib/systemd/system-generators/torcx-generator[2047]: time="2023-10-02T19:19:44Z" level=info msg="torcx already run" Oct 2 19:19:44.979979 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:19:44.979998 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:19:44.995904 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:19:45.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.078664 kernel: audit: type=1400 audit(1696274385.064:395): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.098772 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:19:45.098867 kernel: audit: type=1400 audit(1696274385.064:396): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.098894 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:19:45.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.078000 audit: BPF prog-id=50 op=LOAD Oct 2 19:19:45.078000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit: BPF prog-id=51 op=LOAD Oct 2 19:19:45.080000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit: BPF prog-id=52 op=LOAD Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit: BPF prog-id=53 op=LOAD Oct 2 19:19:45.080000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:19:45.080000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit: BPF prog-id=54 op=LOAD Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.080000 audit: BPF prog-id=55 op=LOAD Oct 2 19:19:45.102000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:19:45.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.103000 audit: BPF prog-id=56 op=LOAD Oct 2 19:19:45.103000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit: BPF prog-id=57 op=LOAD Oct 2 19:19:45.106000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit: BPF prog-id=58 op=LOAD Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.106000 audit: BPF prog-id=59 op=LOAD Oct 2 19:19:45.107000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:19:45.107000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit: BPF prog-id=60 op=LOAD Oct 2 19:19:45.108000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit: BPF prog-id=61 op=LOAD Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.109000 audit: BPF prog-id=62 op=LOAD Oct 2 19:19:45.109000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:19:45.109000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:19:45.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.110000 audit: BPF prog-id=63 op=LOAD Oct 2 19:19:45.110000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:19:45.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.111000 audit: BPF prog-id=64 op=LOAD Oct 2 19:19:45.111000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:19:45.129293 systemd[1]: Started kubelet.service. Oct 2 19:19:45.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:45.176671 kubelet[2110]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:19:45.176671 kubelet[2110]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:19:45.176671 kubelet[2110]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:19:45.177114 kubelet[2110]: I1002 19:19:45.176718 2110 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:19:45.468377 kubelet[2110]: I1002 19:19:45.463243 2110 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 19:19:45.468377 kubelet[2110]: I1002 19:19:45.463269 2110 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:19:45.468377 kubelet[2110]: I1002 19:19:45.463538 2110 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 19:19:45.469359 kubelet[2110]: I1002 19:19:45.469331 2110 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:19:45.469564 kubelet[2110]: E1002 19:19:45.469546 2110 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.17:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:45.472368 kubelet[2110]: I1002 19:19:45.472348 2110 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:19:45.472606 kubelet[2110]: I1002 19:19:45.472588 2110 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:19:45.472703 kubelet[2110]: I1002 19:19:45.472685 2110 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:19:45.472834 kubelet[2110]: I1002 19:19:45.472713 2110 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:19:45.472834 kubelet[2110]: I1002 19:19:45.472727 2110 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 19:19:45.472927 kubelet[2110]: I1002 19:19:45.472839 2110 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:19:45.477168 kubelet[2110]: I1002 19:19:45.477147 2110 kubelet.go:405] "Attempting to sync node with API server" Oct 2 19:19:45.477264 kubelet[2110]: I1002 19:19:45.477174 2110 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:19:45.477264 kubelet[2110]: I1002 19:19:45.477197 2110 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:19:45.477264 kubelet[2110]: I1002 19:19:45.477216 2110 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:19:45.478706 kubelet[2110]: W1002 19:19:45.478661 2110 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-ed15fb6ad9&limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:45.478793 kubelet[2110]: E1002 19:19:45.478728 2110 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-ed15fb6ad9&limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:45.478846 kubelet[2110]: I1002 19:19:45.478827 2110 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:19:45.479121 kubelet[2110]: W1002 19:19:45.479101 2110 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:19:45.479853 kubelet[2110]: I1002 19:19:45.479830 2110 server.go:1168] "Started kubelet" Oct 2 19:19:45.482667 kubelet[2110]: E1002 19:19:45.482531 2110 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-ed15fb6ad9.178a6090fc1d0d24", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-ed15fb6ad9", UID:"ci-3510.3.0-a-ed15fb6ad9", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-ed15fb6ad9"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 19, 45, 479732516, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 19, 45, 479732516, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.8.17:6443/api/v1/namespaces/default/events": dial tcp 10.200.8.17:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:19:45.482842 kubelet[2110]: I1002 19:19:45.482773 2110 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:19:45.483694 kubelet[2110]: I1002 19:19:45.483676 2110 server.go:461] "Adding debug handlers to kubelet server" Oct 2 19:19:45.485119 kubelet[2110]: I1002 19:19:45.485102 2110 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:19:45.485829 kubelet[2110]: E1002 19:19:45.485812 2110 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:19:45.485927 kubelet[2110]: E1002 19:19:45.485917 2110 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:19:45.486100 kubelet[2110]: W1002 19:19:45.486066 2110 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:45.486196 kubelet[2110]: E1002 19:19:45.486186 2110 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:45.486000 audit[2110]: AVC avc: denied { mac_admin } for pid=2110 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.486000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:19:45.486000 audit[2110]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006a69c0 a1=c000e47410 a2=c0006a6990 a3=25 items=0 ppid=1 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:45.486000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:19:45.486000 audit[2110]: AVC avc: denied { mac_admin } for pid=2110 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.486000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:19:45.486000 audit[2110]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e3fd40 a1=c000e47428 a2=c0006a6a50 a3=25 items=0 ppid=1 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:45.486000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:19:45.488207 kubelet[2110]: I1002 19:19:45.487572 2110 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:19:45.488207 kubelet[2110]: I1002 19:19:45.487619 2110 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:19:45.488207 kubelet[2110]: I1002 19:19:45.487713 2110 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:19:45.490266 kubelet[2110]: E1002 19:19:45.489515 2110 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-ed15fb6ad9\" not found" Oct 2 19:19:45.490266 kubelet[2110]: I1002 19:19:45.489537 2110 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 19:19:45.490266 kubelet[2110]: I1002 19:19:45.489658 2110 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 19:19:45.490266 kubelet[2110]: W1002 19:19:45.489969 2110 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:45.490266 kubelet[2110]: E1002 19:19:45.490016 2110 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:45.490832 kubelet[2110]: E1002 19:19:45.490810 2110 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-ed15fb6ad9?timeout=10s\": dial tcp 10.200.8.17:6443: connect: connection refused" interval="200ms" Oct 2 19:19:45.493000 audit[2120]: NETFILTER_CFG table=mangle:30 family=2 entries=2 op=nft_register_chain pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:45.493000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=4 a1=7ffe3a51d180 a2=0 a3=7ffe3a51d16c items=0 ppid=2110 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:45.493000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:19:45.494000 audit[2121]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2121 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:45.494000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=4 a1=7ffd39798a30 a2=0 a3=7ffd39798a1c items=0 ppid=2110 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:45.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:19:45.497000 audit[2123]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2123 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:45.497000 audit[2123]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=4 a1=7ffefb013a60 a2=0 a3=7ffefb013a4c items=0 ppid=2110 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:45.497000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:19:45.499000 audit[2125]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:45.499000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=4 a1=7ffd468a4390 a2=0 a3=7ffd468a437c items=0 ppid=2110 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:45.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:19:45.525000 audit[2131]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:45.525000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=4 a1=7fffe20ead10 a2=0 a3=7fffe20eacfc items=0 ppid=2110 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:45.525000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:19:45.526179 kubelet[2110]: I1002 19:19:45.526158 2110 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:19:45.527000 audit[2133]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:45.527000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=4 a1=7ffd038323d0 a2=0 a3=7ffd038323bc items=0 ppid=2110 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:45.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:19:45.527000 audit[2135]: NETFILTER_CFG table=mangle:36 family=10 entries=2 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:45.527000 audit[2135]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=4 a1=7ffed6d1de30 a2=0 a3=10e3 items=0 ppid=2110 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:45.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:19:45.528601 kubelet[2110]: I1002 19:19:45.528582 2110 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:19:45.528685 kubelet[2110]: I1002 19:19:45.528610 2110 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 19:19:45.528685 kubelet[2110]: I1002 19:19:45.528631 2110 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 19:19:45.528000 audit[2136]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:45.528000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=4 a1=7ffc1c247a00 a2=0 a3=7ffc1c2479ec items=0 ppid=2110 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:45.528000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:19:45.529595 kubelet[2110]: E1002 19:19:45.529572 2110 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:19:45.529947 kubelet[2110]: W1002 19:19:45.529916 2110 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:45.530030 kubelet[2110]: E1002 19:19:45.529955 2110 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:45.530000 audit[2137]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:45.530000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=4 a1=7ffe3e9c7ed0 a2=0 a3=7ffe3e9c7ebc items=0 ppid=2110 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:45.530000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:19:45.531000 audit[2139]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:19:45.531000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=4 a1=7ffeaeff49c0 a2=0 a3=7ffeaeff49ac items=0 ppid=2110 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:45.531000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:19:45.532000 audit[2140]: NETFILTER_CFG table=nat:40 family=10 entries=2 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:45.532000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=4 a1=7ffcd5ce6b00 a2=0 a3=7ffcd5ce6aec items=0 ppid=2110 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:45.532000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:19:45.533000 audit[2141]: NETFILTER_CFG table=filter:41 family=10 entries=2 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:19:45.533000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=4 a1=7fff05691be0 a2=0 a3=7fff05691bcc items=0 ppid=2110 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:45.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:19:45.629681 kubelet[2110]: E1002 19:19:45.629651 2110 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 2 19:19:45.630194 kubelet[2110]: I1002 19:19:45.629939 2110 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:45.630360 kubelet[2110]: E1002 19:19:45.630333 2110 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.17:6443/api/v1/nodes\": dial tcp 10.200.8.17:6443: connect: connection refused" node="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:45.630916 kubelet[2110]: I1002 19:19:45.630812 2110 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:19:45.630916 kubelet[2110]: I1002 19:19:45.630906 2110 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:19:45.631062 kubelet[2110]: I1002 19:19:45.630927 2110 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:19:45.635827 kubelet[2110]: I1002 19:19:45.635803 2110 policy_none.go:49] "None policy: Start" Oct 2 19:19:45.636316 kubelet[2110]: I1002 19:19:45.636299 2110 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:19:45.636392 kubelet[2110]: I1002 19:19:45.636324 2110 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:19:45.645169 systemd[1]: Created slice kubepods.slice. Oct 2 19:19:45.648975 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:19:45.651885 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:19:45.658230 kubelet[2110]: I1002 19:19:45.658206 2110 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:19:45.657000 audit[2110]: AVC avc: denied { mac_admin } for pid=2110 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:45.657000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:19:45.657000 audit[2110]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a269c0 a1=c000c27aa0 a2=c000a26990 a3=25 items=0 ppid=1 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:45.657000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:19:45.658595 kubelet[2110]: I1002 19:19:45.658285 2110 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:19:45.658595 kubelet[2110]: I1002 19:19:45.658527 2110 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:19:45.659988 kubelet[2110]: E1002 19:19:45.659973 2110 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.0-a-ed15fb6ad9\" not found" Oct 2 19:19:45.692538 kubelet[2110]: E1002 19:19:45.692459 2110 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-ed15fb6ad9?timeout=10s\": dial tcp 10.200.8.17:6443: connect: connection refused" interval="400ms" Oct 2 19:19:45.831123 kubelet[2110]: I1002 19:19:45.831071 2110 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:19:45.833136 kubelet[2110]: I1002 19:19:45.833107 2110 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:19:45.833679 kubelet[2110]: I1002 19:19:45.833402 2110 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:45.833886 kubelet[2110]: E1002 19:19:45.833816 2110 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.17:6443/api/v1/nodes\": dial tcp 10.200.8.17:6443: connect: connection refused" node="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:45.835365 kubelet[2110]: I1002 19:19:45.835172 2110 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:19:45.841051 systemd[1]: Created slice kubepods-burstable-pod34d8a86d5fab62f2b5a1da4e91058411.slice. Oct 2 19:19:45.853262 systemd[1]: Created slice kubepods-burstable-pod0a90b0a71375b6343f0b2d355bd705f0.slice. Oct 2 19:19:45.860858 systemd[1]: Created slice kubepods-burstable-podc674ef4c15154491a81e048385b9c9f5.slice. Oct 2 19:19:45.892513 kubelet[2110]: I1002 19:19:45.892476 2110 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/34d8a86d5fab62f2b5a1da4e91058411-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"34d8a86d5fab62f2b5a1da4e91058411\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:45.892696 kubelet[2110]: I1002 19:19:45.892530 2110 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/34d8a86d5fab62f2b5a1da4e91058411-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"34d8a86d5fab62f2b5a1da4e91058411\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:45.892696 kubelet[2110]: I1002 19:19:45.892565 2110 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0a90b0a71375b6343f0b2d355bd705f0-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"0a90b0a71375b6343f0b2d355bd705f0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:45.892696 kubelet[2110]: I1002 19:19:45.892595 2110 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0a90b0a71375b6343f0b2d355bd705f0-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"0a90b0a71375b6343f0b2d355bd705f0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:45.892696 kubelet[2110]: I1002 19:19:45.892630 2110 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/34d8a86d5fab62f2b5a1da4e91058411-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"34d8a86d5fab62f2b5a1da4e91058411\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:45.892696 kubelet[2110]: I1002 19:19:45.892683 2110 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0a90b0a71375b6343f0b2d355bd705f0-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"0a90b0a71375b6343f0b2d355bd705f0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:45.892983 kubelet[2110]: I1002 19:19:45.892719 2110 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0a90b0a71375b6343f0b2d355bd705f0-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"0a90b0a71375b6343f0b2d355bd705f0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:45.892983 kubelet[2110]: I1002 19:19:45.892757 2110 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0a90b0a71375b6343f0b2d355bd705f0-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"0a90b0a71375b6343f0b2d355bd705f0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:45.892983 kubelet[2110]: I1002 19:19:45.892792 2110 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c674ef4c15154491a81e048385b9c9f5-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"c674ef4c15154491a81e048385b9c9f5\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:46.093144 kubelet[2110]: E1002 19:19:46.093023 2110 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-ed15fb6ad9?timeout=10s\": dial tcp 10.200.8.17:6443: connect: connection refused" interval="800ms" Oct 2 19:19:46.152387 env[1334]: time="2023-10-02T19:19:46.152331139Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-ed15fb6ad9,Uid:34d8a86d5fab62f2b5a1da4e91058411,Namespace:kube-system,Attempt:0,}" Oct 2 19:19:46.156964 env[1334]: time="2023-10-02T19:19:46.156926401Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9,Uid:0a90b0a71375b6343f0b2d355bd705f0,Namespace:kube-system,Attempt:0,}" Oct 2 19:19:46.164109 env[1334]: time="2023-10-02T19:19:46.164070132Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-ed15fb6ad9,Uid:c674ef4c15154491a81e048385b9c9f5,Namespace:kube-system,Attempt:0,}" Oct 2 19:19:46.235591 kubelet[2110]: I1002 19:19:46.235551 2110 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:46.236272 kubelet[2110]: E1002 19:19:46.236250 2110 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.17:6443/api/v1/nodes\": dial tcp 10.200.8.17:6443: connect: connection refused" node="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:46.309186 kubelet[2110]: W1002 19:19:46.309143 2110 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:46.309186 kubelet[2110]: E1002 19:19:46.309189 2110 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:46.428139 kubelet[2110]: W1002 19:19:46.428023 2110 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-ed15fb6ad9&limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:46.428139 kubelet[2110]: E1002 19:19:46.428070 2110 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-ed15fb6ad9&limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:46.662433 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4204917905.mount: Deactivated successfully. Oct 2 19:19:46.692327 env[1334]: time="2023-10-02T19:19:46.691956051Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:46.697708 env[1334]: time="2023-10-02T19:19:46.697666156Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:46.712622 env[1334]: time="2023-10-02T19:19:46.712584185Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:46.717017 env[1334]: time="2023-10-02T19:19:46.716983558Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:46.722328 env[1334]: time="2023-10-02T19:19:46.722297883Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:46.729750 env[1334]: time="2023-10-02T19:19:46.729717100Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:46.731797 kubelet[2110]: W1002 19:19:46.731770 2110 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:46.731889 kubelet[2110]: E1002 19:19:46.731806 2110 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:46.733166 env[1334]: time="2023-10-02T19:19:46.733134323Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:46.737286 env[1334]: time="2023-10-02T19:19:46.737255110Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:46.741068 env[1334]: time="2023-10-02T19:19:46.741041215Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:46.745348 env[1334]: time="2023-10-02T19:19:46.745320794Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:46.752339 env[1334]: time="2023-10-02T19:19:46.752309432Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:46.764743 env[1334]: time="2023-10-02T19:19:46.764698192Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:19:46.825734 env[1334]: time="2023-10-02T19:19:46.825646142Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:19:46.825734 env[1334]: time="2023-10-02T19:19:46.825699440Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:19:46.825734 env[1334]: time="2023-10-02T19:19:46.825713239Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:19:46.826815 env[1334]: time="2023-10-02T19:19:46.826767484Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fdb9b97a015902e6446366666ce387112d5426e282245fef3d658178c3685f07 pid=2149 runtime=io.containerd.runc.v2 Oct 2 19:19:46.847267 systemd[1]: Started cri-containerd-fdb9b97a015902e6446366666ce387112d5426e282245fef3d658178c3685f07.scope. Oct 2 19:19:46.875256 env[1334]: time="2023-10-02T19:19:46.875173183Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:19:46.875531 env[1334]: time="2023-10-02T19:19:46.875498566Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:19:46.875739 env[1334]: time="2023-10-02T19:19:46.875713955Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:19:46.876042 env[1334]: time="2023-10-02T19:19:46.875998140Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8c8a4819d72db37fcbf56fb204a3d802108fbe7444be494826b0bcfc3baea53d pid=2188 runtime=io.containerd.runc.v2 Oct 2 19:19:46.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.877000 audit: BPF prog-id=65 op=LOAD Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2149 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664623962393761303135393032653634343633363636363663653338 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2149 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664623962393761303135393032653634343633363636363663653338 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit: BPF prog-id=66 op=LOAD Oct 2 19:19:46.878000 audit[2159]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a13e0 items=0 ppid=2149 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664623962393761303135393032653634343633363636363663653338 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.878000 audit: BPF prog-id=67 op=LOAD Oct 2 19:19:46.878000 audit[2159]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a1428 items=0 ppid=2149 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664623962393761303135393032653634343633363636363663653338 Oct 2 19:19:46.878000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:19:46.878000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:19:46.879000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.879000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.879000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.879000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.879000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.879000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.879000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.879000 audit[2159]: AVC avc: denied { perfmon } for pid=2159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.879000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.879000 audit[2159]: AVC avc: denied { bpf } for pid=2159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.879000 audit: BPF prog-id=68 op=LOAD Oct 2 19:19:46.879000 audit[2159]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a1838 items=0 ppid=2149 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664623962393761303135393032653634343633363636363663653338 Oct 2 19:19:46.886762 env[1334]: time="2023-10-02T19:19:46.886707987Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:19:46.886859 env[1334]: time="2023-10-02T19:19:46.886778183Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:19:46.886859 env[1334]: time="2023-10-02T19:19:46.886806482Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:19:46.887002 env[1334]: time="2023-10-02T19:19:46.886969073Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/072a64b58e6707ee99821b6f3e5e53e6a39939791bdd159e351e789fbf5ae411 pid=2195 runtime=io.containerd.runc.v2 Oct 2 19:19:46.894094 kubelet[2110]: E1002 19:19:46.894041 2110 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-ed15fb6ad9?timeout=10s\": dial tcp 10.200.8.17:6443: connect: connection refused" interval="1.6s" Oct 2 19:19:46.909048 systemd[1]: Started cri-containerd-072a64b58e6707ee99821b6f3e5e53e6a39939791bdd159e351e789fbf5ae411.scope. Oct 2 19:19:46.917250 systemd[1]: Started cri-containerd-8c8a4819d72db37fcbf56fb204a3d802108fbe7444be494826b0bcfc3baea53d.scope. Oct 2 19:19:46.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.930000 audit: BPF prog-id=69 op=LOAD Oct 2 19:19:46.931000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.931000 audit[2210]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2195 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037326136346235386536373037656539393832316236663365356535 Oct 2 19:19:46.932000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.932000 audit[2210]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2195 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037326136346235386536373037656539393832316236663365356535 Oct 2 19:19:46.932000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.932000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.932000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.932000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.932000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.932000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.932000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.932000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.932000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.932000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.932000 audit: BPF prog-id=70 op=LOAD Oct 2 19:19:46.932000 audit[2210]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00019c540 items=0 ppid=2195 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037326136346235386536373037656539393832316236663365356535 Oct 2 19:19:46.933000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.933000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.933000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.933000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.933000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.933000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.933000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.933000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.933000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.933000 audit: BPF prog-id=71 op=LOAD Oct 2 19:19:46.933000 audit[2210]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00019c588 items=0 ppid=2195 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037326136346235386536373037656539393832316236663365356535 Oct 2 19:19:46.933000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:19:46.933000 audit: BPF prog-id=70 op=UNLOAD Oct 2 19:19:46.934000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.934000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.934000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.934000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.934000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.934000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.934000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.934000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.934000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.934000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.934000 audit: BPF prog-id=72 op=LOAD Oct 2 19:19:46.934000 audit[2210]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00019c998 items=0 ppid=2195 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037326136346235386536373037656539393832316236663365356535 Oct 2 19:19:46.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.937000 audit: BPF prog-id=73 op=LOAD Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2188 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863386134383139643732646233376663626635366662323034613364 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2188 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863386134383139643732646233376663626635366662323034613364 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit: BPF prog-id=74 op=LOAD Oct 2 19:19:46.939000 audit[2202]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002192c0 items=0 ppid=2188 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863386134383139643732646233376663626635366662323034613364 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit: BPF prog-id=75 op=LOAD Oct 2 19:19:46.939000 audit[2202]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000219308 items=0 ppid=2188 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863386134383139643732646233376663626635366662323034613364 Oct 2 19:19:46.939000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:19:46.939000 audit: BPF prog-id=74 op=UNLOAD Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { perfmon } for pid=2202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit[2202]: AVC avc: denied { bpf } for pid=2202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:46.939000 audit: BPF prog-id=76 op=LOAD Oct 2 19:19:46.939000 audit[2202]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000219718 items=0 ppid=2188 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:46.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863386134383139643732646233376663626635366662323034613364 Oct 2 19:19:46.998912 env[1334]: time="2023-10-02T19:19:46.998839292Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-ed15fb6ad9,Uid:c674ef4c15154491a81e048385b9c9f5,Namespace:kube-system,Attempt:0,} returns sandbox id \"fdb9b97a015902e6446366666ce387112d5426e282245fef3d658178c3685f07\"" Oct 2 19:19:46.999817 env[1334]: time="2023-10-02T19:19:46.999786743Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9,Uid:0a90b0a71375b6343f0b2d355bd705f0,Namespace:kube-system,Attempt:0,} returns sandbox id \"072a64b58e6707ee99821b6f3e5e53e6a39939791bdd159e351e789fbf5ae411\"" Oct 2 19:19:47.002743 env[1334]: time="2023-10-02T19:19:47.002712094Z" level=info msg="CreateContainer within sandbox \"fdb9b97a015902e6446366666ce387112d5426e282245fef3d658178c3685f07\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:19:47.005289 env[1334]: time="2023-10-02T19:19:47.005268966Z" level=info msg="CreateContainer within sandbox \"072a64b58e6707ee99821b6f3e5e53e6a39939791bdd159e351e789fbf5ae411\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:19:47.009284 env[1334]: time="2023-10-02T19:19:47.009250765Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-ed15fb6ad9,Uid:34d8a86d5fab62f2b5a1da4e91058411,Namespace:kube-system,Attempt:0,} returns sandbox id \"8c8a4819d72db37fcbf56fb204a3d802108fbe7444be494826b0bcfc3baea53d\"" Oct 2 19:19:47.012105 env[1334]: time="2023-10-02T19:19:47.011895032Z" level=info msg="CreateContainer within sandbox \"8c8a4819d72db37fcbf56fb204a3d802108fbe7444be494826b0bcfc3baea53d\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:19:47.012195 kubelet[2110]: W1002 19:19:47.011967 2110 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:47.012195 kubelet[2110]: E1002 19:19:47.012040 2110 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:19:47.039483 kubelet[2110]: I1002 19:19:47.039137 2110 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:47.039483 kubelet[2110]: E1002 19:19:47.039457 2110 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.17:6443/api/v1/nodes\": dial tcp 10.200.8.17:6443: connect: connection refused" node="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:47.067314 env[1334]: time="2023-10-02T19:19:47.067268143Z" level=info msg="CreateContainer within sandbox \"fdb9b97a015902e6446366666ce387112d5426e282245fef3d658178c3685f07\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"a80886b9cfa56ad50f95c077208c6009c0d400e1d578413c0020bae3a3c6f370\"" Oct 2 19:19:47.068117 env[1334]: time="2023-10-02T19:19:47.068089801Z" level=info msg="StartContainer for \"a80886b9cfa56ad50f95c077208c6009c0d400e1d578413c0020bae3a3c6f370\"" Oct 2 19:19:47.080650 env[1334]: time="2023-10-02T19:19:47.080594771Z" level=info msg="CreateContainer within sandbox \"072a64b58e6707ee99821b6f3e5e53e6a39939791bdd159e351e789fbf5ae411\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"968cf6d60a067cf630aa0690af38e2287c5863fd3a143188df14ed7c2c216122\"" Oct 2 19:19:47.081331 env[1334]: time="2023-10-02T19:19:47.081287036Z" level=info msg="StartContainer for \"968cf6d60a067cf630aa0690af38e2287c5863fd3a143188df14ed7c2c216122\"" Oct 2 19:19:47.085822 env[1334]: time="2023-10-02T19:19:47.085770211Z" level=info msg="CreateContainer within sandbox \"8c8a4819d72db37fcbf56fb204a3d802108fbe7444be494826b0bcfc3baea53d\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"3657481fa08479270defc09d77fc8783a43261f88a75c293bf6a995869224bc0\"" Oct 2 19:19:47.087663 env[1334]: time="2023-10-02T19:19:47.086186390Z" level=info msg="StartContainer for \"3657481fa08479270defc09d77fc8783a43261f88a75c293bf6a995869224bc0\"" Oct 2 19:19:47.087339 systemd[1]: Started cri-containerd-a80886b9cfa56ad50f95c077208c6009c0d400e1d578413c0020bae3a3c6f370.scope. Oct 2 19:19:47.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.108000 audit: BPF prog-id=77 op=LOAD Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2149 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138303838366239636661353661643530663935633037373230386336 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2149 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138303838366239636661353661643530663935633037373230386336 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit: BPF prog-id=78 op=LOAD Oct 2 19:19:47.109000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e6090 items=0 ppid=2149 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138303838366239636661353661643530663935633037373230386336 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit: BPF prog-id=79 op=LOAD Oct 2 19:19:47.109000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e60d8 items=0 ppid=2149 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138303838366239636661353661643530663935633037373230386336 Oct 2 19:19:47.109000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:19:47.109000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.109000 audit: BPF prog-id=80 op=LOAD Oct 2 19:19:47.109000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e64e8 items=0 ppid=2149 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138303838366239636661353661643530663935633037373230386336 Oct 2 19:19:47.122172 systemd[1]: Started cri-containerd-3657481fa08479270defc09d77fc8783a43261f88a75c293bf6a995869224bc0.scope. Oct 2 19:19:47.166145 systemd[1]: Started cri-containerd-968cf6d60a067cf630aa0690af38e2287c5863fd3a143188df14ed7c2c216122.scope. Oct 2 19:19:47.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.175000 audit: BPF prog-id=81 op=LOAD Oct 2 19:19:47.176000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.176000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2188 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336353734383166613038343739323730646566633039643737666338 Oct 2 19:19:47.177000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.177000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2188 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336353734383166613038343739323730646566633039643737666338 Oct 2 19:19:47.177000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.177000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.177000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.177000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.177000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.177000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.177000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.177000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.177000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.177000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.177000 audit: BPF prog-id=82 op=LOAD Oct 2 19:19:47.177000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218fa0 items=0 ppid=2188 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336353734383166613038343739323730646566633039643737666338 Oct 2 19:19:47.178000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.178000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.178000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.178000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.178000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.178000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.178000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.178000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.178000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.178000 audit: BPF prog-id=83 op=LOAD Oct 2 19:19:47.178000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218fe8 items=0 ppid=2188 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336353734383166613038343739323730646566633039643737666338 Oct 2 19:19:47.181000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:19:47.181000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:19:47.181000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.181000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.181000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.181000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.181000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.181000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.181000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.181000 audit[2306]: AVC avc: denied { perfmon } for pid=2306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.181000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.181000 audit[2306]: AVC avc: denied { bpf } for pid=2306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.181000 audit: BPF prog-id=84 op=LOAD Oct 2 19:19:47.181000 audit[2306]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002193f8 items=0 ppid=2188 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336353734383166613038343739323730646566633039643737666338 Oct 2 19:19:47.193372 env[1334]: time="2023-10-02T19:19:47.193268296Z" level=info msg="StartContainer for \"a80886b9cfa56ad50f95c077208c6009c0d400e1d578413c0020bae3a3c6f370\" returns successfully" Oct 2 19:19:47.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.199000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.199000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.199000 audit: BPF prog-id=85 op=LOAD Oct 2 19:19:47.200000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.200000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2195 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936386366366436306130363763663633306161303639306166333865 Oct 2 19:19:47.201000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.201000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2195 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936386366366436306130363763663633306161303639306166333865 Oct 2 19:19:47.201000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.201000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.201000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.201000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.201000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.201000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.201000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.201000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.201000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.201000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.201000 audit: BPF prog-id=86 op=LOAD Oct 2 19:19:47.201000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c4360 items=0 ppid=2195 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936386366366436306130363763663633306161303639306166333865 Oct 2 19:19:47.202000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.202000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.202000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.202000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.202000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.202000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.202000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.202000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.202000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.202000 audit: BPF prog-id=87 op=LOAD Oct 2 19:19:47.202000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c43a8 items=0 ppid=2195 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936386366366436306130363763663633306161303639306166333865 Oct 2 19:19:47.202000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:19:47.203000 audit: BPF prog-id=86 op=UNLOAD Oct 2 19:19:47.203000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.203000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.203000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.203000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.203000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.203000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.203000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.203000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.203000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.203000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:47.203000 audit: BPF prog-id=88 op=LOAD Oct 2 19:19:47.203000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c47b8 items=0 ppid=2195 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:47.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936386366366436306130363763663633306161303639306166333865 Oct 2 19:19:47.251103 env[1334]: time="2023-10-02T19:19:47.251049285Z" level=info msg="StartContainer for \"968cf6d60a067cf630aa0690af38e2287c5863fd3a143188df14ed7c2c216122\" returns successfully" Oct 2 19:19:47.258794 env[1334]: time="2023-10-02T19:19:47.258743098Z" level=info msg="StartContainer for \"3657481fa08479270defc09d77fc8783a43261f88a75c293bf6a995869224bc0\" returns successfully" Oct 2 19:19:47.669553 systemd[1]: run-containerd-runc-k8s.io-fdb9b97a015902e6446366666ce387112d5426e282245fef3d658178c3685f07-runc.Od21kY.mount: Deactivated successfully. Oct 2 19:19:48.641570 kubelet[2110]: I1002 19:19:48.641534 2110 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:48.672975 kernel: kauditd_printk_skb: 561 callbacks suppressed Oct 2 19:19:48.673118 kernel: audit: type=1400 audit(1696274388.647:690): avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:48.647000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:48.647000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00103a000 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:19:48.700837 kernel: audit: type=1300 audit(1696274388.647:690): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00103a000 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:19:48.647000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:48.737767 kernel: audit: type=1327 audit(1696274388.647:690): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:48.737892 kernel: audit: type=1400 audit(1696274388.673:691): avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:48.673000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:48.760802 kernel: audit: type=1300 audit(1696274388.673:691): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000153be0 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:19:48.673000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000153be0 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:19:48.673000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:48.780702 kernel: audit: type=1327 audit(1696274388.673:691): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:49.661000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:49.701572 kernel: audit: type=1400 audit(1696274389.661:692): avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:49.701735 kernel: audit: type=1300 audit(1696274389.661:692): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00bdf2260 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:19:49.661000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00bdf2260 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:19:49.661000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:19:49.743876 kernel: audit: type=1327 audit(1696274389.661:692): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:19:49.744004 kernel: audit: type=1400 audit(1696274389.661:693): avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:49.661000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:49.661000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003dc4180 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:19:49.661000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:19:49.667000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6887 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:49.667000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003dc4240 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:19:49.667000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:19:49.759000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6893 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:49.759000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c003ef50e0 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:19:49.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:19:49.766000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:49.766000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00658d020 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:19:49.766000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:19:49.766000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:19:49.766000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c003ef5650 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:19:49.766000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:19:49.844237 kubelet[2110]: E1002 19:19:49.844184 2110 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.0-a-ed15fb6ad9\" not found" node="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:49.872783 kubelet[2110]: I1002 19:19:49.872612 2110 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:50.484515 kubelet[2110]: I1002 19:19:50.484461 2110 apiserver.go:52] "Watching apiserver" Oct 2 19:19:50.490812 kubelet[2110]: I1002 19:19:50.490764 2110 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 19:19:50.521049 kubelet[2110]: I1002 19:19:50.521001 2110 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:19:51.858300 kubelet[2110]: W1002 19:19:51.858267 2110 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 19:19:53.279000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=6918 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:19:53.279000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e4e180 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:19:53.279000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:19:53.849982 systemd[1]: Reloading. Oct 2 19:19:53.910092 kubelet[2110]: W1002 19:19:53.910059 2110 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 19:19:53.941113 /usr/lib/systemd/system-generators/torcx-generator[2397]: time="2023-10-02T19:19:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:19:53.941762 /usr/lib/systemd/system-generators/torcx-generator[2397]: time="2023-10-02T19:19:53Z" level=info msg="torcx already run" Oct 2 19:19:54.029002 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:19:54.029022 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:19:54.045360 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:19:54.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.133003 kernel: kauditd_printk_skb: 17 callbacks suppressed Oct 2 19:19:54.133100 kernel: audit: type=1400 audit(1696274394.127:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.171834 kernel: audit: type=1400 audit(1696274394.127:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.171942 kernel: audit: type=1400 audit(1696274394.132:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.185256 kernel: audit: type=1400 audit(1696274394.132:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.215464 kernel: audit: type=1400 audit(1696274394.132:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.215583 kernel: audit: type=1400 audit(1696274394.132:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.242571 kernel: audit: type=1400 audit(1696274394.132:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.242699 kernel: audit: type=1400 audit(1696274394.132:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255649 kernel: audit: type=1400 audit(1696274394.132:707): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.269927 kernel: audit: type=1400 audit(1696274394.145:708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.145000 audit: BPF prog-id=89 op=LOAD Oct 2 19:19:54.145000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:19:54.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.201000 audit: BPF prog-id=90 op=LOAD Oct 2 19:19:54.201000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:19:54.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.215000 audit: BPF prog-id=91 op=LOAD Oct 2 19:19:54.215000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:19:54.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.242000 audit: BPF prog-id=92 op=LOAD Oct 2 19:19:54.242000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:19:54.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255000 audit: BPF prog-id=93 op=LOAD Oct 2 19:19:54.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255000 audit: BPF prog-id=94 op=LOAD Oct 2 19:19:54.255000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:19:54.255000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:19:54.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.270000 audit: BPF prog-id=96 op=LOAD Oct 2 19:19:54.270000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:19:54.270000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:19:54.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.273000 audit: BPF prog-id=97 op=LOAD Oct 2 19:19:54.273000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:19:54.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.278000 audit: BPF prog-id=98 op=LOAD Oct 2 19:19:54.278000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:19:54.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.280000 audit: BPF prog-id=99 op=LOAD Oct 2 19:19:54.280000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:19:54.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.282000 audit: BPF prog-id=100 op=LOAD Oct 2 19:19:54.282000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit: BPF prog-id=101 op=LOAD Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.283000 audit: BPF prog-id=102 op=LOAD Oct 2 19:19:54.283000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:19:54.283000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:19:54.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit: BPF prog-id=103 op=LOAD Oct 2 19:19:54.285000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit: BPF prog-id=104 op=LOAD Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit: BPF prog-id=105 op=LOAD Oct 2 19:19:54.285000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:19:54.285000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.286000 audit: BPF prog-id=106 op=LOAD Oct 2 19:19:54.286000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:19:54.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.286000 audit: BPF prog-id=107 op=LOAD Oct 2 19:19:54.286000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:19:54.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.288000 audit: BPF prog-id=108 op=LOAD Oct 2 19:19:54.288000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:19:54.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.289000 audit: BPF prog-id=109 op=LOAD Oct 2 19:19:54.289000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:19:54.308927 systemd[1]: Stopping kubelet.service... Oct 2 19:19:54.325913 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:19:54.326135 systemd[1]: Stopped kubelet.service. Oct 2 19:19:54.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:54.328566 systemd[1]: Started kubelet.service. Oct 2 19:19:54.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:54.407617 kubelet[2460]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:19:54.407617 kubelet[2460]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 19:19:54.407617 kubelet[2460]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:19:54.407617 kubelet[2460]: I1002 19:19:54.407559 2460 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:19:54.418190 kubelet[2460]: I1002 19:19:54.418156 2460 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 19:19:54.418190 kubelet[2460]: I1002 19:19:54.418187 2460 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:19:54.418433 kubelet[2460]: I1002 19:19:54.418415 2460 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 19:19:54.420837 kubelet[2460]: I1002 19:19:54.420808 2460 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:19:54.422000 kubelet[2460]: I1002 19:19:54.421977 2460 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:19:54.426001 kubelet[2460]: I1002 19:19:54.425977 2460 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:19:54.426202 kubelet[2460]: I1002 19:19:54.426184 2460 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:19:54.426302 kubelet[2460]: I1002 19:19:54.426280 2460 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:19:54.426429 kubelet[2460]: I1002 19:19:54.426316 2460 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:19:54.426429 kubelet[2460]: I1002 19:19:54.426337 2460 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 19:19:54.426429 kubelet[2460]: I1002 19:19:54.426388 2460 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:19:54.433718 kubelet[2460]: I1002 19:19:54.433695 2460 kubelet.go:405] "Attempting to sync node with API server" Oct 2 19:19:54.433718 kubelet[2460]: I1002 19:19:54.433719 2460 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:19:54.433938 kubelet[2460]: I1002 19:19:54.433742 2460 kubelet.go:309] "Adding apiserver pod source" Oct 2 19:19:54.433938 kubelet[2460]: I1002 19:19:54.433757 2460 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:19:54.441509 kubelet[2460]: I1002 19:19:54.441484 2460 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:19:54.441999 kubelet[2460]: I1002 19:19:54.441979 2460 server.go:1168] "Started kubelet" Oct 2 19:19:54.442000 audit[2460]: AVC avc: denied { mac_admin } for pid=2460 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.442000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:19:54.442000 audit[2460]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006cd3e0 a1=c00081d8c0 a2=c0006cd3b0 a3=25 items=0 ppid=1 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:54.442000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:19:54.444000 audit[2460]: AVC avc: denied { mac_admin } for pid=2460 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.444000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:19:54.444000 audit[2460]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b46720 a1=c00081d8d8 a2=c0006cd470 a3=25 items=0 ppid=1 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:54.444000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:19:54.445216 kubelet[2460]: I1002 19:19:54.444810 2460 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:19:54.445216 kubelet[2460]: I1002 19:19:54.444865 2460 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:19:54.445216 kubelet[2460]: I1002 19:19:54.444890 2460 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:19:54.464630 kubelet[2460]: E1002 19:19:54.464602 2460 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:19:54.467340 kubelet[2460]: E1002 19:19:54.464633 2460 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:19:54.475224 kubelet[2460]: I1002 19:19:54.475200 2460 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 19:19:54.475905 kubelet[2460]: I1002 19:19:54.475883 2460 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 19:19:54.478302 kubelet[2460]: I1002 19:19:54.478257 2460 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:19:54.479211 kubelet[2460]: I1002 19:19:54.479188 2460 server.go:461] "Adding debug handlers to kubelet server" Oct 2 19:19:54.480701 kubelet[2460]: I1002 19:19:54.480674 2460 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 19:19:54.486181 kubelet[2460]: I1002 19:19:54.486168 2460 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:19:54.491757 kubelet[2460]: I1002 19:19:54.491742 2460 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:19:54.491905 kubelet[2460]: I1002 19:19:54.491892 2460 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 19:19:54.491991 kubelet[2460]: I1002 19:19:54.491981 2460 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 19:19:54.492108 kubelet[2460]: E1002 19:19:54.492098 2460 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:19:54.538436 kubelet[2460]: I1002 19:19:54.538414 2460 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:19:54.538580 kubelet[2460]: I1002 19:19:54.538573 2460 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:19:54.538630 kubelet[2460]: I1002 19:19:54.538625 2460 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:19:54.538824 kubelet[2460]: I1002 19:19:54.538815 2460 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:19:54.538888 kubelet[2460]: I1002 19:19:54.538882 2460 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 19:19:54.538926 kubelet[2460]: I1002 19:19:54.538921 2460 policy_none.go:49] "None policy: Start" Oct 2 19:19:54.539513 kubelet[2460]: I1002 19:19:54.539496 2460 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:19:54.539615 kubelet[2460]: I1002 19:19:54.539609 2460 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:19:54.539804 kubelet[2460]: I1002 19:19:54.539796 2460 state_mem.go:75] "Updated machine memory state" Oct 2 19:19:54.542879 kubelet[2460]: I1002 19:19:54.542866 2460 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:19:54.542000 audit[2460]: AVC avc: denied { mac_admin } for pid=2460 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:19:54.542000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:19:54.542000 audit[2460]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dfda10 a1=c000eabab8 a2=c000dfd9e0 a3=25 items=0 ppid=1 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:19:54.542000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:19:54.543228 kubelet[2460]: I1002 19:19:54.543219 2460 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:19:54.543422 kubelet[2460]: I1002 19:19:54.543412 2460 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:19:54.578247 kubelet[2460]: I1002 19:19:54.578220 2460 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:54.591198 kubelet[2460]: I1002 19:19:54.591174 2460 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:54.591379 kubelet[2460]: I1002 19:19:54.591355 2460 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:54.592356 kubelet[2460]: I1002 19:19:54.592334 2460 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:19:54.592544 kubelet[2460]: I1002 19:19:54.592527 2460 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:19:54.593071 kubelet[2460]: I1002 19:19:54.593018 2460 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:19:54.604099 kubelet[2460]: W1002 19:19:54.604078 2460 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 19:19:54.604347 kubelet[2460]: E1002 19:19:54.604330 2460 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:54.604487 kubelet[2460]: W1002 19:19:54.604259 2460 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 19:19:54.608747 kubelet[2460]: W1002 19:19:54.608718 2460 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 19:19:54.608839 kubelet[2460]: E1002 19:19:54.608769 2460 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.0-a-ed15fb6ad9\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:54.778000 kubelet[2460]: I1002 19:19:54.777864 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0a90b0a71375b6343f0b2d355bd705f0-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"0a90b0a71375b6343f0b2d355bd705f0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:54.778000 kubelet[2460]: I1002 19:19:54.777925 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0a90b0a71375b6343f0b2d355bd705f0-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"0a90b0a71375b6343f0b2d355bd705f0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:54.778000 kubelet[2460]: I1002 19:19:54.777963 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0a90b0a71375b6343f0b2d355bd705f0-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"0a90b0a71375b6343f0b2d355bd705f0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:54.778000 kubelet[2460]: I1002 19:19:54.777995 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c674ef4c15154491a81e048385b9c9f5-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"c674ef4c15154491a81e048385b9c9f5\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:54.778345 kubelet[2460]: I1002 19:19:54.778029 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/34d8a86d5fab62f2b5a1da4e91058411-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"34d8a86d5fab62f2b5a1da4e91058411\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:54.778345 kubelet[2460]: I1002 19:19:54.778099 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0a90b0a71375b6343f0b2d355bd705f0-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"0a90b0a71375b6343f0b2d355bd705f0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:54.778345 kubelet[2460]: I1002 19:19:54.778141 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0a90b0a71375b6343f0b2d355bd705f0-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"0a90b0a71375b6343f0b2d355bd705f0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:54.778345 kubelet[2460]: I1002 19:19:54.778173 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/34d8a86d5fab62f2b5a1da4e91058411-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"34d8a86d5fab62f2b5a1da4e91058411\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:54.778345 kubelet[2460]: I1002 19:19:54.778208 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/34d8a86d5fab62f2b5a1da4e91058411-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-ed15fb6ad9\" (UID: \"34d8a86d5fab62f2b5a1da4e91058411\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:55.439515 kubelet[2460]: I1002 19:19:55.439482 2460 apiserver.go:52] "Watching apiserver" Oct 2 19:19:55.477039 kubelet[2460]: I1002 19:19:55.476995 2460 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 19:19:55.483285 kubelet[2460]: I1002 19:19:55.483236 2460 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:19:55.565001 kubelet[2460]: W1002 19:19:55.564965 2460 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 19:19:55.565172 kubelet[2460]: E1002 19:19:55.565087 2460 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.0-a-ed15fb6ad9\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:19:55.575373 kubelet[2460]: I1002 19:19:55.575336 2460 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.0-a-ed15fb6ad9" podStartSLOduration=4.575262102 podCreationTimestamp="2023-10-02 19:19:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:19:55.573154989 +0000 UTC m=+1.237477736" watchObservedRunningTime="2023-10-02 19:19:55.575262102 +0000 UTC m=+1.239584749" Oct 2 19:19:55.599903 kubelet[2460]: I1002 19:19:55.599864 2460 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-ed15fb6ad9" podStartSLOduration=2.599823288 podCreationTimestamp="2023-10-02 19:19:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:19:55.591693823 +0000 UTC m=+1.256016470" watchObservedRunningTime="2023-10-02 19:19:55.599823288 +0000 UTC m=+1.264146035" Oct 2 19:19:55.610606 kubelet[2460]: I1002 19:19:55.610552 2460 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.0-a-ed15fb6ad9" podStartSLOduration=1.610513046 podCreationTimestamp="2023-10-02 19:19:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:19:55.600545458 +0000 UTC m=+1.264868105" watchObservedRunningTime="2023-10-02 19:19:55.610513046 +0000 UTC m=+1.274835793" Oct 2 19:19:59.181748 sudo[1695]: pam_unix(sudo:session): session closed for user root Oct 2 19:19:59.180000 audit[1695]: USER_END pid=1695 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:19:59.195767 kernel: kauditd_printk_skb: 256 callbacks suppressed Oct 2 19:19:59.195897 kernel: audit: type=1106 audit(1696274399.180:944): pid=1695 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:19:59.189000 audit[1695]: CRED_DISP pid=1695 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:19:59.215697 kernel: audit: type=1104 audit(1696274399.189:945): pid=1695 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:19:59.290618 sshd[1692]: pam_unix(sshd:session): session closed for user core Oct 2 19:19:59.290000 audit[1692]: USER_END pid=1692 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:59.294492 systemd[1]: sshd@6-10.200.8.17:22-10.200.12.6:41880.service: Deactivated successfully. Oct 2 19:19:59.295368 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:19:59.295555 systemd[1]: session-9.scope: Consumed 4.040s CPU time. Oct 2 19:19:59.297032 systemd-logind[1320]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:19:59.298072 systemd-logind[1320]: Removed session 9. Oct 2 19:19:59.290000 audit[1692]: CRED_DISP pid=1692 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:59.326323 kernel: audit: type=1106 audit(1696274399.290:946): pid=1692 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:59.326446 kernel: audit: type=1104 audit(1696274399.290:947): pid=1692 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:19:59.326478 kernel: audit: type=1131 audit(1696274399.290:948): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.17:22-10.200.12.6:41880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:19:59.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.17:22-10.200.12.6:41880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:20:03.655000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:03.673680 kernel: audit: type=1400 audit(1696274403.655:949): avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:03.659000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:03.659000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0009ad980 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:20:03.711123 kernel: audit: type=1400 audit(1696274403.659:950): avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:03.711221 kernel: audit: type=1300 audit(1696274403.659:950): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0009ad980 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:20:03.711248 kernel: audit: type=1327 audit(1696274403.659:950): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:03.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:03.659000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:03.659000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0009ad9c0 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:20:03.744669 kernel: audit: type=1400 audit(1696274403.659:951): avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:03.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:03.660000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:03.660000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0009ada00 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:20:03.660000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:03.655000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001071c80 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:20:03.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:06.020028 kubelet[2460]: I1002 19:20:06.019872 2460 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:20:06.021220 env[1334]: time="2023-10-02T19:20:06.021170256Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:20:06.021877 kubelet[2460]: I1002 19:20:06.021857 2460 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:20:06.453280 kubelet[2460]: I1002 19:20:06.453248 2460 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:20:06.459507 systemd[1]: Created slice kubepods-besteffort-pod9c32a93d_3b1e_4539_b145_f5febae0ba7d.slice. Oct 2 19:20:06.460978 kubelet[2460]: W1002 19:20:06.460949 2460 reflector.go:533] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.0-a-ed15fb6ad9" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.0-a-ed15fb6ad9' and this object Oct 2 19:20:06.461090 kubelet[2460]: E1002 19:20:06.460988 2460 reflector.go:148] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.0-a-ed15fb6ad9" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.0-a-ed15fb6ad9' and this object Oct 2 19:20:06.461149 kubelet[2460]: W1002 19:20:06.461134 2460 reflector.go:533] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.0-a-ed15fb6ad9" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.0-a-ed15fb6ad9' and this object Oct 2 19:20:06.461199 kubelet[2460]: E1002 19:20:06.461153 2460 reflector.go:148] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.0-a-ed15fb6ad9" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.0-a-ed15fb6ad9' and this object Oct 2 19:20:06.560844 kubelet[2460]: I1002 19:20:06.560797 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5rr6f\" (UniqueName: \"kubernetes.io/projected/9c32a93d-3b1e-4539-b145-f5febae0ba7d-kube-api-access-5rr6f\") pod \"kube-proxy-x56jj\" (UID: \"9c32a93d-3b1e-4539-b145-f5febae0ba7d\") " pod="kube-system/kube-proxy-x56jj" Oct 2 19:20:06.560844 kubelet[2460]: I1002 19:20:06.560848 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9c32a93d-3b1e-4539-b145-f5febae0ba7d-kube-proxy\") pod \"kube-proxy-x56jj\" (UID: \"9c32a93d-3b1e-4539-b145-f5febae0ba7d\") " pod="kube-system/kube-proxy-x56jj" Oct 2 19:20:06.561069 kubelet[2460]: I1002 19:20:06.560875 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9c32a93d-3b1e-4539-b145-f5febae0ba7d-xtables-lock\") pod \"kube-proxy-x56jj\" (UID: \"9c32a93d-3b1e-4539-b145-f5febae0ba7d\") " pod="kube-system/kube-proxy-x56jj" Oct 2 19:20:06.561069 kubelet[2460]: I1002 19:20:06.560899 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9c32a93d-3b1e-4539-b145-f5febae0ba7d-lib-modules\") pod \"kube-proxy-x56jj\" (UID: \"9c32a93d-3b1e-4539-b145-f5febae0ba7d\") " pod="kube-system/kube-proxy-x56jj" Oct 2 19:20:06.771121 kubelet[2460]: I1002 19:20:06.770991 2460 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:20:06.777172 systemd[1]: Created slice kubepods-besteffort-pod5c61b3fe_0cbf_4c6f_bea3_305ea89947bc.slice. Oct 2 19:20:06.963425 kubelet[2460]: I1002 19:20:06.963379 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bkhg7\" (UniqueName: \"kubernetes.io/projected/5c61b3fe-0cbf-4c6f-bea3-305ea89947bc-kube-api-access-bkhg7\") pod \"tigera-operator-59c686f986-2nk7v\" (UID: \"5c61b3fe-0cbf-4c6f-bea3-305ea89947bc\") " pod="tigera-operator/tigera-operator-59c686f986-2nk7v" Oct 2 19:20:06.963716 kubelet[2460]: I1002 19:20:06.963697 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5c61b3fe-0cbf-4c6f-bea3-305ea89947bc-var-lib-calico\") pod \"tigera-operator-59c686f986-2nk7v\" (UID: \"5c61b3fe-0cbf-4c6f-bea3-305ea89947bc\") " pod="tigera-operator/tigera-operator-59c686f986-2nk7v" Oct 2 19:20:07.080862 env[1334]: time="2023-10-02T19:20:07.080816777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-2nk7v,Uid:5c61b3fe-0cbf-4c6f-bea3-305ea89947bc,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:20:07.133943 env[1334]: time="2023-10-02T19:20:07.133811317Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:20:07.134200 env[1334]: time="2023-10-02T19:20:07.134160906Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:20:07.134380 env[1334]: time="2023-10-02T19:20:07.134343400Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:20:07.134734 env[1334]: time="2023-10-02T19:20:07.134685290Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/77cf3b3281e60c69528f36893558ec8bbbe1457bdc799267e91659c052d26008 pid=2553 runtime=io.containerd.runc.v2 Oct 2 19:20:07.159066 systemd[1]: Started cri-containerd-77cf3b3281e60c69528f36893558ec8bbbe1457bdc799267e91659c052d26008.scope. Oct 2 19:20:07.190971 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 2 19:20:07.191118 kernel: audit: type=1400 audit(1696274407.171:953): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.202832 kernel: audit: type=1400 audit(1696274407.171:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.202921 kernel: audit: type=1400 audit(1696274407.171:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.228184 kernel: audit: type=1400 audit(1696274407.171:956): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.256377 kernel: audit: type=1400 audit(1696274407.171:957): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.256485 kernel: audit: type=1400 audit(1696274407.171:958): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.256509 kernel: audit: type=1400 audit(1696274407.171:959): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.282649 kernel: audit: type=1400 audit(1696274407.171:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.296658 kernel: audit: type=1400 audit(1696274407.171:961): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.171000 audit: BPF prog-id=110 op=LOAD Oct 2 19:20:07.173000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.173000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2553 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737636633623332383165363063363935323866333638393335353865 Oct 2 19:20:07.173000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.173000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=2553 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737636633623332383165363063363935323866333638393335353865 Oct 2 19:20:07.173000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.173000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.173000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.173000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.173000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.173000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.173000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.173000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.173000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.173000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.311671 kernel: audit: type=1400 audit(1696274407.171:962): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.173000 audit: BPF prog-id=111 op=LOAD Oct 2 19:20:07.173000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0000256e0 items=0 ppid=2553 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737636633623332383165363063363935323866333638393335353865 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit: BPF prog-id=112 op=LOAD Oct 2 19:20:07.189000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000025728 items=0 ppid=2553 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737636633623332383165363063363935323866333638393335353865 Oct 2 19:20:07.189000 audit: BPF prog-id=112 op=UNLOAD Oct 2 19:20:07.189000 audit: BPF prog-id=111 op=UNLOAD Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { perfmon } for pid=2564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit[2564]: AVC avc: denied { bpf } for pid=2564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.189000 audit: BPF prog-id=113 op=LOAD Oct 2 19:20:07.189000 audit[2564]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000025b38 items=0 ppid=2553 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737636633623332383165363063363935323866333638393335353865 Oct 2 19:20:07.315275 env[1334]: time="2023-10-02T19:20:07.315235833Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-2nk7v,Uid:5c61b3fe-0cbf-4c6f-bea3-305ea89947bc,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"77cf3b3281e60c69528f36893558ec8bbbe1457bdc799267e91659c052d26008\"" Oct 2 19:20:07.317090 env[1334]: time="2023-10-02T19:20:07.317060476Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:20:07.668628 env[1334]: time="2023-10-02T19:20:07.668572363Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-x56jj,Uid:9c32a93d-3b1e-4539-b145-f5febae0ba7d,Namespace:kube-system,Attempt:0,}" Oct 2 19:20:07.711488 env[1334]: time="2023-10-02T19:20:07.711420120Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:20:07.711488 env[1334]: time="2023-10-02T19:20:07.711458919Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:20:07.711727 env[1334]: time="2023-10-02T19:20:07.711472619Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:20:07.711989 env[1334]: time="2023-10-02T19:20:07.711936404Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1983b8f2c533f8e13e5ebf6ba0ade4e2bb3f36238c1199866f62bc627b11be04 pid=2595 runtime=io.containerd.runc.v2 Oct 2 19:20:07.725456 systemd[1]: Started cri-containerd-1983b8f2c533f8e13e5ebf6ba0ade4e2bb3f36238c1199866f62bc627b11be04.scope. Oct 2 19:20:07.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.736000 audit: BPF prog-id=114 op=LOAD Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2595 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139383362386632633533336638653133653565626636626130616465 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2595 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139383362386632633533336638653133653565626636626130616465 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit: BPF prog-id=115 op=LOAD Oct 2 19:20:07.737000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000114340 items=0 ppid=2595 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139383362386632633533336638653133653565626636626130616465 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit: BPF prog-id=116 op=LOAD Oct 2 19:20:07.737000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000114388 items=0 ppid=2595 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139383362386632633533336638653133653565626636626130616465 Oct 2 19:20:07.737000 audit: BPF prog-id=116 op=UNLOAD Oct 2 19:20:07.737000 audit: BPF prog-id=115 op=UNLOAD Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { perfmon } for pid=2606 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit[2606]: AVC avc: denied { bpf } for pid=2606 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.737000 audit: BPF prog-id=117 op=LOAD Oct 2 19:20:07.737000 audit[2606]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000114798 items=0 ppid=2595 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139383362386632633533336638653133653565626636626130616465 Oct 2 19:20:07.751127 env[1334]: time="2023-10-02T19:20:07.751084878Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-x56jj,Uid:9c32a93d-3b1e-4539-b145-f5febae0ba7d,Namespace:kube-system,Attempt:0,} returns sandbox id \"1983b8f2c533f8e13e5ebf6ba0ade4e2bb3f36238c1199866f62bc627b11be04\"" Oct 2 19:20:07.755794 env[1334]: time="2023-10-02T19:20:07.755766131Z" level=info msg="CreateContainer within sandbox \"1983b8f2c533f8e13e5ebf6ba0ade4e2bb3f36238c1199866f62bc627b11be04\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:20:07.793695 env[1334]: time="2023-10-02T19:20:07.793631945Z" level=info msg="CreateContainer within sandbox \"1983b8f2c533f8e13e5ebf6ba0ade4e2bb3f36238c1199866f62bc627b11be04\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"244afe6a4d4723e90888def9e79b1e7126742812827daa16889a56e831af4900\"" Oct 2 19:20:07.796359 env[1334]: time="2023-10-02T19:20:07.794281524Z" level=info msg="StartContainer for \"244afe6a4d4723e90888def9e79b1e7126742812827daa16889a56e831af4900\"" Oct 2 19:20:07.813687 systemd[1]: Started cri-containerd-244afe6a4d4723e90888def9e79b1e7126742812827daa16889a56e831af4900.scope. Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2595 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234346166653661346434373233653930383838646566396537396231 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit: BPF prog-id=118 op=LOAD Oct 2 19:20:07.831000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000273c70 items=0 ppid=2595 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234346166653661346434373233653930383838646566396537396231 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit: BPF prog-id=119 op=LOAD Oct 2 19:20:07.831000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000273cb8 items=0 ppid=2595 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234346166653661346434373233653930383838646566396537396231 Oct 2 19:20:07.831000 audit: BPF prog-id=119 op=UNLOAD Oct 2 19:20:07.831000 audit: BPF prog-id=118 op=UNLOAD Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:07.831000 audit: BPF prog-id=120 op=LOAD Oct 2 19:20:07.831000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000273d48 items=0 ppid=2595 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234346166653661346434373233653930383838646566396537396231 Oct 2 19:20:07.854626 env[1334]: time="2023-10-02T19:20:07.854573435Z" level=info msg="StartContainer for \"244afe6a4d4723e90888def9e79b1e7126742812827daa16889a56e831af4900\" returns successfully" Oct 2 19:20:07.908000 audit[2685]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2685 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:07.908000 audit[2685]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffece8d9110 a2=0 a3=7ffece8d90fc items=0 ppid=2647 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.908000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:20:07.911000 audit[2686]: NETFILTER_CFG table=nat:43 family=10 entries=1 op=nft_register_chain pid=2686 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:07.911000 audit[2686]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3eba9670 a2=0 a3=7ffe3eba965c items=0 ppid=2647 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.911000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:20:07.913000 audit[2687]: NETFILTER_CFG table=mangle:44 family=2 entries=1 op=nft_register_chain pid=2687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:07.913000 audit[2687]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff23665000 a2=0 a3=7fff23664fec items=0 ppid=2647 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:20:07.914000 audit[2688]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_chain pid=2688 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:07.914000 audit[2688]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd92e0df50 a2=0 a3=7ffd92e0df3c items=0 ppid=2647 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.914000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:20:07.917000 audit[2689]: NETFILTER_CFG table=nat:46 family=2 entries=1 op=nft_register_chain pid=2689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:07.917000 audit[2689]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc275c0fb0 a2=0 a3=7ffc275c0f9c items=0 ppid=2647 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.917000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:20:07.918000 audit[2690]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:07.918000 audit[2690]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc1128c50 a2=0 a3=7ffcc1128c3c items=0 ppid=2647 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:07.918000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:20:08.011000 audit[2691]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.011000 audit[2691]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe1a936550 a2=0 a3=7ffe1a93653c items=0 ppid=2647 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:20:08.014000 audit[2693]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.014000 audit[2693]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcaadd4fb0 a2=0 a3=7ffcaadd4f9c items=0 ppid=2647 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.014000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:20:08.017000 audit[2696]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.017000 audit[2696]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc1b57c330 a2=0 a3=7ffc1b57c31c items=0 ppid=2647 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.017000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:20:08.019000 audit[2697]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=2697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.019000 audit[2697]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd41abea50 a2=0 a3=7ffd41abea3c items=0 ppid=2647 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:20:08.022000 audit[2699]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.022000 audit[2699]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc8caaec70 a2=0 a3=7ffc8caaec5c items=0 ppid=2647 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:20:08.023000 audit[2700]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_chain pid=2700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.023000 audit[2700]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3404b500 a2=0 a3=7ffc3404b4ec items=0 ppid=2647 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:20:08.025000 audit[2702]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.025000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffccf575540 a2=0 a3=7ffccf57552c items=0 ppid=2647 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:20:08.029000 audit[2705]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.029000 audit[2705]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc6ffb5240 a2=0 a3=7ffc6ffb522c items=0 ppid=2647 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:20:08.030000 audit[2706]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_chain pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.030000 audit[2706]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff501944b0 a2=0 a3=7fff5019449c items=0 ppid=2647 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:20:08.032000 audit[2708]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.032000 audit[2708]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee76b97a0 a2=0 a3=7ffee76b978c items=0 ppid=2647 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:20:08.034000 audit[2709]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_chain pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.034000 audit[2709]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffceac58240 a2=0 a3=7ffceac5822c items=0 ppid=2647 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:20:08.036000 audit[2711]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.036000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe55ba5b60 a2=0 a3=7ffe55ba5b4c items=0 ppid=2647 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.036000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:20:08.040000 audit[2714]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.040000 audit[2714]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1ddcf7a0 a2=0 a3=7ffe1ddcf78c items=0 ppid=2647 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:20:08.044000 audit[2717]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.044000 audit[2717]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd7b256d0 a2=0 a3=7ffdd7b256bc items=0 ppid=2647 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:20:08.045000 audit[2718]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_chain pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.045000 audit[2718]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe423440e0 a2=0 a3=7ffe423440cc items=0 ppid=2647 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.045000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:20:08.047000 audit[2720]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.047000 audit[2720]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff605bb8b0 a2=0 a3=7fff605bb89c items=0 ppid=2647 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:20:08.051000 audit[2723]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.051000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd959fa30 a2=0 a3=7fffd959fa1c items=0 ppid=2647 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:20:08.056000 audit[2728]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_chain pid=2728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.056000 audit[2728]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5c88d510 a2=0 a3=7ffc5c88d4fc items=0 ppid=2647 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.056000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:20:08.059000 audit[2730]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:20:08.059000 audit[2730]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc7244fb60 a2=0 a3=7ffc7244fb4c items=0 ppid=2647 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.059000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:20:08.081138 systemd[1]: run-containerd-runc-k8s.io-77cf3b3281e60c69528f36893558ec8bbbe1457bdc799267e91659c052d26008-runc.UanTTp.mount: Deactivated successfully. Oct 2 19:20:08.118000 audit[2732]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:08.118000 audit[2732]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff10307af0 a2=0 a3=7fff10307adc items=0 ppid=2647 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:08.142000 audit[2732]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_chain pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:08.142000 audit[2732]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff10307af0 a2=0 a3=7fff10307adc items=0 ppid=2647 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.142000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:08.143000 audit[2737]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_chain pid=2737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.143000 audit[2737]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcac5c9ec0 a2=0 a3=7ffcac5c9eac items=0 ppid=2647 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.143000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:20:08.146000 audit[2739]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.146000 audit[2739]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd1e22a930 a2=0 a3=7ffd1e22a91c items=0 ppid=2647 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.146000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:20:08.150000 audit[2742]: NETFILTER_CFG table=filter:71 family=10 entries=2 op=nft_register_chain pid=2742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.150000 audit[2742]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcf6e560f0 a2=0 a3=7ffcf6e560dc items=0 ppid=2647 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.150000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:20:08.151000 audit[2743]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_chain pid=2743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.151000 audit[2743]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd74fc6470 a2=0 a3=7ffd74fc645c items=0 ppid=2647 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.151000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:20:08.154000 audit[2745]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.154000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd97475270 a2=0 a3=7ffd9747525c items=0 ppid=2647 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.154000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:20:08.155000 audit[2746]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.155000 audit[2746]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddcfbb1d0 a2=0 a3=7ffddcfbb1bc items=0 ppid=2647 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.155000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:20:08.158000 audit[2748]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.158000 audit[2748]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffbfe822f0 a2=0 a3=7fffbfe822dc items=0 ppid=2647 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.158000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:20:08.161000 audit[2751]: NETFILTER_CFG table=filter:76 family=10 entries=2 op=nft_register_chain pid=2751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.161000 audit[2751]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe16c98b10 a2=0 a3=7ffe16c98afc items=0 ppid=2647 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.161000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:20:08.162000 audit[2752]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_chain pid=2752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.162000 audit[2752]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea7c3fce0 a2=0 a3=7ffea7c3fccc items=0 ppid=2647 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:20:08.165000 audit[2754]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.165000 audit[2754]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffec4dc77b0 a2=0 a3=7ffec4dc779c items=0 ppid=2647 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:20:08.166000 audit[2755]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_chain pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.166000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeafd3a820 a2=0 a3=7ffeafd3a80c items=0 ppid=2647 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:20:08.169000 audit[2757]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.169000 audit[2757]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcbbbe11a0 a2=0 a3=7ffcbbbe118c items=0 ppid=2647 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:20:08.175000 audit[2760]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.175000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeac58f200 a2=0 a3=7ffeac58f1ec items=0 ppid=2647 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.175000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:20:08.178000 audit[2763]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.178000 audit[2763]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2de023e0 a2=0 a3=7ffc2de023cc items=0 ppid=2647 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.178000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:20:08.179000 audit[2764]: NETFILTER_CFG table=nat:83 family=10 entries=1 op=nft_register_chain pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.179000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc3f2594f0 a2=0 a3=7ffc3f2594dc items=0 ppid=2647 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:20:08.181000 audit[2766]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.181000 audit[2766]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd17547110 a2=0 a3=7ffd175470fc items=0 ppid=2647 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:20:08.185000 audit[2769]: NETFILTER_CFG table=nat:85 family=10 entries=2 op=nft_register_chain pid=2769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.185000 audit[2769]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdfdaa0320 a2=0 a3=7ffdfdaa030c items=0 ppid=2647 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.185000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:20:08.186000 audit[2770]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.186000 audit[2770]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6badbf60 a2=0 a3=7ffd6badbf4c items=0 ppid=2647 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:20:08.188000 audit[2772]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_rule pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.188000 audit[2772]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffa2484aa0 a2=0 a3=7fffa2484a8c items=0 ppid=2647 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.188000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:20:08.192000 audit[2775]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.192000 audit[2775]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffadd7bf90 a2=0 a3=7fffadd7bf7c items=0 ppid=2647 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:20:08.193000 audit[2776]: NETFILTER_CFG table=nat:89 family=10 entries=1 op=nft_register_chain pid=2776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.193000 audit[2776]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb2bdf5e0 a2=0 a3=7ffeb2bdf5cc items=0 ppid=2647 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.193000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:20:08.195000 audit[2778]: NETFILTER_CFG table=nat:90 family=10 entries=2 op=nft_register_chain pid=2778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:20:08.195000 audit[2778]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd7eea1e90 a2=0 a3=7ffd7eea1e7c items=0 ppid=2647 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.195000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:20:08.198000 audit[2780]: NETFILTER_CFG table=filter:91 family=10 entries=3 op=nft_register_rule pid=2780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:20:08.198000 audit[2780]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffedad86580 a2=0 a3=7ffedad8656c items=0 ppid=2647 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.198000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:08.199000 audit[2780]: NETFILTER_CFG table=nat:92 family=10 entries=7 op=nft_register_chain pid=2780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:20:08.199000 audit[2780]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffedad86580 a2=0 a3=7ffedad8656c items=0 ppid=2647 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:08.199000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:10.331265 env[1334]: time="2023-10-02T19:20:10.331215677Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:10.339137 env[1334]: time="2023-10-02T19:20:10.339096046Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:10.343510 env[1334]: time="2023-10-02T19:20:10.343468917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:10.348580 env[1334]: time="2023-10-02T19:20:10.348539668Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:10.349231 env[1334]: time="2023-10-02T19:20:10.349194649Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:20:10.352776 env[1334]: time="2023-10-02T19:20:10.352504252Z" level=info msg="CreateContainer within sandbox \"77cf3b3281e60c69528f36893558ec8bbbe1457bdc799267e91659c052d26008\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:20:10.384232 env[1334]: time="2023-10-02T19:20:10.384181021Z" level=info msg="CreateContainer within sandbox \"77cf3b3281e60c69528f36893558ec8bbbe1457bdc799267e91659c052d26008\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"c483f6554720a7b61539f8f9672d7e2b304c944c7107d502f6b236f2e321059b\"" Oct 2 19:20:10.387032 env[1334]: time="2023-10-02T19:20:10.384900900Z" level=info msg="StartContainer for \"c483f6554720a7b61539f8f9672d7e2b304c944c7107d502f6b236f2e321059b\"" Oct 2 19:20:10.414948 systemd[1]: run-containerd-runc-k8s.io-c483f6554720a7b61539f8f9672d7e2b304c944c7107d502f6b236f2e321059b-runc.oDxz9L.mount: Deactivated successfully. Oct 2 19:20:10.417804 systemd[1]: Started cri-containerd-c483f6554720a7b61539f8f9672d7e2b304c944c7107d502f6b236f2e321059b.scope. Oct 2 19:20:10.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.429000 audit: BPF prog-id=121 op=LOAD Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2553 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:10.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334383366363535343732306137623631353339663866393637326437 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2553 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:10.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334383366363535343732306137623631353339663866393637326437 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit: BPF prog-id=122 op=LOAD Oct 2 19:20:10.430000 audit[2787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003aa8e0 items=0 ppid=2553 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:10.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334383366363535343732306137623631353339663866393637326437 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit: BPF prog-id=123 op=LOAD Oct 2 19:20:10.430000 audit[2787]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003aa928 items=0 ppid=2553 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:10.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334383366363535343732306137623631353339663866393637326437 Oct 2 19:20:10.430000 audit: BPF prog-id=123 op=UNLOAD Oct 2 19:20:10.430000 audit: BPF prog-id=122 op=UNLOAD Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { perfmon } for pid=2787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit[2787]: AVC avc: denied { bpf } for pid=2787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:10.430000 audit: BPF prog-id=124 op=LOAD Oct 2 19:20:10.430000 audit[2787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003aad38 items=0 ppid=2553 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:10.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334383366363535343732306137623631353339663866393637326437 Oct 2 19:20:10.451738 env[1334]: time="2023-10-02T19:20:10.451683438Z" level=info msg="StartContainer for \"c483f6554720a7b61539f8f9672d7e2b304c944c7107d502f6b236f2e321059b\" returns successfully" Oct 2 19:20:10.557085 kubelet[2460]: I1002 19:20:10.557050 2460 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-x56jj" podStartSLOduration=4.556995244 podCreationTimestamp="2023-10-02 19:20:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:20:08.553900596 +0000 UTC m=+14.218223343" watchObservedRunningTime="2023-10-02 19:20:10.556995244 +0000 UTC m=+16.221317991" Oct 2 19:20:12.375000 audit[2818]: NETFILTER_CFG table=filter:93 family=2 entries=15 op=nft_register_rule pid=2818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:12.380377 kernel: kauditd_printk_skb: 357 callbacks suppressed Oct 2 19:20:12.380486 kernel: audit: type=1325 audit(1696274412.375:1064): table=filter:93 family=2 entries=15 op=nft_register_rule pid=2818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:12.375000 audit[2818]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc9489c1d0 a2=0 a3=7ffc9489c1bc items=0 ppid=2647 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:12.409860 kernel: audit: type=1300 audit(1696274412.375:1064): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc9489c1d0 a2=0 a3=7ffc9489c1bc items=0 ppid=2647 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:12.410045 kernel: audit: type=1327 audit(1696274412.375:1064): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:12.375000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:12.375000 audit[2818]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:12.430668 kernel: audit: type=1325 audit(1696274412.375:1065): table=nat:94 family=2 entries=12 op=nft_register_rule pid=2818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:12.375000 audit[2818]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc9489c1d0 a2=0 a3=31030 items=0 ppid=2647 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:12.375000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:12.459698 kernel: audit: type=1300 audit(1696274412.375:1065): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc9489c1d0 a2=0 a3=31030 items=0 ppid=2647 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:12.459837 kernel: audit: type=1327 audit(1696274412.375:1065): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:12.459859 kernel: audit: type=1325 audit(1696274412.419:1066): table=filter:95 family=2 entries=16 op=nft_register_rule pid=2820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:12.419000 audit[2820]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=2820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:12.419000 audit[2820]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd9207b1f0 a2=0 a3=7ffd9207b1dc items=0 ppid=2647 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:12.488762 kernel: audit: type=1300 audit(1696274412.419:1066): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd9207b1f0 a2=0 a3=7ffd9207b1dc items=0 ppid=2647 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:12.488895 kernel: audit: type=1327 audit(1696274412.419:1066): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:12.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:12.449000 audit[2820]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:12.516668 kernel: audit: type=1325 audit(1696274412.449:1067): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:12.449000 audit[2820]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd9207b1f0 a2=0 a3=31030 items=0 ppid=2647 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:12.449000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:12.639994 kubelet[2460]: I1002 19:20:12.639892 2460 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-59c686f986-2nk7v" podStartSLOduration=3.606871577 podCreationTimestamp="2023-10-02 19:20:06 +0000 UTC" firstStartedPulling="2023-10-02 19:20:07.31659879 +0000 UTC m=+12.980921437" lastFinishedPulling="2023-10-02 19:20:10.349568438 +0000 UTC m=+16.013891185" observedRunningTime="2023-10-02 19:20:10.557673424 +0000 UTC m=+16.221996171" watchObservedRunningTime="2023-10-02 19:20:12.639841325 +0000 UTC m=+18.304163972" Oct 2 19:20:12.640732 kubelet[2460]: I1002 19:20:12.640706 2460 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:20:12.646753 systemd[1]: Created slice kubepods-besteffort-pod2cf60b3d_2fe2_4da4_afc7_e1436ab03ec6.slice. Oct 2 19:20:12.704979 kubelet[2460]: I1002 19:20:12.704933 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2cf60b3d-2fe2-4da4-afc7-e1436ab03ec6-tigera-ca-bundle\") pod \"calico-typha-7ccf65bc8c-97qv4\" (UID: \"2cf60b3d-2fe2-4da4-afc7-e1436ab03ec6\") " pod="calico-system/calico-typha-7ccf65bc8c-97qv4" Oct 2 19:20:12.705254 kubelet[2460]: I1002 19:20:12.705242 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wkskv\" (UniqueName: \"kubernetes.io/projected/2cf60b3d-2fe2-4da4-afc7-e1436ab03ec6-kube-api-access-wkskv\") pod \"calico-typha-7ccf65bc8c-97qv4\" (UID: \"2cf60b3d-2fe2-4da4-afc7-e1436ab03ec6\") " pod="calico-system/calico-typha-7ccf65bc8c-97qv4" Oct 2 19:20:12.705405 kubelet[2460]: I1002 19:20:12.705395 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/2cf60b3d-2fe2-4da4-afc7-e1436ab03ec6-typha-certs\") pod \"calico-typha-7ccf65bc8c-97qv4\" (UID: \"2cf60b3d-2fe2-4da4-afc7-e1436ab03ec6\") " pod="calico-system/calico-typha-7ccf65bc8c-97qv4" Oct 2 19:20:12.751754 kubelet[2460]: I1002 19:20:12.751721 2460 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:20:12.757755 systemd[1]: Created slice kubepods-besteffort-pode6d1076c_ca5d_48ad_a85b_3ec88c716744.slice. Oct 2 19:20:12.806479 kubelet[2460]: I1002 19:20:12.806443 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/e6d1076c-ca5d-48ad-a85b-3ec88c716744-var-run-calico\") pod \"calico-node-n5cq9\" (UID: \"e6d1076c-ca5d-48ad-a85b-3ec88c716744\") " pod="calico-system/calico-node-n5cq9" Oct 2 19:20:12.808921 kubelet[2460]: I1002 19:20:12.808889 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e6d1076c-ca5d-48ad-a85b-3ec88c716744-var-lib-calico\") pod \"calico-node-n5cq9\" (UID: \"e6d1076c-ca5d-48ad-a85b-3ec88c716744\") " pod="calico-system/calico-node-n5cq9" Oct 2 19:20:12.809379 kubelet[2460]: I1002 19:20:12.809361 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e6d1076c-ca5d-48ad-a85b-3ec88c716744-xtables-lock\") pod \"calico-node-n5cq9\" (UID: \"e6d1076c-ca5d-48ad-a85b-3ec88c716744\") " pod="calico-system/calico-node-n5cq9" Oct 2 19:20:12.809519 kubelet[2460]: I1002 19:20:12.809508 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/e6d1076c-ca5d-48ad-a85b-3ec88c716744-policysync\") pod \"calico-node-n5cq9\" (UID: \"e6d1076c-ca5d-48ad-a85b-3ec88c716744\") " pod="calico-system/calico-node-n5cq9" Oct 2 19:20:12.809625 kubelet[2460]: I1002 19:20:12.809615 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/e6d1076c-ca5d-48ad-a85b-3ec88c716744-node-certs\") pod \"calico-node-n5cq9\" (UID: \"e6d1076c-ca5d-48ad-a85b-3ec88c716744\") " pod="calico-system/calico-node-n5cq9" Oct 2 19:20:12.809744 kubelet[2460]: I1002 19:20:12.809733 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/e6d1076c-ca5d-48ad-a85b-3ec88c716744-cni-bin-dir\") pod \"calico-node-n5cq9\" (UID: \"e6d1076c-ca5d-48ad-a85b-3ec88c716744\") " pod="calico-system/calico-node-n5cq9" Oct 2 19:20:12.809837 kubelet[2460]: I1002 19:20:12.809828 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/e6d1076c-ca5d-48ad-a85b-3ec88c716744-flexvol-driver-host\") pod \"calico-node-n5cq9\" (UID: \"e6d1076c-ca5d-48ad-a85b-3ec88c716744\") " pod="calico-system/calico-node-n5cq9" Oct 2 19:20:12.809927 kubelet[2460]: I1002 19:20:12.809918 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wf8bf\" (UniqueName: \"kubernetes.io/projected/e6d1076c-ca5d-48ad-a85b-3ec88c716744-kube-api-access-wf8bf\") pod \"calico-node-n5cq9\" (UID: \"e6d1076c-ca5d-48ad-a85b-3ec88c716744\") " pod="calico-system/calico-node-n5cq9" Oct 2 19:20:12.810012 kubelet[2460]: I1002 19:20:12.810003 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e6d1076c-ca5d-48ad-a85b-3ec88c716744-tigera-ca-bundle\") pod \"calico-node-n5cq9\" (UID: \"e6d1076c-ca5d-48ad-a85b-3ec88c716744\") " pod="calico-system/calico-node-n5cq9" Oct 2 19:20:12.810103 kubelet[2460]: I1002 19:20:12.810095 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/e6d1076c-ca5d-48ad-a85b-3ec88c716744-cni-log-dir\") pod \"calico-node-n5cq9\" (UID: \"e6d1076c-ca5d-48ad-a85b-3ec88c716744\") " pod="calico-system/calico-node-n5cq9" Oct 2 19:20:12.810577 kubelet[2460]: I1002 19:20:12.810561 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/e6d1076c-ca5d-48ad-a85b-3ec88c716744-cni-net-dir\") pod \"calico-node-n5cq9\" (UID: \"e6d1076c-ca5d-48ad-a85b-3ec88c716744\") " pod="calico-system/calico-node-n5cq9" Oct 2 19:20:12.810737 kubelet[2460]: I1002 19:20:12.810723 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e6d1076c-ca5d-48ad-a85b-3ec88c716744-lib-modules\") pod \"calico-node-n5cq9\" (UID: \"e6d1076c-ca5d-48ad-a85b-3ec88c716744\") " pod="calico-system/calico-node-n5cq9" Oct 2 19:20:12.925049 kubelet[2460]: E1002 19:20:12.924955 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:12.925049 kubelet[2460]: W1002 19:20:12.924980 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:12.925049 kubelet[2460]: E1002 19:20:12.925010 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:12.927000 kubelet[2460]: E1002 19:20:12.926981 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:12.927137 kubelet[2460]: W1002 19:20:12.927121 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:12.927260 kubelet[2460]: E1002 19:20:12.927249 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:12.927601 kubelet[2460]: E1002 19:20:12.927585 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:12.927741 kubelet[2460]: W1002 19:20:12.927725 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:12.927849 kubelet[2460]: E1002 19:20:12.927839 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:12.950676 env[1334]: time="2023-10-02T19:20:12.950321076Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7ccf65bc8c-97qv4,Uid:2cf60b3d-2fe2-4da4-afc7-e1436ab03ec6,Namespace:calico-system,Attempt:0,}" Oct 2 19:20:12.997631 env[1334]: time="2023-10-02T19:20:12.997567845Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:20:12.997909 env[1334]: time="2023-10-02T19:20:12.997869636Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:20:12.998092 env[1334]: time="2023-10-02T19:20:12.998060231Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:20:12.998367 env[1334]: time="2023-10-02T19:20:12.998336523Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cfdcf3a99814e3f7982e75203180206ceefe8cd9beb019e662ba1935a3220a05 pid=2836 runtime=io.containerd.runc.v2 Oct 2 19:20:13.015037 systemd[1]: Started cri-containerd-cfdcf3a99814e3f7982e75203180206ceefe8cd9beb019e662ba1935a3220a05.scope. Oct 2 19:20:13.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.034000 audit: BPF prog-id=125 op=LOAD Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2836 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:13.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646366336139393831346533663739383265373532303331383032 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2836 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:13.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646366336139393831346533663739383265373532303331383032 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit: BPF prog-id=126 op=LOAD Oct 2 19:20:13.035000 audit[2846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024420 items=0 ppid=2836 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:13.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646366336139393831346533663739383265373532303331383032 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit: BPF prog-id=127 op=LOAD Oct 2 19:20:13.035000 audit[2846]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024468 items=0 ppid=2836 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:13.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646366336139393831346533663739383265373532303331383032 Oct 2 19:20:13.035000 audit: BPF prog-id=127 op=UNLOAD Oct 2 19:20:13.035000 audit: BPF prog-id=126 op=UNLOAD Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { perfmon } for pid=2846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit[2846]: AVC avc: denied { bpf } for pid=2846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.035000 audit: BPF prog-id=128 op=LOAD Oct 2 19:20:13.035000 audit[2846]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024878 items=0 ppid=2836 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:13.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646366336139393831346533663739383265373532303331383032 Oct 2 19:20:13.062422 env[1334]: time="2023-10-02T19:20:13.062374054Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n5cq9,Uid:e6d1076c-ca5d-48ad-a85b-3ec88c716744,Namespace:calico-system,Attempt:0,}" Oct 2 19:20:13.079993 env[1334]: time="2023-10-02T19:20:13.079935069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7ccf65bc8c-97qv4,Uid:2cf60b3d-2fe2-4da4-afc7-e1436ab03ec6,Namespace:calico-system,Attempt:0,} returns sandbox id \"cfdcf3a99814e3f7982e75203180206ceefe8cd9beb019e662ba1935a3220a05\"" Oct 2 19:20:13.083306 env[1334]: time="2023-10-02T19:20:13.083259877Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 19:20:13.112241 env[1334]: time="2023-10-02T19:20:13.112175379Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:20:13.112452 env[1334]: time="2023-10-02T19:20:13.112425672Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:20:13.112584 env[1334]: time="2023-10-02T19:20:13.112561868Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:20:13.112886 env[1334]: time="2023-10-02T19:20:13.112847661Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/374326b4d38a385db288d6c7329ea1a535fb0f3a6939ae09402540806effb50a pid=2875 runtime=io.containerd.runc.v2 Oct 2 19:20:13.127727 systemd[1]: Started cri-containerd-374326b4d38a385db288d6c7329ea1a535fb0f3a6939ae09402540806effb50a.scope. Oct 2 19:20:13.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit: BPF prog-id=129 op=LOAD Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2875 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:13.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343332366234643338613338356462323838643663373332396561 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2875 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:13.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343332366234643338613338356462323838643663373332396561 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit: BPF prog-id=130 op=LOAD Oct 2 19:20:13.148000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015d3b0 items=0 ppid=2875 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:13.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343332366234643338613338356462323838643663373332396561 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit: BPF prog-id=131 op=LOAD Oct 2 19:20:13.148000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00015d3f8 items=0 ppid=2875 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:13.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343332366234643338613338356462323838643663373332396561 Oct 2 19:20:13.148000 audit: BPF prog-id=131 op=UNLOAD Oct 2 19:20:13.148000 audit: BPF prog-id=130 op=UNLOAD Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:13.148000 audit: BPF prog-id=132 op=LOAD Oct 2 19:20:13.148000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00015d808 items=0 ppid=2875 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:13.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343332366234643338613338356462323838643663373332396561 Oct 2 19:20:13.173380 env[1334]: time="2023-10-02T19:20:13.173326591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n5cq9,Uid:e6d1076c-ca5d-48ad-a85b-3ec88c716744,Namespace:calico-system,Attempt:0,} returns sandbox id \"374326b4d38a385db288d6c7329ea1a535fb0f3a6939ae09402540806effb50a\"" Oct 2 19:20:13.522000 audit[2910]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=2910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:13.522000 audit[2910]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe5e17ccf0 a2=0 a3=7ffe5e17ccdc items=0 ppid=2647 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:13.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:13.523000 audit[2910]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:13.523000 audit[2910]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe5e17ccf0 a2=0 a3=31030 items=0 ppid=2647 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:13.523000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:15.098993 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3932099374.mount: Deactivated successfully. Oct 2 19:20:17.588618 env[1334]: time="2023-10-02T19:20:17.588571601Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:17.595214 env[1334]: time="2023-10-02T19:20:17.595178832Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:17.598619 env[1334]: time="2023-10-02T19:20:17.598582446Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:17.603581 env[1334]: time="2023-10-02T19:20:17.603529320Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:17.604761 env[1334]: time="2023-10-02T19:20:17.604731689Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\"" Oct 2 19:20:17.607469 env[1334]: time="2023-10-02T19:20:17.606463945Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:20:17.607908 env[1334]: time="2023-10-02T19:20:17.607879009Z" level=info msg="CreateContainer within sandbox \"cfdcf3a99814e3f7982e75203180206ceefe8cd9beb019e662ba1935a3220a05\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 19:20:17.644721 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2432968944.mount: Deactivated successfully. Oct 2 19:20:17.652586 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount467561814.mount: Deactivated successfully. Oct 2 19:20:17.663614 env[1334]: time="2023-10-02T19:20:17.663566889Z" level=info msg="CreateContainer within sandbox \"cfdcf3a99814e3f7982e75203180206ceefe8cd9beb019e662ba1935a3220a05\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"3305352a059288468eabdc35ee433bc6aeb88347983026c77433fdd34df8ed7f\"" Oct 2 19:20:17.666013 env[1334]: time="2023-10-02T19:20:17.664361069Z" level=info msg="StartContainer for \"3305352a059288468eabdc35ee433bc6aeb88347983026c77433fdd34df8ed7f\"" Oct 2 19:20:17.693824 systemd[1]: Started cri-containerd-3305352a059288468eabdc35ee433bc6aeb88347983026c77433fdd34df8ed7f.scope. Oct 2 19:20:17.714725 kernel: kauditd_printk_skb: 122 callbacks suppressed Oct 2 19:20:17.714829 kernel: audit: type=1400 audit(1696274417.708:1106): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.740407 kernel: audit: type=1400 audit(1696274417.708:1107): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.754844 kernel: audit: type=1400 audit(1696274417.708:1108): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.754914 kernel: audit: type=1400 audit(1696274417.708:1109): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.778834 kernel: audit: type=1400 audit(1696274417.708:1110): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.778949 kernel: audit: type=1400 audit(1696274417.708:1111): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.802984 kernel: audit: type=1400 audit(1696274417.708:1112): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.817677 kernel: audit: type=1400 audit(1696274417.708:1113): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.848362 kernel: audit: type=1400 audit(1696274417.708:1114): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.848483 kernel: audit: type=1400 audit(1696274417.713:1115): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.713000 audit: BPF prog-id=133 op=LOAD Oct 2 19:20:17.718000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.718000 audit[2920]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2836 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:17.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303533353261303539323838343638656162646333356565343333 Oct 2 19:20:17.718000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.718000 audit[2920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2836 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:17.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303533353261303539323838343638656162646333356565343333 Oct 2 19:20:17.718000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.718000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.718000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.718000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.718000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.718000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.718000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.718000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.718000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.718000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.718000 audit: BPF prog-id=134 op=LOAD Oct 2 19:20:17.718000 audit[2920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020ade0 items=0 ppid=2836 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:17.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303533353261303539323838343638656162646333356565343333 Oct 2 19:20:17.726000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.726000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.726000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.726000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.726000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.726000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.726000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.726000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.726000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.726000 audit: BPF prog-id=135 op=LOAD Oct 2 19:20:17.726000 audit[2920]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020ae28 items=0 ppid=2836 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:17.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303533353261303539323838343638656162646333356565343333 Oct 2 19:20:17.740000 audit: BPF prog-id=135 op=UNLOAD Oct 2 19:20:17.740000 audit: BPF prog-id=134 op=UNLOAD Oct 2 19:20:17.740000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.740000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.740000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.740000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.740000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.740000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.740000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.740000 audit[2920]: AVC avc: denied { perfmon } for pid=2920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.740000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.740000 audit[2920]: AVC avc: denied { bpf } for pid=2920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:17.740000 audit: BPF prog-id=136 op=LOAD Oct 2 19:20:17.740000 audit[2920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020b238 items=0 ppid=2836 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:17.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303533353261303539323838343638656162646333356565343333 Oct 2 19:20:17.854476 env[1334]: time="2023-10-02T19:20:17.854323727Z" level=info msg="StartContainer for \"3305352a059288468eabdc35ee433bc6aeb88347983026c77433fdd34df8ed7f\" returns successfully" Oct 2 19:20:18.576352 kubelet[2460]: I1002 19:20:18.576312 2460 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7ccf65bc8c-97qv4" podStartSLOduration=2.052638652 podCreationTimestamp="2023-10-02 19:20:12 +0000 UTC" firstStartedPulling="2023-10-02 19:20:13.081517825 +0000 UTC m=+18.745840472" lastFinishedPulling="2023-10-02 19:20:17.605149178 +0000 UTC m=+23.269471825" observedRunningTime="2023-10-02 19:20:18.575863415 +0000 UTC m=+24.240186062" watchObservedRunningTime="2023-10-02 19:20:18.576270005 +0000 UTC m=+24.240592652" Oct 2 19:20:18.610000 audit[2953]: NETFILTER_CFG table=filter:99 family=2 entries=15 op=nft_register_rule pid=2953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:18.610000 audit[2953]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd5c63bd60 a2=0 a3=7ffd5c63bd4c items=0 ppid=2647 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:18.610000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:18.611000 audit[2953]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:18.611000 audit[2953]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffd5c63bd60 a2=0 a3=7ffd5c63bd4c items=0 ppid=2647 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:18.611000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:18.647201 kubelet[2460]: E1002 19:20:18.647170 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.647201 kubelet[2460]: W1002 19:20:18.647191 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.647444 kubelet[2460]: E1002 19:20:18.647238 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.647566 kubelet[2460]: E1002 19:20:18.647544 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.647702 kubelet[2460]: W1002 19:20:18.647567 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.647702 kubelet[2460]: E1002 19:20:18.647587 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.647806 kubelet[2460]: E1002 19:20:18.647780 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.647806 kubelet[2460]: W1002 19:20:18.647792 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.647892 kubelet[2460]: E1002 19:20:18.647808 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.648069 kubelet[2460]: E1002 19:20:18.648051 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.648069 kubelet[2460]: W1002 19:20:18.648064 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.648212 kubelet[2460]: E1002 19:20:18.648080 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.648273 kubelet[2460]: E1002 19:20:18.648260 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.648325 kubelet[2460]: W1002 19:20:18.648274 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.648325 kubelet[2460]: E1002 19:20:18.648289 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.648550 kubelet[2460]: E1002 19:20:18.648536 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.648550 kubelet[2460]: W1002 19:20:18.648547 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.648694 kubelet[2460]: E1002 19:20:18.648563 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.648832 kubelet[2460]: E1002 19:20:18.648816 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.648832 kubelet[2460]: W1002 19:20:18.648827 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.648968 kubelet[2460]: E1002 19:20:18.648852 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.649083 kubelet[2460]: E1002 19:20:18.649053 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.649083 kubelet[2460]: W1002 19:20:18.649066 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.649193 kubelet[2460]: E1002 19:20:18.649082 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.649293 kubelet[2460]: E1002 19:20:18.649279 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.649293 kubelet[2460]: W1002 19:20:18.649291 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.649395 kubelet[2460]: E1002 19:20:18.649306 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.649520 kubelet[2460]: E1002 19:20:18.649507 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.649520 kubelet[2460]: W1002 19:20:18.649518 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.649627 kubelet[2460]: E1002 19:20:18.649533 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.649795 kubelet[2460]: E1002 19:20:18.649781 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.649795 kubelet[2460]: W1002 19:20:18.649794 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.649939 kubelet[2460]: E1002 19:20:18.649809 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.650003 kubelet[2460]: E1002 19:20:18.649989 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.650047 kubelet[2460]: W1002 19:20:18.650004 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.650047 kubelet[2460]: E1002 19:20:18.650019 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.660318 kubelet[2460]: E1002 19:20:18.660298 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.660318 kubelet[2460]: W1002 19:20:18.660312 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.660487 kubelet[2460]: E1002 19:20:18.660330 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.660648 kubelet[2460]: E1002 19:20:18.660618 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.660648 kubelet[2460]: W1002 19:20:18.660632 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.660786 kubelet[2460]: E1002 19:20:18.660669 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.660948 kubelet[2460]: E1002 19:20:18.660931 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.660948 kubelet[2460]: W1002 19:20:18.660948 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.661077 kubelet[2460]: E1002 19:20:18.660967 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.661243 kubelet[2460]: E1002 19:20:18.661226 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.661243 kubelet[2460]: W1002 19:20:18.661239 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.661369 kubelet[2460]: E1002 19:20:18.661262 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.661499 kubelet[2460]: E1002 19:20:18.661483 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.661568 kubelet[2460]: W1002 19:20:18.661495 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.661568 kubelet[2460]: E1002 19:20:18.661523 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.661739 kubelet[2460]: E1002 19:20:18.661716 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.661802 kubelet[2460]: W1002 19:20:18.661740 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.661891 kubelet[2460]: E1002 19:20:18.661874 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.662038 kubelet[2460]: E1002 19:20:18.662024 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.662038 kubelet[2460]: W1002 19:20:18.662035 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.662157 kubelet[2460]: E1002 19:20:18.662121 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.662284 kubelet[2460]: E1002 19:20:18.662269 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.662284 kubelet[2460]: W1002 19:20:18.662280 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.662393 kubelet[2460]: E1002 19:20:18.662364 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.662515 kubelet[2460]: E1002 19:20:18.662501 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.662576 kubelet[2460]: W1002 19:20:18.662524 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.662576 kubelet[2460]: E1002 19:20:18.662546 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.663122 kubelet[2460]: E1002 19:20:18.663105 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.663122 kubelet[2460]: W1002 19:20:18.663119 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.663245 kubelet[2460]: E1002 19:20:18.663142 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.663362 kubelet[2460]: E1002 19:20:18.663340 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.663362 kubelet[2460]: W1002 19:20:18.663362 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.663475 kubelet[2460]: E1002 19:20:18.663381 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.663595 kubelet[2460]: E1002 19:20:18.663580 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.663595 kubelet[2460]: W1002 19:20:18.663591 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.663761 kubelet[2460]: E1002 19:20:18.663704 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.663854 kubelet[2460]: E1002 19:20:18.663840 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.663854 kubelet[2460]: W1002 19:20:18.663851 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.663970 kubelet[2460]: E1002 19:20:18.663870 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.664078 kubelet[2460]: E1002 19:20:18.664063 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.664078 kubelet[2460]: W1002 19:20:18.664074 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.664184 kubelet[2460]: E1002 19:20:18.664095 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.664315 kubelet[2460]: E1002 19:20:18.664300 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.664315 kubelet[2460]: W1002 19:20:18.664312 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.664420 kubelet[2460]: E1002 19:20:18.664331 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.664687 kubelet[2460]: E1002 19:20:18.664670 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.664687 kubelet[2460]: W1002 19:20:18.664683 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.664808 kubelet[2460]: E1002 19:20:18.664702 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.664927 kubelet[2460]: E1002 19:20:18.664912 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.664927 kubelet[2460]: W1002 19:20:18.664923 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.665037 kubelet[2460]: E1002 19:20:18.664939 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:18.665318 kubelet[2460]: E1002 19:20:18.665303 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:18.665318 kubelet[2460]: W1002 19:20:18.665314 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:18.665411 kubelet[2460]: E1002 19:20:18.665329 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.657837 kubelet[2460]: E1002 19:20:19.657807 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.657837 kubelet[2460]: W1002 19:20:19.657826 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.658424 kubelet[2460]: E1002 19:20:19.657849 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.658424 kubelet[2460]: E1002 19:20:19.658075 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.658424 kubelet[2460]: W1002 19:20:19.658086 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.658424 kubelet[2460]: E1002 19:20:19.658104 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.658424 kubelet[2460]: E1002 19:20:19.658275 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.658424 kubelet[2460]: W1002 19:20:19.658284 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.658424 kubelet[2460]: E1002 19:20:19.658298 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.658799 kubelet[2460]: E1002 19:20:19.658632 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.658799 kubelet[2460]: W1002 19:20:19.658670 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.658799 kubelet[2460]: E1002 19:20:19.658687 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.658930 kubelet[2460]: E1002 19:20:19.658861 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.658930 kubelet[2460]: W1002 19:20:19.658870 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.658930 kubelet[2460]: E1002 19:20:19.658885 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.659069 kubelet[2460]: E1002 19:20:19.659046 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.659069 kubelet[2460]: W1002 19:20:19.659055 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.659069 kubelet[2460]: E1002 19:20:19.659069 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.659308 kubelet[2460]: E1002 19:20:19.659291 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.659308 kubelet[2460]: W1002 19:20:19.659303 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.659454 kubelet[2460]: E1002 19:20:19.659319 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.659502 kubelet[2460]: E1002 19:20:19.659497 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.659546 kubelet[2460]: W1002 19:20:19.659506 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.659546 kubelet[2460]: E1002 19:20:19.659521 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.659744 kubelet[2460]: E1002 19:20:19.659728 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.659744 kubelet[2460]: W1002 19:20:19.659740 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.659894 kubelet[2460]: E1002 19:20:19.659758 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.659964 kubelet[2460]: E1002 19:20:19.659945 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.659964 kubelet[2460]: W1002 19:20:19.659961 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.660066 kubelet[2460]: E1002 19:20:19.659977 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.660198 kubelet[2460]: E1002 19:20:19.660182 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.660198 kubelet[2460]: W1002 19:20:19.660194 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.660330 kubelet[2460]: E1002 19:20:19.660209 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.660409 kubelet[2460]: E1002 19:20:19.660395 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.660409 kubelet[2460]: W1002 19:20:19.660406 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.660505 kubelet[2460]: E1002 19:20:19.660423 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.668687 kubelet[2460]: E1002 19:20:19.668667 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.668687 kubelet[2460]: W1002 19:20:19.668680 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.668840 kubelet[2460]: E1002 19:20:19.668697 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.668979 kubelet[2460]: E1002 19:20:19.668964 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.668979 kubelet[2460]: W1002 19:20:19.668976 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.669101 kubelet[2460]: E1002 19:20:19.668997 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.669197 kubelet[2460]: E1002 19:20:19.669189 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.669251 kubelet[2460]: W1002 19:20:19.669199 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.669251 kubelet[2460]: E1002 19:20:19.669214 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.669445 kubelet[2460]: E1002 19:20:19.669429 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.669445 kubelet[2460]: W1002 19:20:19.669441 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.669582 kubelet[2460]: E1002 19:20:19.669461 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.669700 kubelet[2460]: E1002 19:20:19.669686 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.669700 kubelet[2460]: W1002 19:20:19.669698 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.669803 kubelet[2460]: E1002 19:20:19.669717 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.669932 kubelet[2460]: E1002 19:20:19.669917 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.669932 kubelet[2460]: W1002 19:20:19.669929 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.670033 kubelet[2460]: E1002 19:20:19.669949 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.670165 kubelet[2460]: E1002 19:20:19.670144 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.670228 kubelet[2460]: W1002 19:20:19.670156 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.670228 kubelet[2460]: E1002 19:20:19.670188 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.670525 kubelet[2460]: E1002 19:20:19.670509 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.670525 kubelet[2460]: W1002 19:20:19.670521 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.670660 kubelet[2460]: E1002 19:20:19.670612 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.670804 kubelet[2460]: E1002 19:20:19.670788 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.670804 kubelet[2460]: W1002 19:20:19.670801 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.670918 kubelet[2460]: E1002 19:20:19.670887 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.671031 kubelet[2460]: E1002 19:20:19.671018 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.671031 kubelet[2460]: W1002 19:20:19.671029 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.671131 kubelet[2460]: E1002 19:20:19.671047 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.671263 kubelet[2460]: E1002 19:20:19.671248 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.671263 kubelet[2460]: W1002 19:20:19.671259 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.671385 kubelet[2460]: E1002 19:20:19.671279 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.671495 kubelet[2460]: E1002 19:20:19.671480 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.671495 kubelet[2460]: W1002 19:20:19.671491 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.671596 kubelet[2460]: E1002 19:20:19.671514 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.671755 kubelet[2460]: E1002 19:20:19.671741 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.671808 kubelet[2460]: W1002 19:20:19.671756 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.671808 kubelet[2460]: E1002 19:20:19.671772 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.672112 kubelet[2460]: E1002 19:20:19.672095 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.672112 kubelet[2460]: W1002 19:20:19.672107 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.672239 kubelet[2460]: E1002 19:20:19.672127 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.672354 kubelet[2460]: E1002 19:20:19.672339 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.672354 kubelet[2460]: W1002 19:20:19.672351 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.672464 kubelet[2460]: E1002 19:20:19.672379 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.672609 kubelet[2460]: E1002 19:20:19.672594 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.672609 kubelet[2460]: W1002 19:20:19.672605 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.672743 kubelet[2460]: E1002 19:20:19.672625 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.673136 kubelet[2460]: E1002 19:20:19.673120 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.673136 kubelet[2460]: W1002 19:20:19.673131 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.673257 kubelet[2460]: E1002 19:20:19.673225 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:19.673390 kubelet[2460]: E1002 19:20:19.673375 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:19.673390 kubelet[2460]: W1002 19:20:19.673389 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:19.673473 kubelet[2460]: E1002 19:20:19.673404 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.665349 kubelet[2460]: E1002 19:20:20.665317 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.665349 kubelet[2460]: W1002 19:20:20.665338 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.665918 kubelet[2460]: E1002 19:20:20.665364 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.665918 kubelet[2460]: E1002 19:20:20.665570 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.665918 kubelet[2460]: W1002 19:20:20.665581 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.665918 kubelet[2460]: E1002 19:20:20.665597 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.665918 kubelet[2460]: E1002 19:20:20.665797 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.665918 kubelet[2460]: W1002 19:20:20.665808 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.665918 kubelet[2460]: E1002 19:20:20.665823 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.666239 kubelet[2460]: E1002 19:20:20.666028 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.666239 kubelet[2460]: W1002 19:20:20.666038 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.666239 kubelet[2460]: E1002 19:20:20.666053 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.666239 kubelet[2460]: E1002 19:20:20.666204 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.666239 kubelet[2460]: W1002 19:20:20.666212 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.666239 kubelet[2460]: E1002 19:20:20.666226 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.666490 kubelet[2460]: E1002 19:20:20.666375 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.666490 kubelet[2460]: W1002 19:20:20.666383 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.666490 kubelet[2460]: E1002 19:20:20.666397 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.666661 kubelet[2460]: E1002 19:20:20.666611 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.666661 kubelet[2460]: W1002 19:20:20.666620 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.666661 kubelet[2460]: E1002 19:20:20.666649 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.666821 kubelet[2460]: E1002 19:20:20.666804 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.666821 kubelet[2460]: W1002 19:20:20.666812 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.666921 kubelet[2460]: E1002 19:20:20.666826 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.666996 kubelet[2460]: E1002 19:20:20.666975 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.666996 kubelet[2460]: W1002 19:20:20.666991 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.667103 kubelet[2460]: E1002 19:20:20.667006 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.667192 kubelet[2460]: E1002 19:20:20.667177 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.667262 kubelet[2460]: W1002 19:20:20.667193 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.667262 kubelet[2460]: E1002 19:20:20.667206 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.667410 kubelet[2460]: E1002 19:20:20.667367 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.667410 kubelet[2460]: W1002 19:20:20.667378 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.667410 kubelet[2460]: E1002 19:20:20.667396 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.667567 kubelet[2460]: E1002 19:20:20.667553 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.667615 kubelet[2460]: W1002 19:20:20.667568 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.667615 kubelet[2460]: E1002 19:20:20.667582 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.675133 kubelet[2460]: E1002 19:20:20.675112 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.675133 kubelet[2460]: W1002 19:20:20.675128 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.675289 kubelet[2460]: E1002 19:20:20.675145 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.675436 kubelet[2460]: E1002 19:20:20.675419 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.675436 kubelet[2460]: W1002 19:20:20.675432 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.675627 kubelet[2460]: E1002 19:20:20.675454 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.675749 kubelet[2460]: E1002 19:20:20.675735 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.675749 kubelet[2460]: W1002 19:20:20.675747 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.675847 kubelet[2460]: E1002 19:20:20.675767 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.676018 kubelet[2460]: E1002 19:20:20.676002 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.676018 kubelet[2460]: W1002 19:20:20.676014 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.676162 kubelet[2460]: E1002 19:20:20.676035 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.676254 kubelet[2460]: E1002 19:20:20.676238 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.676307 kubelet[2460]: W1002 19:20:20.676255 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.676307 kubelet[2460]: E1002 19:20:20.676274 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.676481 kubelet[2460]: E1002 19:20:20.676466 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.676481 kubelet[2460]: W1002 19:20:20.676481 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.676611 kubelet[2460]: E1002 19:20:20.676566 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.676746 kubelet[2460]: E1002 19:20:20.676734 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.676823 kubelet[2460]: W1002 19:20:20.676747 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.676889 kubelet[2460]: E1002 19:20:20.676828 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.676981 kubelet[2460]: E1002 19:20:20.676962 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.676981 kubelet[2460]: W1002 19:20:20.676976 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.677099 kubelet[2460]: E1002 19:20:20.677057 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.677209 kubelet[2460]: E1002 19:20:20.677194 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.677209 kubelet[2460]: W1002 19:20:20.677206 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.677362 kubelet[2460]: E1002 19:20:20.677225 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.677581 kubelet[2460]: E1002 19:20:20.677565 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.677581 kubelet[2460]: W1002 19:20:20.677577 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.677743 kubelet[2460]: E1002 19:20:20.677596 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.677821 kubelet[2460]: E1002 19:20:20.677805 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.677821 kubelet[2460]: W1002 19:20:20.677818 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.677930 kubelet[2460]: E1002 19:20:20.677838 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.678017 kubelet[2460]: E1002 19:20:20.678000 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.678017 kubelet[2460]: W1002 19:20:20.678015 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.678150 kubelet[2460]: E1002 19:20:20.678030 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.678231 kubelet[2460]: E1002 19:20:20.678214 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.678231 kubelet[2460]: W1002 19:20:20.678227 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.678372 kubelet[2460]: E1002 19:20:20.678359 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.678517 kubelet[2460]: E1002 19:20:20.678388 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.678587 kubelet[2460]: W1002 19:20:20.678518 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.678587 kubelet[2460]: E1002 19:20:20.678534 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.678752 kubelet[2460]: E1002 19:20:20.678738 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.678800 kubelet[2460]: W1002 19:20:20.678753 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.678800 kubelet[2460]: E1002 19:20:20.678768 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.678968 kubelet[2460]: E1002 19:20:20.678952 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.679026 kubelet[2460]: W1002 19:20:20.678968 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.679026 kubelet[2460]: E1002 19:20:20.678983 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.679395 kubelet[2460]: E1002 19:20:20.679372 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.679395 kubelet[2460]: W1002 19:20:20.679387 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.679534 kubelet[2460]: E1002 19:20:20.679409 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:20.679618 kubelet[2460]: E1002 19:20:20.679596 2460 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:20:20.679618 kubelet[2460]: W1002 19:20:20.679606 2460 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:20:20.679716 kubelet[2460]: E1002 19:20:20.679620 2460 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:20:21.584605 env[1334]: time="2023-10-02T19:20:21.584554396Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:21.591847 env[1334]: time="2023-10-02T19:20:21.591752526Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:21.596372 env[1334]: time="2023-10-02T19:20:21.596340218Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:21.602085 env[1334]: time="2023-10-02T19:20:21.601985584Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:21.603248 env[1334]: time="2023-10-02T19:20:21.603215355Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:20:21.607879 env[1334]: time="2023-10-02T19:20:21.607846846Z" level=info msg="CreateContainer within sandbox \"374326b4d38a385db288d6c7329ea1a535fb0f3a6939ae09402540806effb50a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:20:21.641470 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2351819246.mount: Deactivated successfully. Oct 2 19:20:21.655560 env[1334]: time="2023-10-02T19:20:21.655512819Z" level=info msg="CreateContainer within sandbox \"374326b4d38a385db288d6c7329ea1a535fb0f3a6939ae09402540806effb50a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e24a13231c8b1f29060e1d252877e0dc3b970f6da3ba27ebbf9fa7fae9095251\"" Oct 2 19:20:21.656314 env[1334]: time="2023-10-02T19:20:21.656276301Z" level=info msg="StartContainer for \"e24a13231c8b1f29060e1d252877e0dc3b970f6da3ba27ebbf9fa7fae9095251\"" Oct 2 19:20:21.685925 systemd[1]: Started cri-containerd-e24a13231c8b1f29060e1d252877e0dc3b970f6da3ba27ebbf9fa7fae9095251.scope. Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2875 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:21.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532346131333233316338623166323930363065316432353238373765 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit: BPF prog-id=137 op=LOAD Oct 2 19:20:21.806000 audit[3051]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030e340 items=0 ppid=2875 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:21.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532346131333233316338623166323930363065316432353238373765 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit: BPF prog-id=138 op=LOAD Oct 2 19:20:21.806000 audit[3051]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030e388 items=0 ppid=2875 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:21.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532346131333233316338623166323930363065316432353238373765 Oct 2 19:20:21.806000 audit: BPF prog-id=138 op=UNLOAD Oct 2 19:20:21.806000 audit: BPF prog-id=137 op=UNLOAD Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { perfmon } for pid=3051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit[3051]: AVC avc: denied { bpf } for pid=3051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:21.806000 audit: BPF prog-id=139 op=LOAD Oct 2 19:20:21.806000 audit[3051]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030e418 items=0 ppid=2875 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:21.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532346131333233316338623166323930363065316432353238373765 Oct 2 19:20:21.834360 env[1334]: time="2023-10-02T19:20:21.834302995Z" level=info msg="StartContainer for \"e24a13231c8b1f29060e1d252877e0dc3b970f6da3ba27ebbf9fa7fae9095251\" returns successfully" Oct 2 19:20:21.851569 systemd[1]: cri-containerd-e24a13231c8b1f29060e1d252877e0dc3b970f6da3ba27ebbf9fa7fae9095251.scope: Deactivated successfully. Oct 2 19:20:21.854000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:20:22.634204 systemd[1]: run-containerd-runc-k8s.io-e24a13231c8b1f29060e1d252877e0dc3b970f6da3ba27ebbf9fa7fae9095251-runc.3e8tZW.mount: Deactivated successfully. Oct 2 19:20:22.634335 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e24a13231c8b1f29060e1d252877e0dc3b970f6da3ba27ebbf9fa7fae9095251-rootfs.mount: Deactivated successfully. Oct 2 19:20:23.178266 env[1334]: time="2023-10-02T19:20:23.178208624Z" level=info msg="shim disconnected" id=e24a13231c8b1f29060e1d252877e0dc3b970f6da3ba27ebbf9fa7fae9095251 Oct 2 19:20:23.178266 env[1334]: time="2023-10-02T19:20:23.178268022Z" level=warning msg="cleaning up after shim disconnected" id=e24a13231c8b1f29060e1d252877e0dc3b970f6da3ba27ebbf9fa7fae9095251 namespace=k8s.io Oct 2 19:20:23.178870 env[1334]: time="2023-10-02T19:20:23.178280222Z" level=info msg="cleaning up dead shim" Oct 2 19:20:23.186940 env[1334]: time="2023-10-02T19:20:23.186881126Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:20:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3093 runtime=io.containerd.runc.v2\n" Oct 2 19:20:23.577977 env[1334]: time="2023-10-02T19:20:23.577928918Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:20:25.677756 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount137406405.mount: Deactivated successfully. Oct 2 19:20:30.184690 env[1334]: time="2023-10-02T19:20:30.184633537Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:30.192149 env[1334]: time="2023-10-02T19:20:30.192111186Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:30.216906 env[1334]: time="2023-10-02T19:20:30.216850986Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:30.226054 env[1334]: time="2023-10-02T19:20:30.226013201Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:30.226697 env[1334]: time="2023-10-02T19:20:30.226659088Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:20:30.229290 env[1334]: time="2023-10-02T19:20:30.228980141Z" level=info msg="CreateContainer within sandbox \"374326b4d38a385db288d6c7329ea1a535fb0f3a6939ae09402540806effb50a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:20:30.260528 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount419446683.mount: Deactivated successfully. Oct 2 19:20:30.280436 env[1334]: time="2023-10-02T19:20:30.280384902Z" level=info msg="CreateContainer within sandbox \"374326b4d38a385db288d6c7329ea1a535fb0f3a6939ae09402540806effb50a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"00a03a8c1c5dcf61807116890049170d7dea3ceeb679652d395b773caaea4350\"" Oct 2 19:20:30.281860 env[1334]: time="2023-10-02T19:20:30.281814173Z" level=info msg="StartContainer for \"00a03a8c1c5dcf61807116890049170d7dea3ceeb679652d395b773caaea4350\"" Oct 2 19:20:30.310162 systemd[1]: Started cri-containerd-00a03a8c1c5dcf61807116890049170d7dea3ceeb679652d395b773caaea4350.scope. Oct 2 19:20:30.326000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.330985 kernel: kauditd_printk_skb: 97 callbacks suppressed Oct 2 19:20:30.331094 kernel: audit: type=1400 audit(1696274430.326:1133): avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.326000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001216b0 a2=3c a3=8 items=0 ppid=2875 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:30.363405 kernel: audit: type=1300 audit(1696274430.326:1133): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001216b0 a2=3c a3=8 items=0 ppid=2875 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:30.363805 kernel: audit: type=1327 audit(1696274430.326:1133): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030613033613863316335646366363138303731313638393030343931 Oct 2 19:20:30.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030613033613863316335646366363138303731313638393030343931 Oct 2 19:20:30.329000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.408613 kernel: audit: type=1400 audit(1696274430.329:1134): avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.408760 kernel: audit: type=1400 audit(1696274430.329:1134): avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.329000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.329000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.429657 kernel: audit: type=1400 audit(1696274430.329:1134): avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.329000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.442670 kernel: audit: type=1400 audit(1696274430.329:1134): avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.442785 kernel: audit: type=1400 audit(1696274430.329:1134): avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.329000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.329000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.329000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.479550 kernel: audit: type=1400 audit(1696274430.329:1134): avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.479652 kernel: audit: type=1400 audit(1696274430.329:1134): avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.479949 env[1334]: time="2023-10-02T19:20:30.479907171Z" level=info msg="StartContainer for \"00a03a8c1c5dcf61807116890049170d7dea3ceeb679652d395b773caaea4350\" returns successfully" Oct 2 19:20:30.329000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.329000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.329000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.329000 audit: BPF prog-id=140 op=LOAD Oct 2 19:20:30.329000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001219d8 a2=78 a3=c0001fc380 items=0 ppid=2875 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:30.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030613033613863316335646366363138303731313638393030343931 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit: BPF prog-id=141 op=LOAD Oct 2 19:20:30.344000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000121770 a2=78 a3=c0001fc3c8 items=0 ppid=2875 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:30.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030613033613863316335646366363138303731313638393030343931 Oct 2 19:20:30.344000 audit: BPF prog-id=141 op=UNLOAD Oct 2 19:20:30.344000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { perfmon } for pid=3114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit[3114]: AVC avc: denied { bpf } for pid=3114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:30.344000 audit: BPF prog-id=142 op=LOAD Oct 2 19:20:30.344000 audit[3114]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000121c30 a2=78 a3=c0001fc458 items=0 ppid=2875 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:30.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030613033613863316335646366363138303731313638393030343931 Oct 2 19:20:32.072247 env[1334]: time="2023-10-02T19:20:32.072176566Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:20:32.075039 systemd[1]: cri-containerd-00a03a8c1c5dcf61807116890049170d7dea3ceeb679652d395b773caaea4350.scope: Deactivated successfully. Oct 2 19:20:32.078000 audit: BPF prog-id=142 op=UNLOAD Oct 2 19:20:32.094288 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-00a03a8c1c5dcf61807116890049170d7dea3ceeb679652d395b773caaea4350-rootfs.mount: Deactivated successfully. Oct 2 19:20:32.138286 kubelet[2460]: I1002 19:20:32.138059 2460 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:20:32.617559 kubelet[2460]: I1002 19:20:32.166000 2460 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:20:32.617559 kubelet[2460]: I1002 19:20:32.178243 2460 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:20:32.617559 kubelet[2460]: I1002 19:20:32.178426 2460 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:20:32.617559 kubelet[2460]: I1002 19:20:32.178548 2460 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:20:32.617559 kubelet[2460]: I1002 19:20:32.361838 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/44ea02cd-dc8a-4428-804a-036431e20b24-config-volume\") pod \"coredns-5d78c9869d-4l22k\" (UID: \"44ea02cd-dc8a-4428-804a-036431e20b24\") " pod="kube-system/coredns-5d78c9869d-4l22k" Oct 2 19:20:32.617559 kubelet[2460]: I1002 19:20:32.361901 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/07e4babb-712e-4526-b16f-d29ac629ea72-config-volume\") pod \"coredns-5d78c9869d-x2pls\" (UID: \"07e4babb-712e-4526-b16f-d29ac629ea72\") " pod="kube-system/coredns-5d78c9869d-x2pls" Oct 2 19:20:32.617559 kubelet[2460]: I1002 19:20:32.362111 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hnt6h\" (UniqueName: \"kubernetes.io/projected/24d235ee-0a45-4f8b-b3e3-30fc04938eda-kube-api-access-hnt6h\") pod \"calico-kube-controllers-7bd445fdb4-z7mcb\" (UID: \"24d235ee-0a45-4f8b-b3e3-30fc04938eda\") " pod="calico-system/calico-kube-controllers-7bd445fdb4-z7mcb" Oct 2 19:20:32.617559 kubelet[2460]: I1002 19:20:32.362182 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5062268a-0b0e-41ea-a78f-0066e6ad7218-varrun\") pod \"csi-node-driver-j2zbp\" (UID: \"5062268a-0b0e-41ea-a78f-0066e6ad7218\") " pod="calico-system/csi-node-driver-j2zbp" Oct 2 19:20:32.172157 systemd[1]: Created slice kubepods-burstable-pod44ea02cd_dc8a_4428_804a_036431e20b24.slice. Oct 2 19:20:32.618395 kubelet[2460]: I1002 19:20:32.362238 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/5062268a-0b0e-41ea-a78f-0066e6ad7218-etccalico\") pod \"csi-node-driver-j2zbp\" (UID: \"5062268a-0b0e-41ea-a78f-0066e6ad7218\") " pod="calico-system/csi-node-driver-j2zbp" Oct 2 19:20:32.618395 kubelet[2460]: I1002 19:20:32.362298 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5062268a-0b0e-41ea-a78f-0066e6ad7218-kubelet-dir\") pod \"csi-node-driver-j2zbp\" (UID: \"5062268a-0b0e-41ea-a78f-0066e6ad7218\") " pod="calico-system/csi-node-driver-j2zbp" Oct 2 19:20:32.618395 kubelet[2460]: I1002 19:20:32.362340 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5062268a-0b0e-41ea-a78f-0066e6ad7218-socket-dir\") pod \"csi-node-driver-j2zbp\" (UID: \"5062268a-0b0e-41ea-a78f-0066e6ad7218\") " pod="calico-system/csi-node-driver-j2zbp" Oct 2 19:20:32.618395 kubelet[2460]: I1002 19:20:32.362441 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bfpws\" (UniqueName: \"kubernetes.io/projected/44ea02cd-dc8a-4428-804a-036431e20b24-kube-api-access-bfpws\") pod \"coredns-5d78c9869d-4l22k\" (UID: \"44ea02cd-dc8a-4428-804a-036431e20b24\") " pod="kube-system/coredns-5d78c9869d-4l22k" Oct 2 19:20:32.618395 kubelet[2460]: I1002 19:20:32.362467 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x8b2b\" (UniqueName: \"kubernetes.io/projected/07e4babb-712e-4526-b16f-d29ac629ea72-kube-api-access-x8b2b\") pod \"coredns-5d78c9869d-x2pls\" (UID: \"07e4babb-712e-4526-b16f-d29ac629ea72\") " pod="kube-system/coredns-5d78c9869d-x2pls" Oct 2 19:20:32.185866 systemd[1]: Created slice kubepods-besteffort-pod5062268a_0b0e_41ea_a78f_0066e6ad7218.slice. Oct 2 19:20:32.618877 kubelet[2460]: I1002 19:20:32.362505 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5062268a-0b0e-41ea-a78f-0066e6ad7218-registration-dir\") pod \"csi-node-driver-j2zbp\" (UID: \"5062268a-0b0e-41ea-a78f-0066e6ad7218\") " pod="calico-system/csi-node-driver-j2zbp" Oct 2 19:20:32.618877 kubelet[2460]: I1002 19:20:32.362938 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2h674\" (UniqueName: \"kubernetes.io/projected/5062268a-0b0e-41ea-a78f-0066e6ad7218-kube-api-access-2h674\") pod \"csi-node-driver-j2zbp\" (UID: \"5062268a-0b0e-41ea-a78f-0066e6ad7218\") " pod="calico-system/csi-node-driver-j2zbp" Oct 2 19:20:32.202735 systemd[1]: Created slice kubepods-burstable-pod07e4babb_712e_4526_b16f_d29ac629ea72.slice. Oct 2 19:20:32.208964 systemd[1]: Created slice kubepods-besteffort-pod24d235ee_0a45_4f8b_b3e3_30fc04938eda.slice. Oct 2 19:20:33.221297 env[1334]: time="2023-10-02T19:20:33.221242644Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-4l22k,Uid:44ea02cd-dc8a-4428-804a-036431e20b24,Namespace:kube-system,Attempt:0,}" Oct 2 19:20:33.227983 env[1334]: time="2023-10-02T19:20:33.227939915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-z7mcb,Uid:24d235ee-0a45-4f8b-b3e3-30fc04938eda,Namespace:calico-system,Attempt:0,}" Oct 2 19:20:33.394652 env[1334]: time="2023-10-02T19:20:33.394223512Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-j2zbp,Uid:5062268a-0b0e-41ea-a78f-0066e6ad7218,Namespace:calico-system,Attempt:0,}" Oct 2 19:20:33.394652 env[1334]: time="2023-10-02T19:20:33.394618904Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-x2pls,Uid:07e4babb-712e-4526-b16f-d29ac629ea72,Namespace:kube-system,Attempt:0,}" Oct 2 19:20:33.632572 env[1334]: time="2023-10-02T19:20:33.632516721Z" level=info msg="shim disconnected" id=00a03a8c1c5dcf61807116890049170d7dea3ceeb679652d395b773caaea4350 Oct 2 19:20:33.632572 env[1334]: time="2023-10-02T19:20:33.632569420Z" level=warning msg="cleaning up after shim disconnected" id=00a03a8c1c5dcf61807116890049170d7dea3ceeb679652d395b773caaea4350 namespace=k8s.io Oct 2 19:20:33.632572 env[1334]: time="2023-10-02T19:20:33.632580819Z" level=info msg="cleaning up dead shim" Oct 2 19:20:33.640740 env[1334]: time="2023-10-02T19:20:33.640694163Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:20:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3175 runtime=io.containerd.runc.v2\n" Oct 2 19:20:33.897998 env[1334]: time="2023-10-02T19:20:33.897600114Z" level=error msg="Failed to destroy network for sandbox \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.898255 env[1334]: time="2023-10-02T19:20:33.898207102Z" level=error msg="encountered an error cleaning up failed sandbox \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.898350 env[1334]: time="2023-10-02T19:20:33.898288700Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-x2pls,Uid:07e4babb-712e-4526-b16f-d29ac629ea72,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.898866 kubelet[2460]: E1002 19:20:33.898629 2460 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.898866 kubelet[2460]: E1002 19:20:33.898725 2460 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-x2pls" Oct 2 19:20:33.898866 kubelet[2460]: E1002 19:20:33.898759 2460 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-x2pls" Oct 2 19:20:33.901381 kubelet[2460]: E1002 19:20:33.898837 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-x2pls_kube-system(07e4babb-712e-4526-b16f-d29ac629ea72)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-x2pls_kube-system(07e4babb-712e-4526-b16f-d29ac629ea72)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-x2pls" podUID=07e4babb-712e-4526-b16f-d29ac629ea72 Oct 2 19:20:33.913558 env[1334]: time="2023-10-02T19:20:33.913495407Z" level=error msg="Failed to destroy network for sandbox \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.913936 env[1334]: time="2023-10-02T19:20:33.913892400Z" level=error msg="encountered an error cleaning up failed sandbox \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.914027 env[1334]: time="2023-10-02T19:20:33.913971998Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-4l22k,Uid:44ea02cd-dc8a-4428-804a-036431e20b24,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.914234 kubelet[2460]: E1002 19:20:33.914212 2460 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.914324 kubelet[2460]: E1002 19:20:33.914272 2460 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-4l22k" Oct 2 19:20:33.914324 kubelet[2460]: E1002 19:20:33.914303 2460 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-4l22k" Oct 2 19:20:33.914412 kubelet[2460]: E1002 19:20:33.914372 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-4l22k_kube-system(44ea02cd-dc8a-4428-804a-036431e20b24)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-4l22k_kube-system(44ea02cd-dc8a-4428-804a-036431e20b24)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-4l22k" podUID=44ea02cd-dc8a-4428-804a-036431e20b24 Oct 2 19:20:33.929320 env[1334]: time="2023-10-02T19:20:33.929251104Z" level=error msg="Failed to destroy network for sandbox \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.929737 env[1334]: time="2023-10-02T19:20:33.929681995Z" level=error msg="encountered an error cleaning up failed sandbox \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.929852 env[1334]: time="2023-10-02T19:20:33.929768794Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-j2zbp,Uid:5062268a-0b0e-41ea-a78f-0066e6ad7218,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.930066 kubelet[2460]: E1002 19:20:33.930037 2460 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.930166 kubelet[2460]: E1002 19:20:33.930101 2460 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-j2zbp" Oct 2 19:20:33.930166 kubelet[2460]: E1002 19:20:33.930130 2460 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-j2zbp" Oct 2 19:20:33.930260 kubelet[2460]: E1002 19:20:33.930191 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-j2zbp_calico-system(5062268a-0b0e-41ea-a78f-0066e6ad7218)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-j2zbp_calico-system(5062268a-0b0e-41ea-a78f-0066e6ad7218)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:20:33.934315 env[1334]: time="2023-10-02T19:20:33.934270507Z" level=error msg="Failed to destroy network for sandbox \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.934705 env[1334]: time="2023-10-02T19:20:33.934605101Z" level=error msg="encountered an error cleaning up failed sandbox \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.934817 env[1334]: time="2023-10-02T19:20:33.934706999Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-z7mcb,Uid:24d235ee-0a45-4f8b-b3e3-30fc04938eda,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.935170 kubelet[2460]: E1002 19:20:33.934924 2460 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:33.935170 kubelet[2460]: E1002 19:20:33.934982 2460 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-z7mcb" Oct 2 19:20:33.935170 kubelet[2460]: E1002 19:20:33.935009 2460 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-z7mcb" Oct 2 19:20:33.935345 kubelet[2460]: E1002 19:20:33.935069 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7bd445fdb4-z7mcb_calico-system(24d235ee-0a45-4f8b-b3e3-30fc04938eda)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7bd445fdb4-z7mcb_calico-system(24d235ee-0a45-4f8b-b3e3-30fc04938eda)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-z7mcb" podUID=24d235ee-0a45-4f8b-b3e3-30fc04938eda Oct 2 19:20:34.102114 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa-shm.mount: Deactivated successfully. Oct 2 19:20:34.102225 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6-shm.mount: Deactivated successfully. Oct 2 19:20:34.617097 env[1334]: time="2023-10-02T19:20:34.615213467Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:20:34.619950 kubelet[2460]: I1002 19:20:34.619926 2460 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Oct 2 19:20:34.621091 env[1334]: time="2023-10-02T19:20:34.621046457Z" level=info msg="StopPodSandbox for \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\"" Oct 2 19:20:34.623577 kubelet[2460]: I1002 19:20:34.623557 2460 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Oct 2 19:20:34.624841 env[1334]: time="2023-10-02T19:20:34.624807385Z" level=info msg="StopPodSandbox for \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\"" Oct 2 19:20:34.626218 kubelet[2460]: I1002 19:20:34.626194 2460 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Oct 2 19:20:34.626874 env[1334]: time="2023-10-02T19:20:34.626845847Z" level=info msg="StopPodSandbox for \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\"" Oct 2 19:20:34.629186 kubelet[2460]: I1002 19:20:34.629162 2460 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Oct 2 19:20:34.629698 env[1334]: time="2023-10-02T19:20:34.629632994Z" level=info msg="StopPodSandbox for \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\"" Oct 2 19:20:34.696847 env[1334]: time="2023-10-02T19:20:34.696778520Z" level=error msg="StopPodSandbox for \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\" failed" error="failed to destroy network for sandbox \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:34.697134 kubelet[2460]: E1002 19:20:34.697103 2460 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Oct 2 19:20:34.697241 kubelet[2460]: E1002 19:20:34.697168 2460 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c} Oct 2 19:20:34.697369 kubelet[2460]: E1002 19:20:34.697255 2460 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5062268a-0b0e-41ea-a78f-0066e6ad7218\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:20:34.697369 kubelet[2460]: E1002 19:20:34.697297 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5062268a-0b0e-41ea-a78f-0066e6ad7218\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:20:34.705667 env[1334]: time="2023-10-02T19:20:34.705590853Z" level=error msg="StopPodSandbox for \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\" failed" error="failed to destroy network for sandbox \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:34.706095 kubelet[2460]: E1002 19:20:34.705941 2460 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Oct 2 19:20:34.706095 kubelet[2460]: E1002 19:20:34.705979 2460 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa} Oct 2 19:20:34.706095 kubelet[2460]: E1002 19:20:34.706023 2460 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"24d235ee-0a45-4f8b-b3e3-30fc04938eda\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:20:34.706095 kubelet[2460]: E1002 19:20:34.706069 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"24d235ee-0a45-4f8b-b3e3-30fc04938eda\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-z7mcb" podUID=24d235ee-0a45-4f8b-b3e3-30fc04938eda Oct 2 19:20:34.725977 env[1334]: time="2023-10-02T19:20:34.725920367Z" level=error msg="StopPodSandbox for \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\" failed" error="failed to destroy network for sandbox \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:34.726223 kubelet[2460]: E1002 19:20:34.726192 2460 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Oct 2 19:20:34.726323 kubelet[2460]: E1002 19:20:34.726235 2460 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63} Oct 2 19:20:34.726323 kubelet[2460]: E1002 19:20:34.726283 2460 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"07e4babb-712e-4526-b16f-d29ac629ea72\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:20:34.726323 kubelet[2460]: E1002 19:20:34.726320 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"07e4babb-712e-4526-b16f-d29ac629ea72\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-x2pls" podUID=07e4babb-712e-4526-b16f-d29ac629ea72 Oct 2 19:20:34.727134 env[1334]: time="2023-10-02T19:20:34.727087345Z" level=error msg="StopPodSandbox for \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\" failed" error="failed to destroy network for sandbox \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:20:34.727354 kubelet[2460]: E1002 19:20:34.727331 2460 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Oct 2 19:20:34.727449 kubelet[2460]: E1002 19:20:34.727369 2460 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6} Oct 2 19:20:34.727449 kubelet[2460]: E1002 19:20:34.727408 2460 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"44ea02cd-dc8a-4428-804a-036431e20b24\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:20:34.727449 kubelet[2460]: E1002 19:20:34.727441 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"44ea02cd-dc8a-4428-804a-036431e20b24\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-4l22k" podUID=44ea02cd-dc8a-4428-804a-036431e20b24 Oct 2 19:20:41.084691 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3446958964.mount: Deactivated successfully. Oct 2 19:20:41.174478 env[1334]: time="2023-10-02T19:20:41.174416514Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:41.183115 env[1334]: time="2023-10-02T19:20:41.183054566Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:41.186618 env[1334]: time="2023-10-02T19:20:41.186582305Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:41.190724 env[1334]: time="2023-10-02T19:20:41.190690535Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:41.191220 env[1334]: time="2023-10-02T19:20:41.191189226Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:20:41.195255 env[1334]: time="2023-10-02T19:20:41.195196758Z" level=info msg="CreateContainer within sandbox \"374326b4d38a385db288d6c7329ea1a535fb0f3a6939ae09402540806effb50a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:20:41.231763 env[1334]: time="2023-10-02T19:20:41.231713131Z" level=info msg="CreateContainer within sandbox \"374326b4d38a385db288d6c7329ea1a535fb0f3a6939ae09402540806effb50a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479\"" Oct 2 19:20:41.233897 env[1334]: time="2023-10-02T19:20:41.232500718Z" level=info msg="StartContainer for \"11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479\"" Oct 2 19:20:41.262518 systemd[1]: Started cri-containerd-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479.scope. Oct 2 19:20:41.299971 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:20:41.300117 kernel: audit: type=1400 audit(1696274441.280:1140): avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.280000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.280000 audit[3397]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2875 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:41.319373 kernel: audit: type=1300 audit(1696274441.280:1140): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2875 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:41.319989 kernel: audit: type=1327 audit(1696274441.280:1140): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131663162373031613530613335313231323332393932363462363530 Oct 2 19:20:41.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131663162373031613530613335313231323332393932363462363530 Oct 2 19:20:41.280000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.352461 kernel: audit: type=1400 audit(1696274441.280:1141): avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.280000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.280000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.379937 kernel: audit: type=1400 audit(1696274441.280:1141): avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.380062 kernel: audit: type=1400 audit(1696274441.280:1141): avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.280000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.394137 kernel: audit: type=1400 audit(1696274441.280:1141): avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.280000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.402886 env[1334]: time="2023-10-02T19:20:41.402839495Z" level=info msg="StartContainer for \"11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479\" returns successfully" Oct 2 19:20:41.280000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.422058 kernel: audit: type=1400 audit(1696274441.280:1141): avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.422190 kernel: audit: type=1400 audit(1696274441.280:1141): avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.422230 kernel: audit: type=1400 audit(1696274441.280:1141): avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.280000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.280000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.280000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.280000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.280000 audit: BPF prog-id=143 op=LOAD Oct 2 19:20:41.280000 audit[3397]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003b02c0 items=0 ppid=2875 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:41.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131663162373031613530613335313231323332393932363462363530 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit: BPF prog-id=144 op=LOAD Oct 2 19:20:41.298000 audit[3397]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003b0308 items=0 ppid=2875 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:41.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131663162373031613530613335313231323332393932363462363530 Oct 2 19:20:41.298000 audit: BPF prog-id=144 op=UNLOAD Oct 2 19:20:41.298000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { perfmon } for pid=3397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit[3397]: AVC avc: denied { bpf } for pid=3397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:41.298000 audit: BPF prog-id=145 op=LOAD Oct 2 19:20:41.298000 audit[3397]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003b0398 items=0 ppid=2875 pid=3397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:41.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131663162373031613530613335313231323332393932363462363530 Oct 2 19:20:41.665595 kubelet[2460]: I1002 19:20:41.665479 2460 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-n5cq9" podStartSLOduration=1.648634022 podCreationTimestamp="2023-10-02 19:20:12 +0000 UTC" firstStartedPulling="2023-10-02 19:20:13.174706553 +0000 UTC m=+18.839029300" lastFinishedPulling="2023-10-02 19:20:41.191493821 +0000 UTC m=+46.855816468" observedRunningTime="2023-10-02 19:20:41.665373791 +0000 UTC m=+47.329696438" watchObservedRunningTime="2023-10-02 19:20:41.66542119 +0000 UTC m=+47.329743837" Oct 2 19:20:41.701471 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:20:41.701631 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:20:42.085353 systemd[1]: run-containerd-runc-k8s.io-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479-runc.Dy4kxQ.mount: Deactivated successfully. Oct 2 19:20:42.668947 systemd[1]: run-containerd-runc-k8s.io-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479-runc.HaHO2J.mount: Deactivated successfully. Oct 2 19:20:43.044000 audit[3540]: AVC avc: denied { write } for pid=3540 comm="tee" name="fd" dev="proc" ino=30410 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:20:43.044000 audit[3540]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffbf2d896d a2=241 a3=1b6 items=1 ppid=3508 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.044000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:20:43.044000 audit: PATH item=0 name="/dev/fd/63" inode=29455 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:43.044000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:20:43.101085 systemd[1]: run-containerd-runc-k8s.io-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479-runc.hj6JSE.mount: Deactivated successfully. Oct 2 19:20:43.104000 audit[3546]: AVC avc: denied { write } for pid=3546 comm="tee" name="fd" dev="proc" ino=30421 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:20:43.112000 audit[3555]: AVC avc: denied { write } for pid=3555 comm="tee" name="fd" dev="proc" ino=30424 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:20:43.104000 audit[3546]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffaebae95e a2=241 a3=1b6 items=1 ppid=3503 pid=3546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.104000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:20:43.104000 audit: PATH item=0 name="/dev/fd/63" inode=29460 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:43.104000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:20:43.119000 audit[3560]: AVC avc: denied { write } for pid=3560 comm="tee" name="fd" dev="proc" ino=30428 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:20:43.121000 audit[3569]: AVC avc: denied { write } for pid=3569 comm="tee" name="fd" dev="proc" ino=29505 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:20:43.121000 audit[3569]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd8497496e a2=241 a3=1b6 items=1 ppid=3516 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.127000 audit[3576]: AVC avc: denied { write } for pid=3576 comm="tee" name="fd" dev="proc" ino=30433 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:20:43.112000 audit[3555]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7982c96d a2=241 a3=1b6 items=1 ppid=3514 pid=3555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.112000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:20:43.112000 audit: PATH item=0 name="/dev/fd/63" inode=29471 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:43.112000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:20:43.119000 audit[3560]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe56def96f a2=241 a3=1b6 items=1 ppid=3510 pid=3560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.119000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:20:43.119000 audit: PATH item=0 name="/dev/fd/63" inode=29474 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:43.119000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:20:43.127000 audit[3576]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe359dd96d a2=241 a3=1b6 items=1 ppid=3512 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.127000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:20:43.127000 audit: PATH item=0 name="/dev/fd/63" inode=30418 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:43.127000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:20:43.140000 audit[3595]: AVC avc: denied { write } for pid=3595 comm="tee" name="fd" dev="proc" ino=30440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:20:43.121000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:20:43.121000 audit: PATH item=0 name="/dev/fd/63" inode=29483 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:43.140000 audit[3595]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf79d595d a2=241 a3=1b6 items=1 ppid=3525 pid=3595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.121000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:20:43.140000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:20:43.140000 audit: PATH item=0 name="/dev/fd/63" inode=30436 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:20:43.140000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:20:43.890000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.890000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.890000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.890000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.890000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.890000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.890000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.890000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.890000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.890000 audit: BPF prog-id=146 op=LOAD Oct 2 19:20:43.890000 audit[3669]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffedb292fa0 a2=70 a3=7fe7691c4000 items=0 ppid=3515 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.890000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:20:43.894000 audit: BPF prog-id=146 op=UNLOAD Oct 2 19:20:43.894000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.894000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.894000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.894000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.894000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.894000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.894000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.894000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.894000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.894000 audit: BPF prog-id=147 op=LOAD Oct 2 19:20:43.894000 audit[3669]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffedb292fa0 a2=70 a3=6e items=0 ppid=3515 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:20:43.894000 audit: BPF prog-id=147 op=UNLOAD Oct 2 19:20:43.894000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.894000 audit[3669]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffedb292f50 a2=70 a3=7ffedb292fa0 items=0 ppid=3515 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:20:43.895000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.895000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.895000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.895000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.895000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.895000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.895000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.895000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.895000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.895000 audit: BPF prog-id=148 op=LOAD Oct 2 19:20:43.895000 audit[3669]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffedb292f30 a2=70 a3=7ffedb292fa0 items=0 ppid=3515 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.895000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:20:43.895000 audit: BPF prog-id=148 op=UNLOAD Oct 2 19:20:43.895000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.895000 audit[3669]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffedb293010 a2=70 a3=0 items=0 ppid=3515 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.895000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:20:43.898000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.898000 audit[3669]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffedb293000 a2=70 a3=0 items=0 ppid=3515 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.898000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:20:43.898000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.898000 audit[3669]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffedb293040 a2=70 a3=0 items=0 ppid=3515 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.898000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:20:43.899000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.899000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.899000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.899000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.899000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.899000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.899000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.899000 audit[3669]: AVC avc: denied { perfmon } for pid=3669 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.899000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.899000 audit[3669]: AVC avc: denied { bpf } for pid=3669 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.899000 audit: BPF prog-id=149 op=LOAD Oct 2 19:20:43.899000 audit[3669]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffedb292f60 a2=70 a3=ffffffff items=0 ppid=3515 pid=3669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.899000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:20:43.904000 audit[3675]: AVC avc: denied { bpf } for pid=3675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.904000 audit[3675]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff5644940 a2=70 a3=fff80800 items=0 ppid=3515 pid=3675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.904000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:20:43.904000 audit[3675]: AVC avc: denied { bpf } for pid=3675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:43.904000 audit[3675]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff5644810 a2=70 a3=3 items=0 ppid=3515 pid=3675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:43.904000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:20:43.910000 audit: BPF prog-id=149 op=UNLOAD Oct 2 19:20:44.007000 audit[3692]: NETFILTER_CFG table=raw:101 family=2 entries=19 op=nft_register_chain pid=3692 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:20:44.007000 audit[3692]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc601aa300 a2=0 a3=7ffc601aa2ec items=0 ppid=3515 pid=3692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:44.007000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:20:44.012000 audit[3699]: NETFILTER_CFG table=mangle:102 family=2 entries=19 op=nft_register_chain pid=3699 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:20:44.012000 audit[3699]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffdc547b870 a2=0 a3=7ffdc547b85c items=0 ppid=3515 pid=3699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:44.012000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:20:44.021000 audit[3700]: NETFILTER_CFG table=nat:103 family=2 entries=16 op=nft_register_chain pid=3700 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:20:44.021000 audit[3700]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fff454143d0 a2=0 a3=7fff454143bc items=0 ppid=3515 pid=3700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:44.021000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:20:44.039000 audit[3704]: NETFILTER_CFG table=filter:104 family=2 entries=39 op=nft_register_chain pid=3704 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:20:44.039000 audit[3704]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffd46dbf6c0 a2=0 a3=7ffd46dbf6ac items=0 ppid=3515 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:44.039000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:20:44.731122 systemd-networkd[1477]: vxlan.calico: Link UP Oct 2 19:20:44.731132 systemd-networkd[1477]: vxlan.calico: Gained carrier Oct 2 19:20:46.491958 systemd-networkd[1477]: vxlan.calico: Gained IPv6LL Oct 2 19:20:46.496006 env[1334]: time="2023-10-02T19:20:46.493855385Z" level=info msg="StopPodSandbox for \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\"" Oct 2 19:20:46.573856 env[1334]: 2023-10-02 19:20:46.543 [INFO][3742] k8s.go 576: Cleaning up netns ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Oct 2 19:20:46.573856 env[1334]: 2023-10-02 19:20:46.543 [INFO][3742] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" iface="eth0" netns="/var/run/netns/cni-a557a710-c188-51e1-2952-7198b01561c3" Oct 2 19:20:46.573856 env[1334]: 2023-10-02 19:20:46.543 [INFO][3742] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" iface="eth0" netns="/var/run/netns/cni-a557a710-c188-51e1-2952-7198b01561c3" Oct 2 19:20:46.573856 env[1334]: 2023-10-02 19:20:46.543 [INFO][3742] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" iface="eth0" netns="/var/run/netns/cni-a557a710-c188-51e1-2952-7198b01561c3" Oct 2 19:20:46.573856 env[1334]: 2023-10-02 19:20:46.544 [INFO][3742] k8s.go 583: Releasing IP address(es) ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Oct 2 19:20:46.573856 env[1334]: 2023-10-02 19:20:46.544 [INFO][3742] utils.go 196: Calico CNI releasing IP address ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Oct 2 19:20:46.573856 env[1334]: 2023-10-02 19:20:46.564 [INFO][3748] ipam_plugin.go 416: Releasing address using handleID ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" HandleID="k8s-pod-network.b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:46.573856 env[1334]: time="2023-10-02T19:20:46Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:46.573856 env[1334]: time="2023-10-02T19:20:46Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:46.573856 env[1334]: 2023-10-02 19:20:46.570 [WARNING][3748] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" HandleID="k8s-pod-network.b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:46.573856 env[1334]: 2023-10-02 19:20:46.570 [INFO][3748] ipam_plugin.go 444: Releasing address using workloadID ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" HandleID="k8s-pod-network.b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:46.573856 env[1334]: time="2023-10-02T19:20:46Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:46.573856 env[1334]: 2023-10-02 19:20:46.572 [INFO][3742] k8s.go 589: Teardown processing complete. ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Oct 2 19:20:46.576789 systemd[1]: run-netns-cni\x2da557a710\x2dc188\x2d51e1\x2d2952\x2d7198b01561c3.mount: Deactivated successfully. Oct 2 19:20:46.577973 env[1334]: time="2023-10-02T19:20:46.577771035Z" level=info msg="TearDown network for sandbox \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\" successfully" Oct 2 19:20:46.577973 env[1334]: time="2023-10-02T19:20:46.577815934Z" level=info msg="StopPodSandbox for \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\" returns successfully" Oct 2 19:20:46.578610 env[1334]: time="2023-10-02T19:20:46.578578322Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-4l22k,Uid:44ea02cd-dc8a-4428-804a-036431e20b24,Namespace:kube-system,Attempt:1,}" Oct 2 19:20:46.723987 systemd-networkd[1477]: calie9ce1f09f8d: Link UP Oct 2 19:20:46.732710 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie9ce1f09f8d: link becomes ready Oct 2 19:20:46.731300 systemd-networkd[1477]: calie9ce1f09f8d: Gained carrier Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.649 [INFO][3755] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0 coredns-5d78c9869d- kube-system 44ea02cd-dc8a-4428-804a-036431e20b24 705 0 2023-10-02 19:20:06 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-ed15fb6ad9 coredns-5d78c9869d-4l22k eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie9ce1f09f8d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" Namespace="kube-system" Pod="coredns-5d78c9869d-4l22k" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-" Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.649 [INFO][3755] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" Namespace="kube-system" Pod="coredns-5d78c9869d-4l22k" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.674 [INFO][3766] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" HandleID="k8s-pod-network.3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.682 [INFO][3766] ipam_plugin.go 269: Auto assigning IP ContainerID="3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" HandleID="k8s-pod-network.3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010b140), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-ed15fb6ad9", "pod":"coredns-5d78c9869d-4l22k", "timestamp":"2023-10-02 19:20:46.674757575 +0000 UTC"}, Hostname:"ci-3510.3.0-a-ed15fb6ad9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:20:46.748081 env[1334]: time="2023-10-02T19:20:46Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:46.748081 env[1334]: time="2023-10-02T19:20:46Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.683 [INFO][3766] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-ed15fb6ad9' Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.684 [INFO][3766] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.687 [INFO][3766] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.691 [INFO][3766] ipam.go 489: Trying affinity for 192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.693 [INFO][3766] ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.695 [INFO][3766] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.695 [INFO][3766] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.697 [INFO][3766] ipam.go 1682: Creating new handle: k8s-pod-network.3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2 Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.700 [INFO][3766] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.705 [INFO][3766] ipam.go 1216: Successfully claimed IPs: [192.168.32.1/26] block=192.168.32.0/26 handle="k8s-pod-network.3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.705 [INFO][3766] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.1/26] handle="k8s-pod-network.3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:46.748081 env[1334]: time="2023-10-02T19:20:46Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:46.748081 env[1334]: 2023-10-02 19:20:46.706 [INFO][3766] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.32.1/26] IPv6=[] ContainerID="3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" HandleID="k8s-pod-network.3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:46.749013 env[1334]: 2023-10-02 19:20:46.708 [INFO][3755] k8s.go 383: Populated endpoint ContainerID="3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" Namespace="kube-system" Pod="coredns-5d78c9869d-4l22k" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"44ea02cd-dc8a-4428-804a-036431e20b24", ResourceVersion:"705", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"", Pod:"coredns-5d78c9869d-4l22k", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9ce1f09f8d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:46.749013 env[1334]: 2023-10-02 19:20:46.708 [INFO][3755] k8s.go 384: Calico CNI using IPs: [192.168.32.1/32] ContainerID="3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" Namespace="kube-system" Pod="coredns-5d78c9869d-4l22k" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:46.749013 env[1334]: 2023-10-02 19:20:46.708 [INFO][3755] dataplane_linux.go 68: Setting the host side veth name to calie9ce1f09f8d ContainerID="3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" Namespace="kube-system" Pod="coredns-5d78c9869d-4l22k" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:46.749013 env[1334]: 2023-10-02 19:20:46.709 [INFO][3755] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" Namespace="kube-system" Pod="coredns-5d78c9869d-4l22k" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:46.749013 env[1334]: 2023-10-02 19:20:46.731 [INFO][3755] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" Namespace="kube-system" Pod="coredns-5d78c9869d-4l22k" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"44ea02cd-dc8a-4428-804a-036431e20b24", ResourceVersion:"705", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2", Pod:"coredns-5d78c9869d-4l22k", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9ce1f09f8d", MAC:"1e:d0:22:36:bb:73", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:46.749013 env[1334]: 2023-10-02 19:20:46.744 [INFO][3755] k8s.go 489: Wrote updated endpoint to datastore ContainerID="3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2" Namespace="kube-system" Pod="coredns-5d78c9869d-4l22k" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:46.770650 env[1334]: time="2023-10-02T19:20:46.770567634Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:20:46.770810 env[1334]: time="2023-10-02T19:20:46.770660632Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:20:46.770810 env[1334]: time="2023-10-02T19:20:46.770691132Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:20:46.770945 env[1334]: time="2023-10-02T19:20:46.770900828Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2 pid=3794 runtime=io.containerd.runc.v2 Oct 2 19:20:46.791349 systemd[1]: Started cri-containerd-3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2.scope. Oct 2 19:20:46.798000 audit[3816]: NETFILTER_CFG table=filter:105 family=2 entries=36 op=nft_register_chain pid=3816 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:20:46.815824 kernel: kauditd_printk_skb: 151 callbacks suppressed Oct 2 19:20:46.815920 kernel: audit: type=1325 audit(1696274446.798:1171): table=filter:105 family=2 entries=36 op=nft_register_chain pid=3816 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:20:46.798000 audit[3816]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe588d3d70 a2=0 a3=7ffe588d3d5c items=0 ppid=3515 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:46.836845 kernel: audit: type=1300 audit(1696274446.798:1171): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe588d3d70 a2=0 a3=7ffe588d3d5c items=0 ppid=3515 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:46.841679 kernel: audit: type=1327 audit(1696274446.798:1171): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:20:46.798000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:20:46.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.865663 kernel: audit: type=1400 audit(1696274446.819:1172): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.879658 kernel: audit: type=1400 audit(1696274446.819:1173): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.895668 kernel: audit: type=1400 audit(1696274446.819:1174): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.921973 kernel: audit: type=1400 audit(1696274446.820:1175): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.922075 kernel: audit: type=1400 audit(1696274446.820:1176): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.937074 env[1334]: time="2023-10-02T19:20:46.935988173Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-4l22k,Uid:44ea02cd-dc8a-4428-804a-036431e20b24,Namespace:kube-system,Attempt:1,} returns sandbox id \"3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2\"" Oct 2 19:20:46.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.943146 env[1334]: time="2023-10-02T19:20:46.938742128Z" level=info msg="CreateContainer within sandbox \"3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:20:46.950128 kernel: audit: type=1400 audit(1696274446.820:1177): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.950222 kernel: audit: type=1400 audit(1696274446.820:1178): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.848000 audit: BPF prog-id=150 op=LOAD Oct 2 19:20:46.848000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.848000 audit[3804]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3794 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:46.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335393666393933663738353739373434346561623736626239373939 Oct 2 19:20:46.848000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.848000 audit[3804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3794 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:46.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335393666393933663738353739373434346561623736626239373939 Oct 2 19:20:46.848000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.848000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.848000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.848000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.848000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.848000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.848000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.848000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.848000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.848000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.848000 audit: BPF prog-id=151 op=LOAD Oct 2 19:20:46.848000 audit[3804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024c60 items=0 ppid=3794 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:46.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335393666393933663738353739373434346561623736626239373939 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit: BPF prog-id=152 op=LOAD Oct 2 19:20:46.849000 audit[3804]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024ca8 items=0 ppid=3794 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:46.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335393666393933663738353739373434346561623736626239373939 Oct 2 19:20:46.849000 audit: BPF prog-id=152 op=UNLOAD Oct 2 19:20:46.849000 audit: BPF prog-id=151 op=UNLOAD Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { perfmon } for pid=3804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit[3804]: AVC avc: denied { bpf } for pid=3804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:46.849000 audit: BPF prog-id=153 op=LOAD Oct 2 19:20:46.849000 audit[3804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000250b8 items=0 ppid=3794 pid=3804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:46.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335393666393933663738353739373434346561623736626239373939 Oct 2 19:20:46.983701 env[1334]: time="2023-10-02T19:20:46.983622807Z" level=info msg="CreateContainer within sandbox \"3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d1a15668294835efe58b5ee28c98c487c3f9128fc2af8c0c037df57b478b0a0d\"" Oct 2 19:20:46.984436 env[1334]: time="2023-10-02T19:20:46.984389594Z" level=info msg="StartContainer for \"d1a15668294835efe58b5ee28c98c487c3f9128fc2af8c0c037df57b478b0a0d\"" Oct 2 19:20:47.006872 systemd[1]: Started cri-containerd-d1a15668294835efe58b5ee28c98c487c3f9128fc2af8c0c037df57b478b0a0d.scope. Oct 2 19:20:47.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.029000 audit: BPF prog-id=154 op=LOAD Oct 2 19:20:47.030000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.030000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3794 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:47.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431613135363638323934383335656665353862356565323863393863 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3794 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:47.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431613135363638323934383335656665353862356565323863393863 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit: BPF prog-id=155 op=LOAD Oct 2 19:20:47.031000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000311370 items=0 ppid=3794 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:47.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431613135363638323934383335656665353862356565323863393863 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit: BPF prog-id=156 op=LOAD Oct 2 19:20:47.031000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003113b8 items=0 ppid=3794 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:47.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431613135363638323934383335656665353862356565323863393863 Oct 2 19:20:47.031000 audit: BPF prog-id=156 op=UNLOAD Oct 2 19:20:47.031000 audit: BPF prog-id=155 op=UNLOAD Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:47.031000 audit: BPF prog-id=157 op=LOAD Oct 2 19:20:47.031000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003117c8 items=0 ppid=3794 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:47.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431613135363638323934383335656665353862356565323863393863 Oct 2 19:20:47.056608 env[1334]: time="2023-10-02T19:20:47.056557344Z" level=info msg="StartContainer for \"d1a15668294835efe58b5ee28c98c487c3f9128fc2af8c0c037df57b478b0a0d\" returns successfully" Oct 2 19:20:47.494060 env[1334]: time="2023-10-02T19:20:47.494001192Z" level=info msg="StopPodSandbox for \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\"" Oct 2 19:20:47.494587 env[1334]: time="2023-10-02T19:20:47.494541384Z" level=info msg="StopPodSandbox for \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\"" Oct 2 19:20:47.613803 env[1334]: 2023-10-02 19:20:47.552 [INFO][3888] k8s.go 576: Cleaning up netns ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Oct 2 19:20:47.613803 env[1334]: 2023-10-02 19:20:47.552 [INFO][3888] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" iface="eth0" netns="/var/run/netns/cni-d364ea3f-ebad-a59a-5936-3d2fdd649b34" Oct 2 19:20:47.613803 env[1334]: 2023-10-02 19:20:47.557 [INFO][3888] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" iface="eth0" netns="/var/run/netns/cni-d364ea3f-ebad-a59a-5936-3d2fdd649b34" Oct 2 19:20:47.613803 env[1334]: 2023-10-02 19:20:47.557 [INFO][3888] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" iface="eth0" netns="/var/run/netns/cni-d364ea3f-ebad-a59a-5936-3d2fdd649b34" Oct 2 19:20:47.613803 env[1334]: 2023-10-02 19:20:47.557 [INFO][3888] k8s.go 583: Releasing IP address(es) ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Oct 2 19:20:47.613803 env[1334]: 2023-10-02 19:20:47.557 [INFO][3888] utils.go 196: Calico CNI releasing IP address ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Oct 2 19:20:47.613803 env[1334]: 2023-10-02 19:20:47.600 [INFO][3905] ipam_plugin.go 416: Releasing address using handleID ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" HandleID="k8s-pod-network.10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:47.613803 env[1334]: time="2023-10-02T19:20:47Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:47.613803 env[1334]: time="2023-10-02T19:20:47Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:47.613803 env[1334]: 2023-10-02 19:20:47.607 [WARNING][3905] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" HandleID="k8s-pod-network.10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:47.613803 env[1334]: 2023-10-02 19:20:47.607 [INFO][3905] ipam_plugin.go 444: Releasing address using workloadID ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" HandleID="k8s-pod-network.10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:47.613803 env[1334]: time="2023-10-02T19:20:47Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:47.613803 env[1334]: 2023-10-02 19:20:47.611 [INFO][3888] k8s.go 589: Teardown processing complete. ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Oct 2 19:20:47.619406 env[1334]: time="2023-10-02T19:20:47.613950686Z" level=info msg="TearDown network for sandbox \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\" successfully" Oct 2 19:20:47.619406 env[1334]: time="2023-10-02T19:20:47.613996385Z" level=info msg="StopPodSandbox for \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\" returns successfully" Oct 2 19:20:47.619406 env[1334]: time="2023-10-02T19:20:47.614736873Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-x2pls,Uid:07e4babb-712e-4526-b16f-d29ac629ea72,Namespace:kube-system,Attempt:1,}" Oct 2 19:20:47.615898 systemd[1]: run-netns-cni\x2dd364ea3f\x2debad\x2da59a\x2d5936\x2d3d2fdd649b34.mount: Deactivated successfully. Oct 2 19:20:47.634661 env[1334]: 2023-10-02 19:20:47.566 [INFO][3898] k8s.go 576: Cleaning up netns ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Oct 2 19:20:47.634661 env[1334]: 2023-10-02 19:20:47.566 [INFO][3898] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" iface="eth0" netns="/var/run/netns/cni-e00f029c-3489-8b08-7176-3f3f811876da" Oct 2 19:20:47.634661 env[1334]: 2023-10-02 19:20:47.567 [INFO][3898] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" iface="eth0" netns="/var/run/netns/cni-e00f029c-3489-8b08-7176-3f3f811876da" Oct 2 19:20:47.634661 env[1334]: 2023-10-02 19:20:47.567 [INFO][3898] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" iface="eth0" netns="/var/run/netns/cni-e00f029c-3489-8b08-7176-3f3f811876da" Oct 2 19:20:47.634661 env[1334]: 2023-10-02 19:20:47.567 [INFO][3898] k8s.go 583: Releasing IP address(es) ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Oct 2 19:20:47.634661 env[1334]: 2023-10-02 19:20:47.567 [INFO][3898] utils.go 196: Calico CNI releasing IP address ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Oct 2 19:20:47.634661 env[1334]: 2023-10-02 19:20:47.605 [INFO][3910] ipam_plugin.go 416: Releasing address using handleID ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" HandleID="k8s-pod-network.7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:47.634661 env[1334]: time="2023-10-02T19:20:47Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:47.634661 env[1334]: time="2023-10-02T19:20:47Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:47.634661 env[1334]: 2023-10-02 19:20:47.620 [WARNING][3910] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" HandleID="k8s-pod-network.7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:47.634661 env[1334]: 2023-10-02 19:20:47.620 [INFO][3910] ipam_plugin.go 444: Releasing address using workloadID ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" HandleID="k8s-pod-network.7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:47.634661 env[1334]: time="2023-10-02T19:20:47Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:47.634661 env[1334]: 2023-10-02 19:20:47.629 [INFO][3898] k8s.go 589: Teardown processing complete. ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Oct 2 19:20:47.638790 env[1334]: time="2023-10-02T19:20:47.634774355Z" level=info msg="TearDown network for sandbox \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\" successfully" Oct 2 19:20:47.638790 env[1334]: time="2023-10-02T19:20:47.634806755Z" level=info msg="StopPodSandbox for \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\" returns successfully" Oct 2 19:20:47.638790 env[1334]: time="2023-10-02T19:20:47.635424345Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-z7mcb,Uid:24d235ee-0a45-4f8b-b3e3-30fc04938eda,Namespace:calico-system,Attempt:1,}" Oct 2 19:20:47.636490 systemd[1]: run-netns-cni\x2de00f029c\x2d3489\x2d8b08\x2d7176\x2d3f3f811876da.mount: Deactivated successfully. Oct 2 19:20:47.674661 kubelet[2460]: I1002 19:20:47.673680 2460 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-4l22k" podStartSLOduration=41.673619738 podCreationTimestamp="2023-10-02 19:20:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:20:47.673050547 +0000 UTC m=+53.337373294" watchObservedRunningTime="2023-10-02 19:20:47.673619738 +0000 UTC m=+53.337942485" Oct 2 19:20:47.738000 audit[3934]: NETFILTER_CFG table=filter:106 family=2 entries=14 op=nft_register_rule pid=3934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:47.738000 audit[3934]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd666eb4d0 a2=0 a3=7ffd666eb4bc items=0 ppid=2647 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:47.738000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:47.740000 audit[3934]: NETFILTER_CFG table=nat:107 family=2 entries=14 op=nft_register_rule pid=3934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:47.740000 audit[3934]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffd666eb4d0 a2=0 a3=31030 items=0 ppid=2647 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:47.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:47.749000 audit[3941]: NETFILTER_CFG table=filter:108 family=2 entries=11 op=nft_register_rule pid=3941 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:47.749000 audit[3941]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdac4be190 a2=0 a3=7ffdac4be17c items=0 ppid=2647 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:47.749000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:47.751000 audit[3941]: NETFILTER_CFG table=nat:109 family=2 entries=35 op=nft_register_chain pid=3941 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:47.751000 audit[3941]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffdac4be190 a2=0 a3=7ffdac4be17c items=0 ppid=2647 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:47.751000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:47.891479 systemd-networkd[1477]: calie4739dcae76: Link UP Oct 2 19:20:47.899449 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie4739dcae76: link becomes ready Oct 2 19:20:47.899025 systemd-networkd[1477]: calie4739dcae76: Gained carrier Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.779 [INFO][3918] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0 calico-kube-controllers-7bd445fdb4- calico-system 24d235ee-0a45-4f8b-b3e3-30fc04938eda 716 0 2023-10-02 19:20:12 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7bd445fdb4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.0-a-ed15fb6ad9 calico-kube-controllers-7bd445fdb4-z7mcb eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calie4739dcae76 [] []}} ContainerID="db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-z7mcb" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-" Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.779 [INFO][3918] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-z7mcb" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.837 [INFO][3944] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" HandleID="k8s-pod-network.db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.853 [INFO][3944] ipam_plugin.go 269: Auto assigning IP ContainerID="db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" HandleID="k8s-pod-network.db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00053cc10), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-ed15fb6ad9", "pod":"calico-kube-controllers-7bd445fdb4-z7mcb", "timestamp":"2023-10-02 19:20:47.837908827 +0000 UTC"}, Hostname:"ci-3510.3.0-a-ed15fb6ad9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:20:47.917002 env[1334]: time="2023-10-02T19:20:47Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:47.917002 env[1334]: time="2023-10-02T19:20:47Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.854 [INFO][3944] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-ed15fb6ad9' Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.855 [INFO][3944] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.859 [INFO][3944] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.863 [INFO][3944] ipam.go 489: Trying affinity for 192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.867 [INFO][3944] ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.870 [INFO][3944] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.870 [INFO][3944] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.872 [INFO][3944] ipam.go 1682: Creating new handle: k8s-pod-network.db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91 Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.875 [INFO][3944] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.881 [INFO][3944] ipam.go 1216: Successfully claimed IPs: [192.168.32.2/26] block=192.168.32.0/26 handle="k8s-pod-network.db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.882 [INFO][3944] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.2/26] handle="k8s-pod-network.db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.917002 env[1334]: time="2023-10-02T19:20:47Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:47.917002 env[1334]: 2023-10-02 19:20:47.882 [INFO][3944] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.32.2/26] IPv6=[] ContainerID="db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" HandleID="k8s-pod-network.db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:47.918070 env[1334]: 2023-10-02 19:20:47.883 [INFO][3918] k8s.go 383: Populated endpoint ContainerID="db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-z7mcb" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"24d235ee-0a45-4f8b-b3e3-30fc04938eda", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"", Pod:"calico-kube-controllers-7bd445fdb4-z7mcb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie4739dcae76", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:47.918070 env[1334]: 2023-10-02 19:20:47.883 [INFO][3918] k8s.go 384: Calico CNI using IPs: [192.168.32.2/32] ContainerID="db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-z7mcb" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:47.918070 env[1334]: 2023-10-02 19:20:47.883 [INFO][3918] dataplane_linux.go 68: Setting the host side veth name to calie4739dcae76 ContainerID="db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-z7mcb" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:47.918070 env[1334]: 2023-10-02 19:20:47.884 [INFO][3918] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-z7mcb" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:47.918070 env[1334]: 2023-10-02 19:20:47.900 [INFO][3918] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-z7mcb" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"24d235ee-0a45-4f8b-b3e3-30fc04938eda", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91", Pod:"calico-kube-controllers-7bd445fdb4-z7mcb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie4739dcae76", MAC:"32:3b:b4:5c:5b:ee", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:47.918070 env[1334]: 2023-10-02 19:20:47.915 [INFO][3918] k8s.go 489: Wrote updated endpoint to datastore ContainerID="db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-z7mcb" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:47.942433 env[1334]: time="2023-10-02T19:20:47.942069972Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:20:47.942433 env[1334]: time="2023-10-02T19:20:47.942113271Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:20:47.942433 env[1334]: time="2023-10-02T19:20:47.942127671Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:20:47.942433 env[1334]: time="2023-10-02T19:20:47.942310568Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91 pid=3980 runtime=io.containerd.runc.v2 Oct 2 19:20:47.956712 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali56b00238e38: link becomes ready Oct 2 19:20:47.963957 systemd-networkd[1477]: cali56b00238e38: Link UP Oct 2 19:20:47.963966 systemd-networkd[1477]: cali56b00238e38: Gained carrier Oct 2 19:20:47.965690 systemd[1]: Started cri-containerd-db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91.scope. Oct 2 19:20:47.971000 audit[3997]: NETFILTER_CFG table=filter:110 family=2 entries=40 op=nft_register_chain pid=3997 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:20:47.971000 audit[3997]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffde1c58d20 a2=0 a3=7ffde1c58d0c items=0 ppid=3515 pid=3997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:47.971000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.798 [INFO][3923] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0 coredns-5d78c9869d- kube-system 07e4babb-712e-4526-b16f-d29ac629ea72 715 0 2023-10-02 19:20:06 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-ed15fb6ad9 coredns-5d78c9869d-x2pls eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali56b00238e38 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" Namespace="kube-system" Pod="coredns-5d78c9869d-x2pls" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-" Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.799 [INFO][3923] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" Namespace="kube-system" Pod="coredns-5d78c9869d-x2pls" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.863 [INFO][3953] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" HandleID="k8s-pod-network.e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.874 [INFO][3953] ipam_plugin.go 269: Auto assigning IP ContainerID="e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" HandleID="k8s-pod-network.e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000413cf0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-ed15fb6ad9", "pod":"coredns-5d78c9869d-x2pls", "timestamp":"2023-10-02 19:20:47.863400422 +0000 UTC"}, Hostname:"ci-3510.3.0-a-ed15fb6ad9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:20:47.993153 env[1334]: time="2023-10-02T19:20:47Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:47.993153 env[1334]: time="2023-10-02T19:20:47Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.882 [INFO][3953] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-ed15fb6ad9' Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.886 [INFO][3953] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.904 [INFO][3953] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.923 [INFO][3953] ipam.go 489: Trying affinity for 192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.927 [INFO][3953] ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.929 [INFO][3953] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.930 [INFO][3953] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.932 [INFO][3953] ipam.go 1682: Creating new handle: k8s-pod-network.e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96 Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.937 [INFO][3953] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.945 [INFO][3953] ipam.go 1216: Successfully claimed IPs: [192.168.32.3/26] block=192.168.32.0/26 handle="k8s-pod-network.e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.945 [INFO][3953] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.3/26] handle="k8s-pod-network.e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:47.993153 env[1334]: time="2023-10-02T19:20:47Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:47.993153 env[1334]: 2023-10-02 19:20:47.945 [INFO][3953] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.32.3/26] IPv6=[] ContainerID="e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" HandleID="k8s-pod-network.e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:47.994078 env[1334]: 2023-10-02 19:20:47.949 [INFO][3923] k8s.go 383: Populated endpoint ContainerID="e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" Namespace="kube-system" Pod="coredns-5d78c9869d-x2pls" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"07e4babb-712e-4526-b16f-d29ac629ea72", ResourceVersion:"715", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"", Pod:"coredns-5d78c9869d-x2pls", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56b00238e38", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:47.994078 env[1334]: 2023-10-02 19:20:47.949 [INFO][3923] k8s.go 384: Calico CNI using IPs: [192.168.32.3/32] ContainerID="e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" Namespace="kube-system" Pod="coredns-5d78c9869d-x2pls" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:47.994078 env[1334]: 2023-10-02 19:20:47.949 [INFO][3923] dataplane_linux.go 68: Setting the host side veth name to cali56b00238e38 ContainerID="e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" Namespace="kube-system" Pod="coredns-5d78c9869d-x2pls" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:47.994078 env[1334]: 2023-10-02 19:20:47.956 [INFO][3923] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" Namespace="kube-system" Pod="coredns-5d78c9869d-x2pls" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:47.994078 env[1334]: 2023-10-02 19:20:47.968 [INFO][3923] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" Namespace="kube-system" Pod="coredns-5d78c9869d-x2pls" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"07e4babb-712e-4526-b16f-d29ac629ea72", ResourceVersion:"715", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96", Pod:"coredns-5d78c9869d-x2pls", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56b00238e38", MAC:"7a:c3:70:5f:54:34", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:47.994078 env[1334]: 2023-10-02 19:20:47.983 [INFO][3923] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96" Namespace="kube-system" Pod="coredns-5d78c9869d-x2pls" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:48.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.013000 audit: BPF prog-id=158 op=LOAD Oct 2 19:20:48.016000 audit[4026]: NETFILTER_CFG table=filter:111 family=2 entries=40 op=nft_register_chain pid=4026 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:20:48.016000 audit[4026]: SYSCALL arch=c000003e syscall=46 success=yes exit=20752 a0=3 a1=7ffc515ef160 a2=0 a3=7ffc515ef14c items=0 ppid=3515 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.016000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:20:48.020000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.020000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3980 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462326163656139316263376531653037643434313932653937633230 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3980 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462326163656139316263376531653037643434313932653937633230 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit: BPF prog-id=159 op=LOAD Oct 2 19:20:48.021000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000348ec0 items=0 ppid=3980 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462326163656139316263376531653037643434313932653937633230 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit: BPF prog-id=160 op=LOAD Oct 2 19:20:48.021000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000348f08 items=0 ppid=3980 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462326163656139316263376531653037643434313932653937633230 Oct 2 19:20:48.021000 audit: BPF prog-id=160 op=UNLOAD Oct 2 19:20:48.021000 audit: BPF prog-id=159 op=UNLOAD Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.021000 audit: BPF prog-id=161 op=LOAD Oct 2 19:20:48.021000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000349318 items=0 ppid=3980 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462326163656139316263376531653037643434313932653937633230 Oct 2 19:20:48.027305 env[1334]: time="2023-10-02T19:20:48.027236623Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:20:48.027484 env[1334]: time="2023-10-02T19:20:48.027456719Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:20:48.027609 env[1334]: time="2023-10-02T19:20:48.027586717Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:20:48.028011 env[1334]: time="2023-10-02T19:20:48.027965611Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96 pid=4025 runtime=io.containerd.runc.v2 Oct 2 19:20:48.053286 systemd[1]: Started cri-containerd-e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96.scope. Oct 2 19:20:48.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.073000 audit: BPF prog-id=162 op=LOAD Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { bpf } for pid=4038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4025 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539633038633435623533633437646239363438633761323363323966 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4025 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539633038633435623533633437646239363438633761323363323966 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { bpf } for pid=4038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { bpf } for pid=4038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { bpf } for pid=4038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { bpf } for pid=4038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { bpf } for pid=4038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit: BPF prog-id=163 op=LOAD Oct 2 19:20:48.074000 audit[4038]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00030a920 items=0 ppid=4025 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539633038633435623533633437646239363438633761323363323966 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { bpf } for pid=4038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { bpf } for pid=4038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { bpf } for pid=4038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { bpf } for pid=4038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit: BPF prog-id=164 op=LOAD Oct 2 19:20:48.074000 audit[4038]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00030a968 items=0 ppid=4025 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539633038633435623533633437646239363438633761323363323966 Oct 2 19:20:48.074000 audit: BPF prog-id=164 op=UNLOAD Oct 2 19:20:48.074000 audit: BPF prog-id=163 op=UNLOAD Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { bpf } for pid=4038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { bpf } for pid=4038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { bpf } for pid=4038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { perfmon } for pid=4038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { bpf } for pid=4038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit[4038]: AVC avc: denied { bpf } for pid=4038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.074000 audit: BPF prog-id=165 op=LOAD Oct 2 19:20:48.074000 audit[4038]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00030ad78 items=0 ppid=4025 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539633038633435623533633437646239363438633761323363323966 Oct 2 19:20:48.111391 env[1334]: time="2023-10-02T19:20:48.111342602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-z7mcb,Uid:24d235ee-0a45-4f8b-b3e3-30fc04938eda,Namespace:calico-system,Attempt:1,} returns sandbox id \"db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91\"" Oct 2 19:20:48.113697 env[1334]: time="2023-10-02T19:20:48.113620266Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:20:48.121488 env[1334]: time="2023-10-02T19:20:48.121444944Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-x2pls,Uid:07e4babb-712e-4526-b16f-d29ac629ea72,Namespace:kube-system,Attempt:1,} returns sandbox id \"e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96\"" Oct 2 19:20:48.124429 env[1334]: time="2023-10-02T19:20:48.124392997Z" level=info msg="CreateContainer within sandbox \"e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:20:48.163178 env[1334]: time="2023-10-02T19:20:48.163123189Z" level=info msg="CreateContainer within sandbox \"e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7a31906cb6aea395e811ab3d5cd2cbdb8136139916268084bdbd33b77c44b0ba\"" Oct 2 19:20:48.163905 env[1334]: time="2023-10-02T19:20:48.163871477Z" level=info msg="StartContainer for \"7a31906cb6aea395e811ab3d5cd2cbdb8136139916268084bdbd33b77c44b0ba\"" Oct 2 19:20:48.182417 systemd[1]: Started cri-containerd-7a31906cb6aea395e811ab3d5cd2cbdb8136139916268084bdbd33b77c44b0ba.scope. Oct 2 19:20:48.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.195000 audit: BPF prog-id=166 op=LOAD Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=4025 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761333139303663623661656133393565383131616233643563643263 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=4025 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761333139303663623661656133393565383131616233643563643263 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit: BPF prog-id=167 op=LOAD Oct 2 19:20:48.196000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c0002c0b20 items=0 ppid=4025 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761333139303663623661656133393565383131616233643563643263 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit: BPF prog-id=168 op=LOAD Oct 2 19:20:48.196000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0002c0b68 items=0 ppid=4025 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761333139303663623661656133393565383131616233643563643263 Oct 2 19:20:48.196000 audit: BPF prog-id=168 op=UNLOAD Oct 2 19:20:48.196000 audit: BPF prog-id=167 op=UNLOAD Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { perfmon } for pid=4082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit[4082]: AVC avc: denied { bpf } for pid=4082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.196000 audit: BPF prog-id=169 op=LOAD Oct 2 19:20:48.196000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0002c0f78 items=0 ppid=4025 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761333139303663623661656133393565383131616233643563643263 Oct 2 19:20:48.218418 env[1334]: time="2023-10-02T19:20:48.218358522Z" level=info msg="StartContainer for \"7a31906cb6aea395e811ab3d5cd2cbdb8136139916268084bdbd33b77c44b0ba\" returns successfully" Oct 2 19:20:48.347886 systemd-networkd[1477]: calie9ce1f09f8d: Gained IPv6LL Oct 2 19:20:48.495253 env[1334]: time="2023-10-02T19:20:48.495203474Z" level=info msg="StopPodSandbox for \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\"" Oct 2 19:20:48.585004 env[1334]: 2023-10-02 19:20:48.546 [INFO][4126] k8s.go 576: Cleaning up netns ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Oct 2 19:20:48.585004 env[1334]: 2023-10-02 19:20:48.546 [INFO][4126] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" iface="eth0" netns="/var/run/netns/cni-6c9b8e9c-da98-5cb2-e017-ebd2f5bd7266" Oct 2 19:20:48.585004 env[1334]: 2023-10-02 19:20:48.546 [INFO][4126] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" iface="eth0" netns="/var/run/netns/cni-6c9b8e9c-da98-5cb2-e017-ebd2f5bd7266" Oct 2 19:20:48.585004 env[1334]: 2023-10-02 19:20:48.546 [INFO][4126] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" iface="eth0" netns="/var/run/netns/cni-6c9b8e9c-da98-5cb2-e017-ebd2f5bd7266" Oct 2 19:20:48.585004 env[1334]: 2023-10-02 19:20:48.546 [INFO][4126] k8s.go 583: Releasing IP address(es) ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Oct 2 19:20:48.585004 env[1334]: 2023-10-02 19:20:48.546 [INFO][4126] utils.go 196: Calico CNI releasing IP address ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Oct 2 19:20:48.585004 env[1334]: 2023-10-02 19:20:48.567 [INFO][4132] ipam_plugin.go 416: Releasing address using handleID ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" HandleID="k8s-pod-network.a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:48.585004 env[1334]: time="2023-10-02T19:20:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:48.585004 env[1334]: time="2023-10-02T19:20:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:48.585004 env[1334]: 2023-10-02 19:20:48.573 [WARNING][4132] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" HandleID="k8s-pod-network.a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:48.585004 env[1334]: 2023-10-02 19:20:48.573 [INFO][4132] ipam_plugin.go 444: Releasing address using workloadID ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" HandleID="k8s-pod-network.a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:48.585004 env[1334]: time="2023-10-02T19:20:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:48.585004 env[1334]: 2023-10-02 19:20:48.583 [INFO][4126] k8s.go 589: Teardown processing complete. ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Oct 2 19:20:48.589217 env[1334]: time="2023-10-02T19:20:48.587797820Z" level=info msg="TearDown network for sandbox \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\" successfully" Oct 2 19:20:48.589217 env[1334]: time="2023-10-02T19:20:48.587841020Z" level=info msg="StopPodSandbox for \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\" returns successfully" Oct 2 19:20:48.589217 env[1334]: time="2023-10-02T19:20:48.588729206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-j2zbp,Uid:5062268a-0b0e-41ea-a78f-0066e6ad7218,Namespace:calico-system,Attempt:1,}" Oct 2 19:20:48.587702 systemd[1]: run-netns-cni\x2d6c9b8e9c\x2dda98\x2d5cb2\x2de017\x2debd2f5bd7266.mount: Deactivated successfully. Oct 2 19:20:48.672000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:48.672000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026f9c40 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:20:48.672000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:48.672000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:48.672000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002278420 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:20:48.672000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:20:48.712500 kubelet[2460]: I1002 19:20:48.712467 2460 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-x2pls" podStartSLOduration=42.712412463 podCreationTimestamp="2023-10-02 19:20:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:20:48.686843265 +0000 UTC m=+54.351166012" watchObservedRunningTime="2023-10-02 19:20:48.712412463 +0000 UTC m=+54.376735210" Oct 2 19:20:48.764000 audit[4158]: NETFILTER_CFG table=filter:112 family=2 entries=8 op=nft_register_rule pid=4158 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:48.764000 audit[4158]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd0b511d00 a2=0 a3=7ffd0b511cec items=0 ppid=2647 pid=4158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.764000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:48.784000 audit[4158]: NETFILTER_CFG table=nat:113 family=2 entries=56 op=nft_register_chain pid=4158 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:48.784000 audit[4158]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffd0b511d00 a2=0 a3=7ffd0b511cec items=0 ppid=2647 pid=4158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:48.803706 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7990d001693: link becomes ready Oct 2 19:20:48.807966 systemd-networkd[1477]: cali7990d001693: Link UP Oct 2 19:20:48.807975 systemd-networkd[1477]: cali7990d001693: Gained carrier Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.714 [INFO][4138] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0 csi-node-driver- calico-system 5062268a-0b0e-41ea-a78f-0066e6ad7218 739 0 2023-10-02 19:20:32 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:759544bff5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.0-a-ed15fb6ad9 csi-node-driver-j2zbp eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali7990d001693 [] []}} ContainerID="402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" Namespace="calico-system" Pod="csi-node-driver-j2zbp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-" Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.714 [INFO][4138] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" Namespace="calico-system" Pod="csi-node-driver-j2zbp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.759 [INFO][4151] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" HandleID="k8s-pod-network.402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.770 [INFO][4151] ipam_plugin.go 269: Auto assigning IP ContainerID="402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" HandleID="k8s-pod-network.402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00012f1a0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-ed15fb6ad9", "pod":"csi-node-driver-j2zbp", "timestamp":"2023-10-02 19:20:48.75974432 +0000 UTC"}, Hostname:"ci-3510.3.0-a-ed15fb6ad9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:20:48.821178 env[1334]: time="2023-10-02T19:20:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:48.821178 env[1334]: time="2023-10-02T19:20:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.770 [INFO][4151] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-ed15fb6ad9' Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.772 [INFO][4151] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.777 [INFO][4151] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.780 [INFO][4151] ipam.go 489: Trying affinity for 192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.781 [INFO][4151] ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.783 [INFO][4151] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.783 [INFO][4151] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.786 [INFO][4151] ipam.go 1682: Creating new handle: k8s-pod-network.402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6 Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.790 [INFO][4151] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.795 [INFO][4151] ipam.go 1216: Successfully claimed IPs: [192.168.32.4/26] block=192.168.32.0/26 handle="k8s-pod-network.402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.795 [INFO][4151] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.4/26] handle="k8s-pod-network.402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:48.821178 env[1334]: time="2023-10-02T19:20:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:48.821178 env[1334]: 2023-10-02 19:20:48.795 [INFO][4151] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.32.4/26] IPv6=[] ContainerID="402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" HandleID="k8s-pod-network.402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:48.822337 env[1334]: 2023-10-02 19:20:48.796 [INFO][4138] k8s.go 383: Populated endpoint ContainerID="402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" Namespace="calico-system" Pod="csi-node-driver-j2zbp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5062268a-0b0e-41ea-a78f-0066e6ad7218", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"", Pod:"csi-node-driver-j2zbp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.32.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7990d001693", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:48.822337 env[1334]: 2023-10-02 19:20:48.797 [INFO][4138] k8s.go 384: Calico CNI using IPs: [192.168.32.4/32] ContainerID="402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" Namespace="calico-system" Pod="csi-node-driver-j2zbp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:48.822337 env[1334]: 2023-10-02 19:20:48.797 [INFO][4138] dataplane_linux.go 68: Setting the host side veth name to cali7990d001693 ContainerID="402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" Namespace="calico-system" Pod="csi-node-driver-j2zbp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:48.822337 env[1334]: 2023-10-02 19:20:48.803 [INFO][4138] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" Namespace="calico-system" Pod="csi-node-driver-j2zbp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:48.822337 env[1334]: 2023-10-02 19:20:48.808 [INFO][4138] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" Namespace="calico-system" Pod="csi-node-driver-j2zbp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5062268a-0b0e-41ea-a78f-0066e6ad7218", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6", Pod:"csi-node-driver-j2zbp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.32.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7990d001693", MAC:"ce:98:7e:c4:d6:6c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:48.822337 env[1334]: 2023-10-02 19:20:48.817 [INFO][4138] k8s.go 489: Wrote updated endpoint to datastore ContainerID="402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6" Namespace="calico-system" Pod="csi-node-driver-j2zbp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:48.843953 env[1334]: time="2023-10-02T19:20:48.843880999Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:20:48.844179 env[1334]: time="2023-10-02T19:20:48.844140895Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:20:48.844317 env[1334]: time="2023-10-02T19:20:48.844290592Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:20:48.844701 env[1334]: time="2023-10-02T19:20:48.844624987Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6 pid=4182 runtime=io.containerd.runc.v2 Oct 2 19:20:48.871819 systemd[1]: Started cri-containerd-402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6.scope. Oct 2 19:20:48.884000 audit[4204]: NETFILTER_CFG table=filter:114 family=2 entries=38 op=nft_register_chain pid=4204 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:20:48.884000 audit[4204]: SYSCALL arch=c000003e syscall=46 success=yes exit=19492 a0=3 a1=7fff702a06c0 a2=0 a3=7fff702a06ac items=0 ppid=3515 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.884000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:20:48.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.890000 audit: BPF prog-id=170 op=LOAD Oct 2 19:20:48.891000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.891000 audit[4194]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4182 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326363626635353135643332333837363438366161636134313033 Oct 2 19:20:48.891000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.891000 audit[4194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4182 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326363626635353135643332333837363438366161636134313033 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit: BPF prog-id=171 op=LOAD Oct 2 19:20:48.892000 audit[4194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185910 items=0 ppid=4182 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326363626635353135643332333837363438366161636134313033 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.892000 audit: BPF prog-id=172 op=LOAD Oct 2 19:20:48.892000 audit[4194]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185958 items=0 ppid=4182 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326363626635353135643332333837363438366161636134313033 Oct 2 19:20:48.893000 audit: BPF prog-id=172 op=UNLOAD Oct 2 19:20:48.893000 audit: BPF prog-id=171 op=UNLOAD Oct 2 19:20:48.893000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.893000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.893000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.893000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.893000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.893000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.893000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.893000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.893000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.893000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:48.893000 audit: BPF prog-id=173 op=LOAD Oct 2 19:20:48.893000 audit[4194]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185d68 items=0 ppid=4182 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:48.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326363626635353135643332333837363438366161636134313033 Oct 2 19:20:48.907707 env[1334]: time="2023-10-02T19:20:48.907662797Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-j2zbp,Uid:5062268a-0b0e-41ea-a78f-0066e6ad7218,Namespace:calico-system,Attempt:1,} returns sandbox id \"402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6\"" Oct 2 19:20:49.661000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:49.661000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:49.661000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00a1ae4b0 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:20:49.661000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:20:49.661000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00e3c95e0 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:20:49.661000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:20:49.667000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6887 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:49.667000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00a1ae540 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:20:49.667000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:20:49.755993 systemd-networkd[1477]: calie4739dcae76: Gained IPv6LL Oct 2 19:20:49.756355 systemd-networkd[1477]: cali56b00238e38: Gained IPv6LL Oct 2 19:20:49.759000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6893 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:49.759000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00a1ae6f0 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:20:49.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:20:49.766000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:49.766000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:20:49.766000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00e958fc0 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:20:49.766000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:20:49.766000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00a053800 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:20:49.766000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:20:49.794000 audit[4220]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=4220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:49.794000 audit[4220]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd61fe24f0 a2=0 a3=7ffd61fe24dc items=0 ppid=2647 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:49.794000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:49.795000 audit[4220]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:49.795000 audit[4220]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd61fe24f0 a2=0 a3=7ffd61fe24dc items=0 ppid=2647 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:49.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:50.037270 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1858238035.mount: Deactivated successfully. Oct 2 19:20:50.139832 systemd-networkd[1477]: cali7990d001693: Gained IPv6LL Oct 2 19:20:52.769756 env[1334]: time="2023-10-02T19:20:52.769681857Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:52.777166 env[1334]: time="2023-10-02T19:20:52.777123245Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:52.780975 env[1334]: time="2023-10-02T19:20:52.780934388Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:52.786023 env[1334]: time="2023-10-02T19:20:52.785991412Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:20:52.786740 env[1334]: time="2023-10-02T19:20:52.786706601Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 19:20:52.789231 env[1334]: time="2023-10-02T19:20:52.789200864Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:20:52.790227 env[1334]: time="2023-10-02T19:20:52.790192049Z" level=info msg="CreateContainer within sandbox \"db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:20:52.821487 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4196786330.mount: Deactivated successfully. Oct 2 19:20:52.831671 env[1334]: time="2023-10-02T19:20:52.831611927Z" level=info msg="CreateContainer within sandbox \"db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc\"" Oct 2 19:20:52.834043 env[1334]: time="2023-10-02T19:20:52.832456814Z" level=info msg="StartContainer for \"38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc\"" Oct 2 19:20:52.862920 systemd[1]: Started cri-containerd-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc.scope. Oct 2 19:20:52.881172 kernel: kauditd_printk_skb: 392 callbacks suppressed Oct 2 19:20:52.881265 kernel: audit: type=1400 audit(1696274452.874:1299): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.920863 kernel: audit: type=1400 audit(1696274452.874:1300): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.920959 kernel: audit: type=1400 audit(1696274452.874:1301): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.932707 kernel: audit: type=1400 audit(1696274452.874:1302): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.944924 kernel: audit: type=1400 audit(1696274452.874:1303): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.944986 kernel: audit: type=1400 audit(1696274452.874:1304): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.959608 kernel: audit: type=1400 audit(1696274452.874:1305): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.999261 kernel: audit: type=1400 audit(1696274452.874:1306): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.999370 kernel: audit: type=1400 audit(1696274452.874:1307): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:53.012540 env[1334]: time="2023-10-02T19:20:53.012486615Z" level=info msg="StartContainer for \"38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc\" returns successfully" Oct 2 19:20:53.012676 kernel: audit: type=1400 audit(1696274452.880:1308): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.880000 audit: BPF prog-id=174 op=LOAD Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3980 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:52.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663963373339323361393931313961636261336131636530656364 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3980 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:52.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663963373339323361393931313961636261336131636530656364 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit: BPF prog-id=175 op=LOAD Oct 2 19:20:52.893000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00028e360 items=0 ppid=3980 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:52.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663963373339323361393931313961636261336131636530656364 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit: BPF prog-id=176 op=LOAD Oct 2 19:20:52.893000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00028e3a8 items=0 ppid=3980 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:52.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663963373339323361393931313961636261336131636530656364 Oct 2 19:20:52.893000 audit: BPF prog-id=176 op=UNLOAD Oct 2 19:20:52.893000 audit: BPF prog-id=175 op=UNLOAD Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:52.893000 audit: BPF prog-id=177 op=LOAD Oct 2 19:20:52.893000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00028e7b8 items=0 ppid=3980 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:52.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663963373339323361393931313961636261336131636530656364 Oct 2 19:20:53.101840 env[1334]: time="2023-10-02T19:20:53.101779989Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:20:53.107574 env[1334]: time="2023-10-02T19:20:53.107498104Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:20:53.108127 kubelet[2460]: E1002 19:20:53.108096 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:20:53.108699 kubelet[2460]: E1002 19:20:53.108157 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:20:53.108784 kubelet[2460]: E1002 19:20:53.108385 2460 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-2h674,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-j2zbp_calico-system(5062268a-0b0e-41ea-a78f-0066e6ad7218): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:20:53.114424 env[1334]: time="2023-10-02T19:20:53.114393902Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:20:53.437769 env[1334]: time="2023-10-02T19:20:53.437593203Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:20:53.443938 env[1334]: time="2023-10-02T19:20:53.443222320Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:20:53.445824 kubelet[2460]: E1002 19:20:53.445798 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:20:53.445989 kubelet[2460]: E1002 19:20:53.445845 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:20:53.445989 kubelet[2460]: E1002 19:20:53.445964 2460 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-2h674,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-j2zbp_calico-system(5062268a-0b0e-41ea-a78f-0066e6ad7218): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:20:53.446172 kubelet[2460]: E1002 19:20:53.446034 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:20:53.685963 kubelet[2460]: E1002 19:20:53.685922 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:20:53.722084 kubelet[2460]: I1002 19:20:53.721683 2460 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7bd445fdb4-z7mcb" podStartSLOduration=37.047512068 podCreationTimestamp="2023-10-02 19:20:12 +0000 UTC" firstStartedPulling="2023-10-02 19:20:48.113013676 +0000 UTC m=+53.777336423" lastFinishedPulling="2023-10-02 19:20:52.787116695 +0000 UTC m=+58.451439442" observedRunningTime="2023-10-02 19:20:53.706433712 +0000 UTC m=+59.370756459" watchObservedRunningTime="2023-10-02 19:20:53.721615087 +0000 UTC m=+59.385937734" Oct 2 19:20:53.817769 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.FLbP3h.mount: Deactivated successfully. Oct 2 19:20:54.485303 env[1334]: time="2023-10-02T19:20:54.485259925Z" level=info msg="StopPodSandbox for \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\"" Oct 2 19:20:54.560153 env[1334]: 2023-10-02 19:20:54.524 [WARNING][4324] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"24d235ee-0a45-4f8b-b3e3-30fc04938eda", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91", Pod:"calico-kube-controllers-7bd445fdb4-z7mcb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie4739dcae76", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:54.560153 env[1334]: 2023-10-02 19:20:54.524 [INFO][4324] k8s.go 576: Cleaning up netns ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Oct 2 19:20:54.560153 env[1334]: 2023-10-02 19:20:54.524 [INFO][4324] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" iface="eth0" netns="" Oct 2 19:20:54.560153 env[1334]: 2023-10-02 19:20:54.525 [INFO][4324] k8s.go 583: Releasing IP address(es) ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Oct 2 19:20:54.560153 env[1334]: 2023-10-02 19:20:54.525 [INFO][4324] utils.go 196: Calico CNI releasing IP address ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Oct 2 19:20:54.560153 env[1334]: 2023-10-02 19:20:54.549 [INFO][4332] ipam_plugin.go 416: Releasing address using handleID ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" HandleID="k8s-pod-network.7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:54.560153 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:54.560153 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:54.560153 env[1334]: 2023-10-02 19:20:54.556 [WARNING][4332] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" HandleID="k8s-pod-network.7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:54.560153 env[1334]: 2023-10-02 19:20:54.557 [INFO][4332] ipam_plugin.go 444: Releasing address using workloadID ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" HandleID="k8s-pod-network.7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:54.560153 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:54.560153 env[1334]: 2023-10-02 19:20:54.559 [INFO][4324] k8s.go 589: Teardown processing complete. ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Oct 2 19:20:54.560755 env[1334]: time="2023-10-02T19:20:54.560179824Z" level=info msg="TearDown network for sandbox \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\" successfully" Oct 2 19:20:54.560755 env[1334]: time="2023-10-02T19:20:54.560213924Z" level=info msg="StopPodSandbox for \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\" returns successfully" Oct 2 19:20:54.561051 env[1334]: time="2023-10-02T19:20:54.561018012Z" level=info msg="RemovePodSandbox for \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\"" Oct 2 19:20:54.561291 env[1334]: time="2023-10-02T19:20:54.561216409Z" level=info msg="Forcibly stopping sandbox \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\"" Oct 2 19:20:54.626855 env[1334]: 2023-10-02 19:20:54.595 [WARNING][4350] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"24d235ee-0a45-4f8b-b3e3-30fc04938eda", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"db2acea91bc7e1e07d44192e97c20815d45688f56738250a85771c4cf92b8a91", Pod:"calico-kube-controllers-7bd445fdb4-z7mcb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie4739dcae76", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:54.626855 env[1334]: 2023-10-02 19:20:54.595 [INFO][4350] k8s.go 576: Cleaning up netns ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Oct 2 19:20:54.626855 env[1334]: 2023-10-02 19:20:54.595 [INFO][4350] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" iface="eth0" netns="" Oct 2 19:20:54.626855 env[1334]: 2023-10-02 19:20:54.595 [INFO][4350] k8s.go 583: Releasing IP address(es) ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Oct 2 19:20:54.626855 env[1334]: 2023-10-02 19:20:54.595 [INFO][4350] utils.go 196: Calico CNI releasing IP address ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Oct 2 19:20:54.626855 env[1334]: 2023-10-02 19:20:54.617 [INFO][4356] ipam_plugin.go 416: Releasing address using handleID ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" HandleID="k8s-pod-network.7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:54.626855 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:54.626855 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:54.626855 env[1334]: 2023-10-02 19:20:54.623 [WARNING][4356] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" HandleID="k8s-pod-network.7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:54.626855 env[1334]: 2023-10-02 19:20:54.623 [INFO][4356] ipam_plugin.go 444: Releasing address using workloadID ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" HandleID="k8s-pod-network.7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--kube--controllers--7bd445fdb4--z7mcb-eth0" Oct 2 19:20:54.626855 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:54.626855 env[1334]: 2023-10-02 19:20:54.625 [INFO][4350] k8s.go 589: Teardown processing complete. ContainerID="7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa" Oct 2 19:20:54.627580 env[1334]: time="2023-10-02T19:20:54.626890544Z" level=info msg="TearDown network for sandbox \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\" successfully" Oct 2 19:20:54.635401 env[1334]: time="2023-10-02T19:20:54.635352620Z" level=info msg="RemovePodSandbox \"7fb91e73e2aa6f5bc29cf639fb0acddaaf7b97f31cdcd2b2e6c4b582c63e5faa\" returns successfully" Oct 2 19:20:54.636976 env[1334]: time="2023-10-02T19:20:54.636930897Z" level=info msg="StopPodSandbox for \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\"" Oct 2 19:20:54.710785 env[1334]: 2023-10-02 19:20:54.681 [WARNING][4374] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"07e4babb-712e-4526-b16f-d29ac629ea72", ResourceVersion:"743", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96", Pod:"coredns-5d78c9869d-x2pls", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56b00238e38", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:54.710785 env[1334]: 2023-10-02 19:20:54.681 [INFO][4374] k8s.go 576: Cleaning up netns ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Oct 2 19:20:54.710785 env[1334]: 2023-10-02 19:20:54.681 [INFO][4374] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" iface="eth0" netns="" Oct 2 19:20:54.710785 env[1334]: 2023-10-02 19:20:54.681 [INFO][4374] k8s.go 583: Releasing IP address(es) ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Oct 2 19:20:54.710785 env[1334]: 2023-10-02 19:20:54.681 [INFO][4374] utils.go 196: Calico CNI releasing IP address ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Oct 2 19:20:54.710785 env[1334]: 2023-10-02 19:20:54.702 [INFO][4381] ipam_plugin.go 416: Releasing address using handleID ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" HandleID="k8s-pod-network.10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:54.710785 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:54.710785 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:54.710785 env[1334]: 2023-10-02 19:20:54.707 [WARNING][4381] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" HandleID="k8s-pod-network.10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:54.710785 env[1334]: 2023-10-02 19:20:54.707 [INFO][4381] ipam_plugin.go 444: Releasing address using workloadID ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" HandleID="k8s-pod-network.10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:54.710785 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:54.710785 env[1334]: 2023-10-02 19:20:54.709 [INFO][4374] k8s.go 589: Teardown processing complete. ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Oct 2 19:20:54.711424 env[1334]: time="2023-10-02T19:20:54.711380703Z" level=info msg="TearDown network for sandbox \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\" successfully" Oct 2 19:20:54.711514 env[1334]: time="2023-10-02T19:20:54.711421403Z" level=info msg="StopPodSandbox for \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\" returns successfully" Oct 2 19:20:54.711973 env[1334]: time="2023-10-02T19:20:54.711942095Z" level=info msg="RemovePodSandbox for \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\"" Oct 2 19:20:54.712087 env[1334]: time="2023-10-02T19:20:54.711977294Z" level=info msg="Forcibly stopping sandbox \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\"" Oct 2 19:20:54.773688 env[1334]: 2023-10-02 19:20:54.743 [WARNING][4400] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"07e4babb-712e-4526-b16f-d29ac629ea72", ResourceVersion:"743", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"e9c08c45b53c47db9648c7a23c29ffbc8a017d796b4356bfae4d13554dcf6e96", Pod:"coredns-5d78c9869d-x2pls", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali56b00238e38", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:54.773688 env[1334]: 2023-10-02 19:20:54.743 [INFO][4400] k8s.go 576: Cleaning up netns ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Oct 2 19:20:54.773688 env[1334]: 2023-10-02 19:20:54.743 [INFO][4400] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" iface="eth0" netns="" Oct 2 19:20:54.773688 env[1334]: 2023-10-02 19:20:54.743 [INFO][4400] k8s.go 583: Releasing IP address(es) ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Oct 2 19:20:54.773688 env[1334]: 2023-10-02 19:20:54.743 [INFO][4400] utils.go 196: Calico CNI releasing IP address ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Oct 2 19:20:54.773688 env[1334]: 2023-10-02 19:20:54.764 [INFO][4406] ipam_plugin.go 416: Releasing address using handleID ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" HandleID="k8s-pod-network.10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:54.773688 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:54.773688 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:54.773688 env[1334]: 2023-10-02 19:20:54.770 [WARNING][4406] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" HandleID="k8s-pod-network.10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:54.773688 env[1334]: 2023-10-02 19:20:54.770 [INFO][4406] ipam_plugin.go 444: Releasing address using workloadID ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" HandleID="k8s-pod-network.10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--x2pls-eth0" Oct 2 19:20:54.773688 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:54.773688 env[1334]: 2023-10-02 19:20:54.772 [INFO][4400] k8s.go 589: Teardown processing complete. ContainerID="10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63" Oct 2 19:20:54.775459 env[1334]: time="2023-10-02T19:20:54.773654388Z" level=info msg="TearDown network for sandbox \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\" successfully" Oct 2 19:20:54.784263 env[1334]: time="2023-10-02T19:20:54.784224333Z" level=info msg="RemovePodSandbox \"10515af64c09130e957377b9d5dde2469680a13e240ca8158b1fa3d1ff153b63\" returns successfully" Oct 2 19:20:54.784779 env[1334]: time="2023-10-02T19:20:54.784746725Z" level=info msg="StopPodSandbox for \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\"" Oct 2 19:20:54.847606 env[1334]: 2023-10-02 19:20:54.816 [WARNING][4424] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5062268a-0b0e-41ea-a78f-0066e6ad7218", ResourceVersion:"782", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6", Pod:"csi-node-driver-j2zbp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.32.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7990d001693", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:54.847606 env[1334]: 2023-10-02 19:20:54.817 [INFO][4424] k8s.go 576: Cleaning up netns ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Oct 2 19:20:54.847606 env[1334]: 2023-10-02 19:20:54.817 [INFO][4424] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" iface="eth0" netns="" Oct 2 19:20:54.847606 env[1334]: 2023-10-02 19:20:54.817 [INFO][4424] k8s.go 583: Releasing IP address(es) ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Oct 2 19:20:54.847606 env[1334]: 2023-10-02 19:20:54.817 [INFO][4424] utils.go 196: Calico CNI releasing IP address ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Oct 2 19:20:54.847606 env[1334]: 2023-10-02 19:20:54.836 [INFO][4430] ipam_plugin.go 416: Releasing address using handleID ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" HandleID="k8s-pod-network.a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:54.847606 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:54.847606 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:54.847606 env[1334]: 2023-10-02 19:20:54.844 [WARNING][4430] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" HandleID="k8s-pod-network.a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:54.847606 env[1334]: 2023-10-02 19:20:54.844 [INFO][4430] ipam_plugin.go 444: Releasing address using workloadID ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" HandleID="k8s-pod-network.a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:54.847606 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:54.847606 env[1334]: 2023-10-02 19:20:54.846 [INFO][4424] k8s.go 589: Teardown processing complete. ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Oct 2 19:20:54.848252 env[1334]: time="2023-10-02T19:20:54.848210693Z" level=info msg="TearDown network for sandbox \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\" successfully" Oct 2 19:20:54.848252 env[1334]: time="2023-10-02T19:20:54.848245093Z" level=info msg="StopPodSandbox for \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\" returns successfully" Oct 2 19:20:54.848805 env[1334]: time="2023-10-02T19:20:54.848751585Z" level=info msg="RemovePodSandbox for \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\"" Oct 2 19:20:54.848925 env[1334]: time="2023-10-02T19:20:54.848813984Z" level=info msg="Forcibly stopping sandbox \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\"" Oct 2 19:20:54.911254 env[1334]: 2023-10-02 19:20:54.880 [WARNING][4448] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5062268a-0b0e-41ea-a78f-0066e6ad7218", ResourceVersion:"782", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"402ccbf5515d323876486aaca4103168698a63289c8c1815693599bc7dc311d6", Pod:"csi-node-driver-j2zbp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.32.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7990d001693", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:54.911254 env[1334]: 2023-10-02 19:20:54.880 [INFO][4448] k8s.go 576: Cleaning up netns ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Oct 2 19:20:54.911254 env[1334]: 2023-10-02 19:20:54.880 [INFO][4448] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" iface="eth0" netns="" Oct 2 19:20:54.911254 env[1334]: 2023-10-02 19:20:54.880 [INFO][4448] k8s.go 583: Releasing IP address(es) ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Oct 2 19:20:54.911254 env[1334]: 2023-10-02 19:20:54.880 [INFO][4448] utils.go 196: Calico CNI releasing IP address ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Oct 2 19:20:54.911254 env[1334]: 2023-10-02 19:20:54.901 [INFO][4454] ipam_plugin.go 416: Releasing address using handleID ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" HandleID="k8s-pod-network.a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:54.911254 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:54.911254 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:54.911254 env[1334]: 2023-10-02 19:20:54.907 [WARNING][4454] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" HandleID="k8s-pod-network.a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:54.911254 env[1334]: 2023-10-02 19:20:54.907 [INFO][4454] ipam_plugin.go 444: Releasing address using workloadID ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" HandleID="k8s-pod-network.a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-csi--node--driver--j2zbp-eth0" Oct 2 19:20:54.911254 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:54.911254 env[1334]: 2023-10-02 19:20:54.909 [INFO][4448] k8s.go 589: Teardown processing complete. ContainerID="a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c" Oct 2 19:20:54.911254 env[1334]: time="2023-10-02T19:20:54.910812773Z" level=info msg="TearDown network for sandbox \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\" successfully" Oct 2 19:20:54.918340 env[1334]: time="2023-10-02T19:20:54.918295364Z" level=info msg="RemovePodSandbox \"a4d7856b91fea33ae32f86b638e7df8be1a182bb693dd6ee836db869d4c6090c\" returns successfully" Oct 2 19:20:54.918839 env[1334]: time="2023-10-02T19:20:54.918808256Z" level=info msg="StopPodSandbox for \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\"" Oct 2 19:20:54.979280 env[1334]: 2023-10-02 19:20:54.951 [WARNING][4472] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"44ea02cd-dc8a-4428-804a-036431e20b24", ResourceVersion:"720", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2", Pod:"coredns-5d78c9869d-4l22k", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9ce1f09f8d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:54.979280 env[1334]: 2023-10-02 19:20:54.951 [INFO][4472] k8s.go 576: Cleaning up netns ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Oct 2 19:20:54.979280 env[1334]: 2023-10-02 19:20:54.951 [INFO][4472] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" iface="eth0" netns="" Oct 2 19:20:54.979280 env[1334]: 2023-10-02 19:20:54.951 [INFO][4472] k8s.go 583: Releasing IP address(es) ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Oct 2 19:20:54.979280 env[1334]: 2023-10-02 19:20:54.951 [INFO][4472] utils.go 196: Calico CNI releasing IP address ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Oct 2 19:20:54.979280 env[1334]: 2023-10-02 19:20:54.970 [INFO][4478] ipam_plugin.go 416: Releasing address using handleID ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" HandleID="k8s-pod-network.b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:54.979280 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:54.979280 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:54.979280 env[1334]: 2023-10-02 19:20:54.976 [WARNING][4478] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" HandleID="k8s-pod-network.b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:54.979280 env[1334]: 2023-10-02 19:20:54.976 [INFO][4478] ipam_plugin.go 444: Releasing address using workloadID ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" HandleID="k8s-pod-network.b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:54.979280 env[1334]: time="2023-10-02T19:20:54Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:54.979280 env[1334]: 2023-10-02 19:20:54.978 [INFO][4472] k8s.go 589: Teardown processing complete. ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Oct 2 19:20:54.979851 env[1334]: time="2023-10-02T19:20:54.979321367Z" level=info msg="TearDown network for sandbox \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\" successfully" Oct 2 19:20:54.979851 env[1334]: time="2023-10-02T19:20:54.979357667Z" level=info msg="StopPodSandbox for \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\" returns successfully" Oct 2 19:20:54.980414 env[1334]: time="2023-10-02T19:20:54.980381251Z" level=info msg="RemovePodSandbox for \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\"" Oct 2 19:20:54.980526 env[1334]: time="2023-10-02T19:20:54.980418851Z" level=info msg="Forcibly stopping sandbox \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\"" Oct 2 19:20:55.047224 env[1334]: 2023-10-02 19:20:55.014 [WARNING][4497] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"44ea02cd-dc8a-4428-804a-036431e20b24", ResourceVersion:"720", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"3596f993f785797444eab76bb97990efda8a68fa00a821560a6f85b99af14aa2", Pod:"coredns-5d78c9869d-4l22k", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9ce1f09f8d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:55.047224 env[1334]: 2023-10-02 19:20:55.014 [INFO][4497] k8s.go 576: Cleaning up netns ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Oct 2 19:20:55.047224 env[1334]: 2023-10-02 19:20:55.014 [INFO][4497] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" iface="eth0" netns="" Oct 2 19:20:55.047224 env[1334]: 2023-10-02 19:20:55.014 [INFO][4497] k8s.go 583: Releasing IP address(es) ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Oct 2 19:20:55.047224 env[1334]: 2023-10-02 19:20:55.014 [INFO][4497] utils.go 196: Calico CNI releasing IP address ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Oct 2 19:20:55.047224 env[1334]: 2023-10-02 19:20:55.037 [INFO][4503] ipam_plugin.go 416: Releasing address using handleID ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" HandleID="k8s-pod-network.b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:55.047224 env[1334]: time="2023-10-02T19:20:55Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:55.047224 env[1334]: time="2023-10-02T19:20:55Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:55.047224 env[1334]: 2023-10-02 19:20:55.043 [WARNING][4503] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" HandleID="k8s-pod-network.b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:55.047224 env[1334]: 2023-10-02 19:20:55.043 [INFO][4503] ipam_plugin.go 444: Releasing address using workloadID ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" HandleID="k8s-pod-network.b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-coredns--5d78c9869d--4l22k-eth0" Oct 2 19:20:55.047224 env[1334]: time="2023-10-02T19:20:55Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:55.047224 env[1334]: 2023-10-02 19:20:55.046 [INFO][4497] k8s.go 589: Teardown processing complete. ContainerID="b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6" Oct 2 19:20:55.047935 env[1334]: time="2023-10-02T19:20:55.047266276Z" level=info msg="TearDown network for sandbox \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\" successfully" Oct 2 19:20:55.078003 env[1334]: time="2023-10-02T19:20:55.077943730Z" level=info msg="RemovePodSandbox \"b87e94989fe46cc34db06cc59d5586d4e1829e611f5dc3e32cd85935ba370eb6\" returns successfully" Oct 2 19:20:57.165236 kubelet[2460]: I1002 19:20:57.165195 2460 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:20:57.172450 systemd[1]: Created slice kubepods-besteffort-pod6a359fc6_593a_402b_bdd8_bb29d5a8560e.slice. Oct 2 19:20:57.177631 kubelet[2460]: W1002 19:20:57.177607 2460 reflector.go:533] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.0-a-ed15fb6ad9" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.0-a-ed15fb6ad9' and this object Oct 2 19:20:57.177861 kubelet[2460]: E1002 19:20:57.177845 2460 reflector.go:148] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.0-a-ed15fb6ad9" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.0-a-ed15fb6ad9' and this object Oct 2 19:20:57.191453 kubelet[2460]: I1002 19:20:57.191419 2460 topology_manager.go:212] "Topology Admit Handler" Oct 2 19:20:57.197421 systemd[1]: Created slice kubepods-besteffort-pod8e4f34af_ccb8_43ab_8b95_270c1edaea43.slice. Oct 2 19:20:57.221000 audit[4512]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:57.221000 audit[4512]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc915f8df0 a2=0 a3=7ffc915f8ddc items=0 ppid=2647 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.221000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:57.225000 audit[4512]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:57.225000 audit[4512]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc915f8df0 a2=0 a3=7ffc915f8ddc items=0 ppid=2647 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.225000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:57.245000 audit[4514]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:57.245000 audit[4514]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffcd2d04130 a2=0 a3=7ffcd2d0411c items=0 ppid=2647 pid=4514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.245000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:57.246000 audit[4514]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:57.246000 audit[4514]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffcd2d04130 a2=0 a3=7ffcd2d0411c items=0 ppid=2647 pid=4514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:57.246000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:57.313485 kubelet[2460]: I1002 19:20:57.313436 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h9ddq\" (UniqueName: \"kubernetes.io/projected/6a359fc6-593a-402b-bdd8-bb29d5a8560e-kube-api-access-h9ddq\") pod \"calico-apiserver-75c8955f5f-wcclp\" (UID: \"6a359fc6-593a-402b-bdd8-bb29d5a8560e\") " pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" Oct 2 19:20:57.313485 kubelet[2460]: I1002 19:20:57.313495 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5rbm4\" (UniqueName: \"kubernetes.io/projected/8e4f34af-ccb8-43ab-8b95-270c1edaea43-kube-api-access-5rbm4\") pod \"calico-apiserver-75c8955f5f-kpr4m\" (UID: \"8e4f34af-ccb8-43ab-8b95-270c1edaea43\") " pod="calico-apiserver/calico-apiserver-75c8955f5f-kpr4m" Oct 2 19:20:57.313775 kubelet[2460]: I1002 19:20:57.313537 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/6a359fc6-593a-402b-bdd8-bb29d5a8560e-calico-apiserver-certs\") pod \"calico-apiserver-75c8955f5f-wcclp\" (UID: \"6a359fc6-593a-402b-bdd8-bb29d5a8560e\") " pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" Oct 2 19:20:57.313775 kubelet[2460]: I1002 19:20:57.313561 2460 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8e4f34af-ccb8-43ab-8b95-270c1edaea43-calico-apiserver-certs\") pod \"calico-apiserver-75c8955f5f-kpr4m\" (UID: \"8e4f34af-ccb8-43ab-8b95-270c1edaea43\") " pod="calico-apiserver/calico-apiserver-75c8955f5f-kpr4m" Oct 2 19:20:58.076400 env[1334]: time="2023-10-02T19:20:58.076014105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75c8955f5f-wcclp,Uid:6a359fc6-593a-402b-bdd8-bb29d5a8560e,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:20:58.108456 env[1334]: time="2023-10-02T19:20:58.108331149Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75c8955f5f-kpr4m,Uid:8e4f34af-ccb8-43ab-8b95-270c1edaea43,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:20:58.256925 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:20:58.257083 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0072fda8bbf: link becomes ready Oct 2 19:20:58.271120 systemd-networkd[1477]: cali0072fda8bbf: Link UP Oct 2 19:20:58.271130 systemd-networkd[1477]: cali0072fda8bbf: Gained carrier Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.150 [INFO][4519] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--wcclp-eth0 calico-apiserver-75c8955f5f- calico-apiserver 6a359fc6-593a-402b-bdd8-bb29d5a8560e 835 0 2023-10-02 19:20:57 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75c8955f5f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-ed15fb6ad9 calico-apiserver-75c8955f5f-wcclp eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0072fda8bbf [] []}} ContainerID="c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-wcclp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--wcclp-" Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.151 [INFO][4519] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-wcclp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--wcclp-eth0" Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.203 [INFO][4542] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" HandleID="k8s-pod-network.c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--wcclp-eth0" Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.212 [INFO][4542] ipam_plugin.go 269: Auto assigning IP ContainerID="c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" HandleID="k8s-pod-network.c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--wcclp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001203e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-ed15fb6ad9", "pod":"calico-apiserver-75c8955f5f-wcclp", "timestamp":"2023-10-02 19:20:58.203457406 +0000 UTC"}, Hostname:"ci-3510.3.0-a-ed15fb6ad9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:20:58.292000 env[1334]: time="2023-10-02T19:20:58Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:58.292000 env[1334]: time="2023-10-02T19:20:58Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.212 [INFO][4542] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-ed15fb6ad9' Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.214 [INFO][4542] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.218 [INFO][4542] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.221 [INFO][4542] ipam.go 489: Trying affinity for 192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.223 [INFO][4542] ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.225 [INFO][4542] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.225 [INFO][4542] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.227 [INFO][4542] ipam.go 1682: Creating new handle: k8s-pod-network.c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914 Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.231 [INFO][4542] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.239 [INFO][4542] ipam.go 1216: Successfully claimed IPs: [192.168.32.5/26] block=192.168.32.0/26 handle="k8s-pod-network.c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.240 [INFO][4542] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.5/26] handle="k8s-pod-network.c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.292000 env[1334]: time="2023-10-02T19:20:58Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:58.292000 env[1334]: 2023-10-02 19:20:58.240 [INFO][4542] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.32.5/26] IPv6=[] ContainerID="c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" HandleID="k8s-pod-network.c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--wcclp-eth0" Oct 2 19:20:58.293143 env[1334]: 2023-10-02 19:20:58.241 [INFO][4519] k8s.go 383: Populated endpoint ContainerID="c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-wcclp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--wcclp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--wcclp-eth0", GenerateName:"calico-apiserver-75c8955f5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"6a359fc6-593a-402b-bdd8-bb29d5a8560e", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75c8955f5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"", Pod:"calico-apiserver-75c8955f5f-wcclp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0072fda8bbf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:58.293143 env[1334]: 2023-10-02 19:20:58.241 [INFO][4519] k8s.go 384: Calico CNI using IPs: [192.168.32.5/32] ContainerID="c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-wcclp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--wcclp-eth0" Oct 2 19:20:58.293143 env[1334]: 2023-10-02 19:20:58.241 [INFO][4519] dataplane_linux.go 68: Setting the host side veth name to cali0072fda8bbf ContainerID="c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-wcclp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--wcclp-eth0" Oct 2 19:20:58.293143 env[1334]: 2023-10-02 19:20:58.257 [INFO][4519] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-wcclp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--wcclp-eth0" Oct 2 19:20:58.293143 env[1334]: 2023-10-02 19:20:58.269 [INFO][4519] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-wcclp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--wcclp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--wcclp-eth0", GenerateName:"calico-apiserver-75c8955f5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"6a359fc6-593a-402b-bdd8-bb29d5a8560e", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75c8955f5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914", Pod:"calico-apiserver-75c8955f5f-wcclp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0072fda8bbf", MAC:"aa:58:d9:0f:82:42", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:58.293143 env[1334]: 2023-10-02 19:20:58.290 [INFO][4519] k8s.go 489: Wrote updated endpoint to datastore ContainerID="c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-wcclp" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--wcclp-eth0" Oct 2 19:20:58.310790 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicef3e3be761: link becomes ready Oct 2 19:20:58.317113 env[1334]: time="2023-10-02T19:20:58.317044003Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:20:58.317113 env[1334]: time="2023-10-02T19:20:58.317081602Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:20:58.317344 env[1334]: time="2023-10-02T19:20:58.317304199Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:20:58.317537 env[1334]: time="2023-10-02T19:20:58.317491696Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914 pid=4577 runtime=io.containerd.runc.v2 Oct 2 19:20:58.327742 systemd-networkd[1477]: calicef3e3be761: Link UP Oct 2 19:20:58.327751 systemd-networkd[1477]: calicef3e3be761: Gained carrier Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.187 [INFO][4531] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--kpr4m-eth0 calico-apiserver-75c8955f5f- calico-apiserver 8e4f34af-ccb8-43ab-8b95-270c1edaea43 839 0 2023-10-02 19:20:57 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75c8955f5f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-ed15fb6ad9 calico-apiserver-75c8955f5f-kpr4m eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calicef3e3be761 [] []}} ContainerID="e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-kpr4m" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--kpr4m-" Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.188 [INFO][4531] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-kpr4m" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--kpr4m-eth0" Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.244 [INFO][4549] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" HandleID="k8s-pod-network.e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--kpr4m-eth0" Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.259 [INFO][4549] ipam_plugin.go 269: Auto assigning IP ContainerID="e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" HandleID="k8s-pod-network.e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--kpr4m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a800), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-ed15fb6ad9", "pod":"calico-apiserver-75c8955f5f-kpr4m", "timestamp":"2023-10-02 19:20:58.243988934 +0000 UTC"}, Hostname:"ci-3510.3.0-a-ed15fb6ad9", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:20:58.346604 env[1334]: time="2023-10-02T19:20:58Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:20:58.346604 env[1334]: time="2023-10-02T19:20:58Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.260 [INFO][4549] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-ed15fb6ad9' Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.261 [INFO][4549] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.265 [INFO][4549] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.271 [INFO][4549] ipam.go 489: Trying affinity for 192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.273 [INFO][4549] ipam.go 155: Attempting to load block cidr=192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.277 [INFO][4549] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.0/26 host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.277 [INFO][4549] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.0/26 handle="k8s-pod-network.e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.279 [INFO][4549] ipam.go 1682: Creating new handle: k8s-pod-network.e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.284 [INFO][4549] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.0/26 handle="k8s-pod-network.e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.298 [INFO][4549] ipam.go 1216: Successfully claimed IPs: [192.168.32.6/26] block=192.168.32.0/26 handle="k8s-pod-network.e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.298 [INFO][4549] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.6/26] handle="k8s-pod-network.e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" host="ci-3510.3.0-a-ed15fb6ad9" Oct 2 19:20:58.346604 env[1334]: time="2023-10-02T19:20:58Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:20:58.346604 env[1334]: 2023-10-02 19:20:58.298 [INFO][4549] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.32.6/26] IPv6=[] ContainerID="e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" HandleID="k8s-pod-network.e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" Workload="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--kpr4m-eth0" Oct 2 19:20:58.347611 env[1334]: 2023-10-02 19:20:58.303 [INFO][4531] k8s.go 383: Populated endpoint ContainerID="e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-kpr4m" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--kpr4m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--kpr4m-eth0", GenerateName:"calico-apiserver-75c8955f5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"8e4f34af-ccb8-43ab-8b95-270c1edaea43", ResourceVersion:"839", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75c8955f5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"", Pod:"calico-apiserver-75c8955f5f-kpr4m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicef3e3be761", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:58.347611 env[1334]: 2023-10-02 19:20:58.303 [INFO][4531] k8s.go 384: Calico CNI using IPs: [192.168.32.6/32] ContainerID="e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-kpr4m" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--kpr4m-eth0" Oct 2 19:20:58.347611 env[1334]: 2023-10-02 19:20:58.303 [INFO][4531] dataplane_linux.go 68: Setting the host side veth name to calicef3e3be761 ContainerID="e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-kpr4m" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--kpr4m-eth0" Oct 2 19:20:58.347611 env[1334]: 2023-10-02 19:20:58.316 [INFO][4531] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-kpr4m" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--kpr4m-eth0" Oct 2 19:20:58.347611 env[1334]: 2023-10-02 19:20:58.325 [INFO][4531] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-kpr4m" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--kpr4m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--kpr4m-eth0", GenerateName:"calico-apiserver-75c8955f5f-", Namespace:"calico-apiserver", SelfLink:"", UID:"8e4f34af-ccb8-43ab-8b95-270c1edaea43", ResourceVersion:"839", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 20, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75c8955f5f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-ed15fb6ad9", ContainerID:"e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c", Pod:"calico-apiserver-75c8955f5f-kpr4m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicef3e3be761", MAC:"da:23:26:fa:dc:54", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:20:58.347611 env[1334]: 2023-10-02 19:20:58.339 [INFO][4531] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c" Namespace="calico-apiserver" Pod="calico-apiserver-75c8955f5f-kpr4m" WorkloadEndpoint="ci--3510.3.0--a--ed15fb6ad9-k8s-calico--apiserver--75c8955f5f--kpr4m-eth0" Oct 2 19:20:58.362055 systemd[1]: Started cri-containerd-c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914.scope. Oct 2 19:20:58.377237 env[1334]: time="2023-10-02T19:20:58.377175554Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:20:58.377467 env[1334]: time="2023-10-02T19:20:58.377437450Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:20:58.377797 env[1334]: time="2023-10-02T19:20:58.377757146Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:20:58.381737 env[1334]: time="2023-10-02T19:20:58.378913829Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c pid=4620 runtime=io.containerd.runc.v2 Oct 2 19:20:58.408334 systemd[1]: Started cri-containerd-e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c.scope. Oct 2 19:20:58.428951 kernel: kauditd_printk_skb: 59 callbacks suppressed Oct 2 19:20:58.429066 kernel: audit: type=1400 audit(1696274458.420:1321): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.466922 kernel: audit: type=1400 audit(1696274458.420:1322): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.467039 kernel: audit: type=1400 audit(1696274458.420:1323): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.481979 kernel: audit: type=1400 audit(1696274458.420:1324): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.496536 kernel: audit: type=1400 audit(1696274458.420:1325): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.496620 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:20:58.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.512138 kernel: audit: type=1400 audit(1696274458.420:1326): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.512226 kernel: audit: audit_lost=6 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:20:58.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.530519 kernel: audit: type=1400 audit(1696274458.420:1327): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.530592 kernel: audit: backlog limit exceeded Oct 2 19:20:58.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.417000 audit[4647]: NETFILTER_CFG table=filter:121 family=2 entries=55 op=nft_register_chain pid=4647 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:20:58.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.452000 audit: BPF prog-id=178 op=LOAD Oct 2 19:20:58.417000 audit[4647]: SYSCALL arch=c000003e syscall=46 success=yes exit=28088 a0=3 a1=7ffeec5180b0 a2=0 a3=7ffeec51809c items=0 ppid=3515 pid=4647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.417000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4577 pid=4592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353933386266666135343734336634366531643236313665343532 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4577 pid=4592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353933386266666135343734336634366531643236313665343532 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit: BPF prog-id=179 op=LOAD Oct 2 19:20:58.465000 audit[4592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024470 items=0 ppid=4577 pid=4592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353933386266666135343734336634366531643236313665343532 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.465000 audit: BPF prog-id=180 op=LOAD Oct 2 19:20:58.465000 audit[4592]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000244b8 items=0 ppid=4577 pid=4592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353933386266666135343734336634366531643236313665343532 Oct 2 19:20:58.466000 audit: BPF prog-id=180 op=UNLOAD Oct 2 19:20:58.466000 audit: BPF prog-id=179 op=UNLOAD Oct 2 19:20:58.466000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.466000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.466000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.466000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.466000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.466000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.466000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.466000 audit[4592]: AVC avc: denied { perfmon } for pid=4592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.466000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.466000 audit[4592]: AVC avc: denied { bpf } for pid=4592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.466000 audit: BPF prog-id=181 op=LOAD Oct 2 19:20:58.466000 audit[4592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000248c8 items=0 ppid=4577 pid=4592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353933386266666135343734336634366531643236313665343532 Oct 2 19:20:58.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:20:58.562000 audit[4658]: NETFILTER_CFG table=filter:122 family=2 entries=46 op=nft_register_chain pid=4658 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:20:58.562000 audit[4658]: SYSCALL arch=c000003e syscall=46 success=yes exit=23292 a0=3 a1=7ffd94119160 a2=0 a3=7ffd9411914c items=0 ppid=3515 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:58.562000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:20:58.591690 env[1334]: time="2023-10-02T19:20:58.591517929Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75c8955f5f-wcclp,Uid:6a359fc6-593a-402b-bdd8-bb29d5a8560e,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"c85938bffa54743f46e1d2616e452aacf22939e222078a18abe1666cb5e5e914\"" Oct 2 19:20:58.592046 env[1334]: time="2023-10-02T19:20:58.591920123Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75c8955f5f-kpr4m,Uid:8e4f34af-ccb8-43ab-8b95-270c1edaea43,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"e2ba7b3fd9f508758595bdab1ca3749973a4194d270f9d5db59c9a9d0d0a152c\"" Oct 2 19:20:58.597867 env[1334]: time="2023-10-02T19:20:58.597742441Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:20:58.900621 env[1334]: time="2023-10-02T19:20:58.900460068Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:20:58.904621 env[1334]: time="2023-10-02T19:20:58.904557410Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:20:58.904960 kubelet[2460]: E1002 19:20:58.904927 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:20:58.905943 kubelet[2460]: E1002 19:20:58.904984 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:20:58.905943 kubelet[2460]: E1002 19:20:58.905213 2460 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-h9ddq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-75c8955f5f-wcclp_calico-apiserver(6a359fc6-593a-402b-bdd8-bb29d5a8560e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:20:58.905943 kubelet[2460]: E1002 19:20:58.905276 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" podUID=6a359fc6-593a-402b-bdd8-bb29d5a8560e Oct 2 19:20:58.906864 env[1334]: time="2023-10-02T19:20:58.906805178Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:20:59.208015 env[1334]: time="2023-10-02T19:20:59.207838857Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:20:59.216445 env[1334]: time="2023-10-02T19:20:59.216382537Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:20:59.216764 kubelet[2460]: E1002 19:20:59.216741 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:20:59.216868 kubelet[2460]: E1002 19:20:59.216786 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:20:59.216928 kubelet[2460]: E1002 19:20:59.216915 2460 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-5rbm4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-75c8955f5f-kpr4m_calico-apiserver(8e4f34af-ccb8-43ab-8b95-270c1edaea43): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:20:59.217075 kubelet[2460]: E1002 19:20:59.216971 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-kpr4m" podUID=8e4f34af-ccb8-43ab-8b95-270c1edaea43 Oct 2 19:20:59.419881 systemd-networkd[1477]: calicef3e3be761: Gained IPv6LL Oct 2 19:20:59.703703 kubelet[2460]: E1002 19:20:59.703671 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" podUID=6a359fc6-593a-402b-bdd8-bb29d5a8560e Oct 2 19:20:59.703982 kubelet[2460]: E1002 19:20:59.703883 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-kpr4m" podUID=8e4f34af-ccb8-43ab-8b95-270c1edaea43 Oct 2 19:20:59.745000 audit[4675]: NETFILTER_CFG table=filter:123 family=2 entries=10 op=nft_register_rule pid=4675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:59.745000 audit[4675]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd46fba040 a2=0 a3=7ffd46fba02c items=0 ppid=2647 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:59.745000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:59.746000 audit[4675]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:59.746000 audit[4675]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd46fba040 a2=0 a3=7ffd46fba02c items=0 ppid=2647 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:59.746000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:59.756000 audit[4677]: NETFILTER_CFG table=filter:125 family=2 entries=10 op=nft_register_rule pid=4677 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:59.756000 audit[4677]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd683e7560 a2=0 a3=7ffd683e754c items=0 ppid=2647 pid=4677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:59.756000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:20:59.757000 audit[4677]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=4677 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:20:59.757000 audit[4677]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd683e7560 a2=0 a3=7ffd683e754c items=0 ppid=2647 pid=4677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:20:59.757000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:21:00.315867 systemd-networkd[1477]: cali0072fda8bbf: Gained IPv6LL Oct 2 19:21:03.249621 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.8I3j7D.mount: Deactivated successfully. Oct 2 19:21:03.668669 kernel: kauditd_printk_skb: 192 callbacks suppressed Oct 2 19:21:03.668810 kernel: audit: type=1400 audit(1696274463.661:1353): avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:03.661000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:03.661000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:03.696381 kernel: audit: type=1400 audit(1696274463.661:1352): avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:03.696469 kernel: audit: type=1300 audit(1696274463.661:1352): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ebb820 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:21:03.661000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ebb820 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:21:03.661000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:03.734090 kernel: audit: type=1327 audit(1696274463.661:1352): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:03.734213 kernel: audit: type=1400 audit(1696274463.662:1354): avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:03.662000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:03.662000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ebbcc0 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:21:03.768781 kernel: audit: type=1300 audit(1696274463.662:1354): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ebbcc0 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:21:03.768912 kernel: audit: type=1327 audit(1696274463.662:1354): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:03.662000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:03.787677 kernel: audit: type=1400 audit(1696274463.664:1355): avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:03.664000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:03.664000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001070000 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:21:03.819512 kernel: audit: type=1300 audit(1696274463.664:1355): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001070000 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:21:03.819618 kernel: audit: type=1327 audit(1696274463.664:1355): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:03.664000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:03.661000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000149960 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:21:03.661000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:04.495034 env[1334]: time="2023-10-02T19:21:04.494982977Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:21:04.803239 env[1334]: time="2023-10-02T19:21:04.803175955Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:21:04.807302 env[1334]: time="2023-10-02T19:21:04.807190601Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:21:04.807892 kubelet[2460]: E1002 19:21:04.807861 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:21:04.808243 kubelet[2460]: E1002 19:21:04.807906 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:21:04.808243 kubelet[2460]: E1002 19:21:04.808025 2460 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-2h674,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-j2zbp_calico-system(5062268a-0b0e-41ea-a78f-0066e6ad7218): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:21:04.810108 env[1334]: time="2023-10-02T19:21:04.810081262Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:21:05.109305 env[1334]: time="2023-10-02T19:21:05.109150073Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:21:05.114794 env[1334]: time="2023-10-02T19:21:05.114720899Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:21:05.115068 kubelet[2460]: E1002 19:21:05.115031 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:21:05.115193 kubelet[2460]: E1002 19:21:05.115084 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:21:05.115263 kubelet[2460]: E1002 19:21:05.115204 2460 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-2h674,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-j2zbp_calico-system(5062268a-0b0e-41ea-a78f-0066e6ad7218): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:21:05.115409 kubelet[2460]: E1002 19:21:05.115295 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:21:11.494730 env[1334]: time="2023-10-02T19:21:11.494674776Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:21:11.799208 env[1334]: time="2023-10-02T19:21:11.799146616Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:21:11.803435 env[1334]: time="2023-10-02T19:21:11.803396362Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:21:11.803772 kubelet[2460]: E1002 19:21:11.803735 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:21:11.804135 kubelet[2460]: E1002 19:21:11.803784 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:21:11.804135 kubelet[2460]: E1002 19:21:11.803933 2460 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-h9ddq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-75c8955f5f-wcclp_calico-apiserver(6a359fc6-593a-402b-bdd8-bb29d5a8560e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:21:11.804135 kubelet[2460]: E1002 19:21:11.803983 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" podUID=6a359fc6-593a-402b-bdd8-bb29d5a8560e Oct 2 19:21:13.089188 systemd[1]: run-containerd-runc-k8s.io-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479-runc.QfxFin.mount: Deactivated successfully. Oct 2 19:21:13.249657 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.9RDMFf.mount: Deactivated successfully. Oct 2 19:21:13.494776 env[1334]: time="2023-10-02T19:21:13.494660395Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:21:13.805162 env[1334]: time="2023-10-02T19:21:13.805088014Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:21:14.409420 env[1334]: time="2023-10-02T19:21:14.409352292Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:21:14.409800 kubelet[2460]: E1002 19:21:14.409766 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:21:14.410220 kubelet[2460]: E1002 19:21:14.409812 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:21:14.410220 kubelet[2460]: E1002 19:21:14.409946 2460 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-5rbm4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-75c8955f5f-kpr4m_calico-apiserver(8e4f34af-ccb8-43ab-8b95-270c1edaea43): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:21:14.410220 kubelet[2460]: E1002 19:21:14.409995 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-kpr4m" podUID=8e4f34af-ccb8-43ab-8b95-270c1edaea43 Oct 2 19:21:18.497595 kubelet[2460]: E1002 19:21:18.497517 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:21:23.086844 systemd[1]: run-containerd-runc-k8s.io-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479-runc.LfQjYa.mount: Deactivated successfully. Oct 2 19:21:24.080751 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.kvzWVn.mount: Deactivated successfully. Oct 2 19:21:26.494708 kubelet[2460]: E1002 19:21:26.494668 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" podUID=6a359fc6-593a-402b-bdd8-bb29d5a8560e Oct 2 19:21:29.494681 env[1334]: time="2023-10-02T19:21:29.494589550Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:21:29.496010 kubelet[2460]: E1002 19:21:29.495980 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-kpr4m" podUID=8e4f34af-ccb8-43ab-8b95-270c1edaea43 Oct 2 19:21:29.784114 env[1334]: time="2023-10-02T19:21:29.783973336Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:21:29.787878 env[1334]: time="2023-10-02T19:21:29.787805792Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:21:29.788124 kubelet[2460]: E1002 19:21:29.788096 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:21:29.788222 kubelet[2460]: E1002 19:21:29.788150 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:21:29.788279 kubelet[2460]: E1002 19:21:29.788261 2460 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-2h674,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-j2zbp_calico-system(5062268a-0b0e-41ea-a78f-0066e6ad7218): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:21:29.789501 env[1334]: time="2023-10-02T19:21:29.789464073Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:21:30.088717 env[1334]: time="2023-10-02T19:21:30.088633452Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:21:30.092462 env[1334]: time="2023-10-02T19:21:30.092402509Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:21:30.092717 kubelet[2460]: E1002 19:21:30.092687 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:21:30.092828 kubelet[2460]: E1002 19:21:30.092736 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:21:30.092882 kubelet[2460]: E1002 19:21:30.092844 2460 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-2h674,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-j2zbp_calico-system(5062268a-0b0e-41ea-a78f-0066e6ad7218): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:21:30.093007 kubelet[2460]: E1002 19:21:30.092918 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:21:33.087051 systemd[1]: run-containerd-runc-k8s.io-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479-runc.ZgJ4Rh.mount: Deactivated successfully. Oct 2 19:21:33.250522 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.HxCsoX.mount: Deactivated successfully. Oct 2 19:21:37.494690 env[1334]: time="2023-10-02T19:21:37.494621289Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:21:37.789874 env[1334]: time="2023-10-02T19:21:37.789721769Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:21:37.794499 env[1334]: time="2023-10-02T19:21:37.794435518Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:21:37.794856 kubelet[2460]: E1002 19:21:37.794829 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:21:37.795307 kubelet[2460]: E1002 19:21:37.794876 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:21:37.795307 kubelet[2460]: E1002 19:21:37.795081 2460 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-h9ddq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-75c8955f5f-wcclp_calico-apiserver(6a359fc6-593a-402b-bdd8-bb29d5a8560e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:21:37.795307 kubelet[2460]: E1002 19:21:37.795155 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" podUID=6a359fc6-593a-402b-bdd8-bb29d5a8560e Oct 2 19:21:42.495008 kubelet[2460]: E1002 19:21:42.494977 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:21:43.086263 systemd[1]: run-containerd-runc-k8s.io-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479-runc.46jaKD.mount: Deactivated successfully. Oct 2 19:21:43.493939 env[1334]: time="2023-10-02T19:21:43.493785232Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:21:43.815181 env[1334]: time="2023-10-02T19:21:43.815122332Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:21:43.819386 env[1334]: time="2023-10-02T19:21:43.819331280Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:21:43.819591 kubelet[2460]: E1002 19:21:43.819567 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:21:43.819966 kubelet[2460]: E1002 19:21:43.819623 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:21:43.819966 kubelet[2460]: E1002 19:21:43.819827 2460 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-5rbm4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-75c8955f5f-kpr4m_calico-apiserver(8e4f34af-ccb8-43ab-8b95-270c1edaea43): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:21:43.819966 kubelet[2460]: E1002 19:21:43.819893 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-kpr4m" podUID=8e4f34af-ccb8-43ab-8b95-270c1edaea43 Oct 2 19:21:44.078554 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.2kKaZg.mount: Deactivated successfully. Oct 2 19:21:48.674000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:48.680114 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 19:21:48.680244 kernel: audit: type=1400 audit(1696274508.674:1357): avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:48.674000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:48.696665 kernel: audit: type=1400 audit(1696274508.674:1356): avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:48.674000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ead020 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:21:48.734149 kernel: audit: type=1300 audit(1696274508.674:1356): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ead020 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:21:48.734274 kernel: audit: type=1327 audit(1696274508.674:1356): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:48.674000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:48.674000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001334480 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:21:48.769214 kernel: audit: type=1300 audit(1696274508.674:1357): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001334480 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:21:48.769328 kernel: audit: type=1327 audit(1696274508.674:1357): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:48.674000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:21:49.495106 kubelet[2460]: E1002 19:21:49.495071 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" podUID=6a359fc6-593a-402b-bdd8-bb29d5a8560e Oct 2 19:21:49.662000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:49.662000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c011b663f0 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:21:49.700845 kernel: audit: type=1400 audit(1696274509.662:1358): avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:49.700949 kernel: audit: type=1300 audit(1696274509.662:1358): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c011b663f0 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:21:49.700984 kernel: audit: type=1327 audit(1696274509.662:1358): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:21:49.662000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:21:49.662000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:49.733779 kernel: audit: type=1400 audit(1696274509.662:1359): avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:49.662000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c012681020 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:21:49.662000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:21:49.679000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6887 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:49.679000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c011b664b0 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:21:49.679000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:21:49.759000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6893 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:49.759000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c011b66630 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:21:49.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:21:49.766000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:49.766000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:21:49.766000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c012681200 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:21:49.766000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:21:49.766000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c011c61710 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:21:49.766000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:21:53.284493 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.ASCtIH.mount: Deactivated successfully. Oct 2 19:21:54.493686 kubelet[2460]: E1002 19:21:54.493656 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-kpr4m" podUID=8e4f34af-ccb8-43ab-8b95-270c1edaea43 Oct 2 19:21:55.495238 kubelet[2460]: E1002 19:21:55.495207 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:22:01.493953 kubelet[2460]: E1002 19:22:01.493368 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" podUID=6a359fc6-593a-402b-bdd8-bb29d5a8560e Oct 2 19:22:03.087048 systemd[1]: run-containerd-runc-k8s.io-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479-runc.ggpFAi.mount: Deactivated successfully. Oct 2 19:22:03.663000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:03.668714 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 19:22:03.668837 kernel: audit: type=1400 audit(1696274523.663:1364): avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:03.663000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:03.698718 kernel: audit: type=1400 audit(1696274523.663:1365): avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:03.698847 kernel: audit: type=1300 audit(1696274523.663:1365): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001335240 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:22:03.663000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001335240 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:22:03.719867 kernel: audit: type=1327 audit(1696274523.663:1365): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:22:03.663000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:22:03.663000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025dcca0 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:22:03.757565 kernel: audit: type=1300 audit(1696274523.663:1364): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025dcca0 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:22:03.663000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:22:03.666000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:03.788667 kernel: audit: type=1327 audit(1696274523.663:1364): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:22:03.788778 kernel: audit: type=1400 audit(1696274523.666:1366): avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:03.666000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025dccc0 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:22:03.789663 kernel: audit: type=1300 audit(1696274523.666:1366): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025dccc0 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:22:03.666000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:22:03.825249 kernel: audit: type=1327 audit(1696274523.666:1366): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:22:03.825356 kernel: audit: type=1400 audit(1696274523.666:1367): avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:03.666000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:03.666000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001335360 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:22:03.666000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:22:04.078824 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.Ms1Ys2.mount: Deactivated successfully. Oct 2 19:22:09.494246 kubelet[2460]: E1002 19:22:09.494202 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-kpr4m" podUID=8e4f34af-ccb8-43ab-8b95-270c1edaea43 Oct 2 19:22:10.496152 env[1334]: time="2023-10-02T19:22:10.496087252Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:22:10.800145 env[1334]: time="2023-10-02T19:22:10.800077803Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:22:10.803974 env[1334]: time="2023-10-02T19:22:10.803922977Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:22:10.804257 kubelet[2460]: E1002 19:22:10.804227 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:22:10.804624 kubelet[2460]: E1002 19:22:10.804281 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:22:10.804624 kubelet[2460]: E1002 19:22:10.804405 2460 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-2h674,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-j2zbp_calico-system(5062268a-0b0e-41ea-a78f-0066e6ad7218): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:22:10.805576 env[1334]: time="2023-10-02T19:22:10.805543293Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:22:11.103938 env[1334]: time="2023-10-02T19:22:11.103767927Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:22:11.110140 env[1334]: time="2023-10-02T19:22:11.110077870Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:22:11.110491 kubelet[2460]: E1002 19:22:11.110463 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:22:11.110627 kubelet[2460]: E1002 19:22:11.110515 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:22:11.110744 kubelet[2460]: E1002 19:22:11.110673 2460 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-2h674,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-j2zbp_calico-system(5062268a-0b0e-41ea-a78f-0066e6ad7218): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:22:11.110919 kubelet[2460]: E1002 19:22:11.110763 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:22:13.087099 systemd[1]: run-containerd-runc-k8s.io-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479-runc.DxgPNY.mount: Deactivated successfully. Oct 2 19:22:14.079272 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.HXVhl6.mount: Deactivated successfully. Oct 2 19:22:15.493355 kubelet[2460]: E1002 19:22:15.493316 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" podUID=6a359fc6-593a-402b-bdd8-bb29d5a8560e Oct 2 19:22:23.085898 systemd[1]: run-containerd-runc-k8s.io-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479-runc.5d55F9.mount: Deactivated successfully. Oct 2 19:22:23.201169 systemd[1]: Started sshd@7-10.200.8.17:22-10.200.12.6:37242.service. Oct 2 19:22:23.212683 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 19:22:23.212782 kernel: audit: type=1130 audit(1696274543.206:1368): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.17:22-10.200.12.6:37242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:23.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.17:22-10.200.12.6:37242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:23.252846 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.OxiqRM.mount: Deactivated successfully. Oct 2 19:22:23.494657 kubelet[2460]: E1002 19:22:23.494509 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-kpr4m" podUID=8e4f34af-ccb8-43ab-8b95-270c1edaea43 Oct 2 19:22:23.927000 audit[5283]: USER_ACCT pid=5283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:23.928841 sshd[5283]: Accepted publickey for core from 10.200.12.6 port 37242 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:22:23.945000 audit[5283]: CRED_ACQ pid=5283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:23.946890 sshd[5283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:22:23.952390 systemd[1]: Started session-10.scope. Oct 2 19:22:23.953628 systemd-logind[1320]: New session 10 of user core. Oct 2 19:22:23.963072 kernel: audit: type=1101 audit(1696274543.927:1369): pid=5283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:23.963163 kernel: audit: type=1103 audit(1696274543.945:1370): pid=5283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:23.972757 kernel: audit: type=1006 audit(1696274543.945:1371): pid=5283 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 19:22:23.972870 kernel: audit: type=1300 audit(1696274543.945:1371): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd18cba7b0 a2=3 a3=0 items=0 ppid=1 pid=5283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:23.945000 audit[5283]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd18cba7b0 a2=3 a3=0 items=0 ppid=1 pid=5283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:23.945000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:22:23.989723 kernel: audit: type=1327 audit(1696274543.945:1371): proctitle=737368643A20636F7265205B707269765D Oct 2 19:22:23.957000 audit[5283]: USER_START pid=5283 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:23.995656 kernel: audit: type=1105 audit(1696274543.957:1372): pid=5283 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:23.961000 audit[5326]: CRED_ACQ pid=5326 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:24.028418 kernel: audit: type=1103 audit(1696274543.961:1373): pid=5326 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:24.496596 kubelet[2460]: E1002 19:22:24.496552 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:22:24.503052 sshd[5283]: pam_unix(sshd:session): session closed for user core Oct 2 19:22:24.505000 audit[5283]: USER_END pid=5283 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:24.508824 systemd[1]: sshd@7-10.200.8.17:22-10.200.12.6:37242.service: Deactivated successfully. Oct 2 19:22:24.509585 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:22:24.510688 systemd-logind[1320]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:22:24.511572 systemd-logind[1320]: Removed session 10. Oct 2 19:22:24.525705 kernel: audit: type=1106 audit(1696274544.505:1374): pid=5283 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:24.525820 kernel: audit: type=1104 audit(1696274544.505:1375): pid=5283 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:24.505000 audit[5283]: CRED_DISP pid=5283 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:24.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.17:22-10.200.12.6:37242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:27.494985 env[1334]: time="2023-10-02T19:22:27.494921272Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:22:27.792710 env[1334]: time="2023-10-02T19:22:27.792629830Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:22:27.804475 env[1334]: time="2023-10-02T19:22:27.804389184Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:22:27.805113 kubelet[2460]: E1002 19:22:27.804929 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:22:27.805113 kubelet[2460]: E1002 19:22:27.804993 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:22:27.805743 kubelet[2460]: E1002 19:22:27.805628 2460 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-h9ddq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-75c8955f5f-wcclp_calico-apiserver(6a359fc6-593a-402b-bdd8-bb29d5a8560e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:22:27.805743 kubelet[2460]: E1002 19:22:27.805716 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" podUID=6a359fc6-593a-402b-bdd8-bb29d5a8560e Oct 2 19:22:33.081222 systemd[1]: run-containerd-runc-k8s.io-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479-runc.zjIyrh.mount: Deactivated successfully. Oct 2 19:22:34.077710 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.0Q1SqT.mount: Deactivated successfully. Oct 2 19:22:34.625677 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:22:34.625807 kernel: audit: type=1130 audit(1696274554.610:1377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.17:22-10.200.12.6:55848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:34.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.17:22-10.200.12.6:55848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:34.611299 systemd[1]: Started sshd@8-10.200.8.17:22-10.200.12.6:55848.service. Oct 2 19:22:35.247000 audit[5402]: USER_ACCT pid=5402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:35.266552 sshd[5402]: Accepted publickey for core from 10.200.12.6 port 55848 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:22:35.266925 kernel: audit: type=1101 audit(1696274555.247:1378): pid=5402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:35.266930 sshd[5402]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:22:35.265000 audit[5402]: CRED_ACQ pid=5402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:35.272993 systemd[1]: Started session-11.scope. Oct 2 19:22:35.274102 systemd-logind[1320]: New session 11 of user core. Oct 2 19:22:35.284665 kernel: audit: type=1103 audit(1696274555.265:1379): pid=5402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:35.284736 kernel: audit: type=1006 audit(1696274555.265:1380): pid=5402 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 2 19:22:35.265000 audit[5402]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe29c60db0 a2=3 a3=0 items=0 ppid=1 pid=5402 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:35.311104 kernel: audit: type=1300 audit(1696274555.265:1380): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe29c60db0 a2=3 a3=0 items=0 ppid=1 pid=5402 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:35.311214 kernel: audit: type=1327 audit(1696274555.265:1380): proctitle=737368643A20636F7265205B707269765D Oct 2 19:22:35.265000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:22:35.278000 audit[5402]: USER_START pid=5402 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:35.334825 kernel: audit: type=1105 audit(1696274555.278:1381): pid=5402 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:35.334929 kernel: audit: type=1103 audit(1696274555.282:1382): pid=5404 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:35.282000 audit[5404]: CRED_ACQ pid=5404 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:35.755510 sshd[5402]: pam_unix(sshd:session): session closed for user core Oct 2 19:22:35.756000 audit[5402]: USER_END pid=5402 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:35.759302 systemd[1]: sshd@8-10.200.8.17:22-10.200.12.6:55848.service: Deactivated successfully. Oct 2 19:22:35.760255 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:22:35.762033 systemd-logind[1320]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:22:35.763058 systemd-logind[1320]: Removed session 11. Oct 2 19:22:35.756000 audit[5402]: CRED_DISP pid=5402 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:35.775664 kernel: audit: type=1106 audit(1696274555.756:1383): pid=5402 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:35.775713 kernel: audit: type=1104 audit(1696274555.756:1384): pid=5402 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:35.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.17:22-10.200.12.6:55848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:38.495118 env[1334]: time="2023-10-02T19:22:38.495055709Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:22:38.812237 env[1334]: time="2023-10-02T19:22:38.812162782Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:22:38.818664 env[1334]: time="2023-10-02T19:22:38.818603889Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:22:38.818936 kubelet[2460]: E1002 19:22:38.818911 2460 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:22:38.819309 kubelet[2460]: E1002 19:22:38.819293 2460 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:22:38.819497 kubelet[2460]: E1002 19:22:38.819479 2460 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-5rbm4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-75c8955f5f-kpr4m_calico-apiserver(8e4f34af-ccb8-43ab-8b95-270c1edaea43): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:22:38.819729 kubelet[2460]: E1002 19:22:38.819713 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-kpr4m" podUID=8e4f34af-ccb8-43ab-8b95-270c1edaea43 Oct 2 19:22:39.494685 kubelet[2460]: E1002 19:22:39.494647 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:22:42.494980 kubelet[2460]: E1002 19:22:42.494948 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" podUID=6a359fc6-593a-402b-bdd8-bb29d5a8560e Oct 2 19:22:43.249025 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.R9IktC.mount: Deactivated successfully. Oct 2 19:22:44.079293 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.A0WhKH.mount: Deactivated successfully. Oct 2 19:22:45.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.17:22-10.200.12.6:43504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:45.863522 systemd[1]: Started sshd@9-10.200.8.17:22-10.200.12.6:43504.service. Oct 2 19:22:45.868760 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:22:45.868839 kernel: audit: type=1130 audit(1696274565.863:1386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.17:22-10.200.12.6:43504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:46.498932 sshd[5487]: Accepted publickey for core from 10.200.12.6 port 43504 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:22:46.500656 sshd[5487]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:22:46.498000 audit[5487]: USER_ACCT pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:46.509811 systemd[1]: Started session-12.scope. Oct 2 19:22:46.511208 systemd-logind[1320]: New session 12 of user core. Oct 2 19:22:46.499000 audit[5487]: CRED_ACQ pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:46.535220 kernel: audit: type=1101 audit(1696274566.498:1387): pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:46.535314 kernel: audit: type=1103 audit(1696274566.499:1388): pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:46.545213 kernel: audit: type=1006 audit(1696274566.499:1389): pid=5487 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Oct 2 19:22:46.545303 kernel: audit: type=1300 audit(1696274566.499:1389): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7c9aa3a0 a2=3 a3=0 items=0 ppid=1 pid=5487 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.499000 audit[5487]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7c9aa3a0 a2=3 a3=0 items=0 ppid=1 pid=5487 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:46.499000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:22:46.567192 kernel: audit: type=1327 audit(1696274566.499:1389): proctitle=737368643A20636F7265205B707269765D Oct 2 19:22:46.568673 kernel: audit: type=1105 audit(1696274566.518:1390): pid=5487 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:46.518000 audit[5487]: USER_START pid=5487 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:46.586004 kernel: audit: type=1103 audit(1696274566.524:1391): pid=5489 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:46.524000 audit[5489]: CRED_ACQ pid=5489 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:47.014939 sshd[5487]: pam_unix(sshd:session): session closed for user core Oct 2 19:22:47.015000 audit[5487]: USER_END pid=5487 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:47.022179 systemd[1]: sshd@9-10.200.8.17:22-10.200.12.6:43504.service: Deactivated successfully. Oct 2 19:22:47.022969 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:22:47.024233 systemd-logind[1320]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:22:47.025137 systemd-logind[1320]: Removed session 12. Oct 2 19:22:47.015000 audit[5487]: CRED_DISP pid=5487 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:47.050655 kernel: audit: type=1106 audit(1696274567.015:1392): pid=5487 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:47.050734 kernel: audit: type=1104 audit(1696274567.015:1393): pid=5487 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:47.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.17:22-10.200.12.6:43504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:47.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.17:22-10.200.12.6:43512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:47.121033 systemd[1]: Started sshd@10-10.200.8.17:22-10.200.12.6:43512.service. Oct 2 19:22:47.749000 audit[5501]: USER_ACCT pid=5501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:47.751757 sshd[5501]: Accepted publickey for core from 10.200.12.6 port 43512 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:22:47.751000 audit[5501]: CRED_ACQ pid=5501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:47.751000 audit[5501]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7bcb73a0 a2=3 a3=0 items=0 ppid=1 pid=5501 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:47.751000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:22:47.753478 sshd[5501]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:22:47.759590 systemd[1]: Started session-13.scope. Oct 2 19:22:47.760184 systemd-logind[1320]: New session 13 of user core. Oct 2 19:22:47.763000 audit[5501]: USER_START pid=5501 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:47.764000 audit[5504]: CRED_ACQ pid=5504 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:48.674000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:48.674000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002259c00 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:22:48.674000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:22:48.675000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:48.675000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a297a0 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:22:48.675000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:22:48.919019 sshd[5501]: pam_unix(sshd:session): session closed for user core Oct 2 19:22:48.919000 audit[5501]: USER_END pid=5501 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:48.919000 audit[5501]: CRED_DISP pid=5501 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:48.922127 systemd[1]: sshd@10-10.200.8.17:22-10.200.12.6:43512.service: Deactivated successfully. Oct 2 19:22:48.923073 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:22:48.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.17:22-10.200.12.6:43512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:48.923805 systemd-logind[1320]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:22:48.924613 systemd-logind[1320]: Removed session 13. Oct 2 19:22:49.024828 systemd[1]: Started sshd@11-10.200.8.17:22-10.200.12.6:37898.service. Oct 2 19:22:49.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.17:22-10.200.12.6:37898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:49.494042 kubelet[2460]: E1002 19:22:49.494006 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-kpr4m" podUID=8e4f34af-ccb8-43ab-8b95-270c1edaea43 Oct 2 19:22:49.649000 audit[5512]: USER_ACCT pid=5512 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:49.651452 sshd[5512]: Accepted publickey for core from 10.200.12.6 port 37898 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:22:49.651000 audit[5512]: CRED_ACQ pid=5512 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:49.651000 audit[5512]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc87034550 a2=3 a3=0 items=0 ppid=1 pid=5512 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:22:49.651000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:22:49.653192 sshd[5512]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:22:49.658419 systemd[1]: Started session-14.scope. Oct 2 19:22:49.658911 systemd-logind[1320]: New session 14 of user core. Oct 2 19:22:49.661000 audit[5512]: USER_START pid=5512 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:49.663000 audit[5514]: CRED_ACQ pid=5514 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:49.663000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:49.663000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c012155660 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:22:49.663000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:22:49.663000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:49.663000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c009365ec0 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:22:49.663000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:22:49.680000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=6887 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:49.680000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c009365f50 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:22:49.680000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:22:49.760000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=6893 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:49.760000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0096dc0f0 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:22:49.760000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:22:49.767000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:49.767000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:22:49.767000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c012155840 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:22:49.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:22:49.767000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c003c4b500 a2=fc6 a3=0 items=0 ppid=2188 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c527 key=(null) Oct 2 19:22:49.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:22:50.152212 sshd[5512]: pam_unix(sshd:session): session closed for user core Oct 2 19:22:50.152000 audit[5512]: USER_END pid=5512 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:50.152000 audit[5512]: CRED_DISP pid=5512 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:22:50.156085 systemd[1]: sshd@11-10.200.8.17:22-10.200.12.6:37898.service: Deactivated successfully. Oct 2 19:22:50.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.17:22-10.200.12.6:37898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:22:50.157090 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 19:22:50.157886 systemd-logind[1320]: Session 14 logged out. Waiting for processes to exit. Oct 2 19:22:50.158724 systemd-logind[1320]: Removed session 14. Oct 2 19:22:50.494889 kubelet[2460]: E1002 19:22:50.494780 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:22:53.085367 systemd[1]: run-containerd-runc-k8s.io-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479-runc.4tdFFb.mount: Deactivated successfully. Oct 2 19:22:53.252250 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.xDBRJq.mount: Deactivated successfully. Oct 2 19:22:55.493908 kubelet[2460]: E1002 19:22:55.493875 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" podUID=6a359fc6-593a-402b-bdd8-bb29d5a8560e Oct 2 19:23:00.267088 systemd[1]: Started sshd@12-10.200.8.17:22-10.200.12.6:45428.service. Oct 2 19:23:00.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.17:22-10.200.12.6:45428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:23:00.289543 kernel: kauditd_printk_skb: 47 callbacks suppressed Oct 2 19:23:00.289685 kernel: audit: type=1130 audit(1696274580.267:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.17:22-10.200.12.6:45428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:23:00.890000 audit[5597]: USER_ACCT pid=5597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:23:00.892324 sshd[5597]: Accepted publickey for core from 10.200.12.6 port 45428 ssh2: RSA SHA256:gmG02UXHBKapD9vqiBZ3w7SUJvWJJQwqYxETXcCINW8 Oct 2 19:23:00.908661 kernel: audit: type=1101 audit(1696274580.890:1422): pid=5597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:23:00.908000 audit[5597]: CRED_ACQ pid=5597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:23:00.909507 sshd[5597]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:23:00.914788 systemd-logind[1320]: New session 15 of user core. Oct 2 19:23:00.915979 systemd[1]: Started session-15.scope. Oct 2 19:23:00.926659 kernel: audit: type=1103 audit(1696274580.908:1423): pid=5597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:23:00.926741 kernel: audit: type=1006 audit(1696274580.908:1424): pid=5597 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 2 19:23:00.908000 audit[5597]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1d73ea70 a2=3 a3=0 items=0 ppid=1 pid=5597 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:23:00.952662 kernel: audit: type=1300 audit(1696274580.908:1424): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1d73ea70 a2=3 a3=0 items=0 ppid=1 pid=5597 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:23:00.952922 kernel: audit: type=1327 audit(1696274580.908:1424): proctitle=737368643A20636F7265205B707269765D Oct 2 19:23:00.908000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:23:00.920000 audit[5597]: USER_START pid=5597 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:23:00.923000 audit[5599]: CRED_ACQ pid=5599 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:23:00.976659 kernel: audit: type=1105 audit(1696274580.920:1425): pid=5597 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:23:00.976734 kernel: audit: type=1103 audit(1696274580.923:1426): pid=5599 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:23:01.387303 sshd[5597]: pam_unix(sshd:session): session closed for user core Oct 2 19:23:01.388000 audit[5597]: USER_END pid=5597 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:23:01.390946 systemd[1]: sshd@12-10.200.8.17:22-10.200.12.6:45428.service: Deactivated successfully. Oct 2 19:23:01.391902 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 19:23:01.394005 systemd-logind[1320]: Session 15 logged out. Waiting for processes to exit. Oct 2 19:23:01.395049 systemd-logind[1320]: Removed session 15. Oct 2 19:23:01.410695 kernel: audit: type=1106 audit(1696274581.388:1427): pid=5597 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:23:01.410822 kernel: audit: type=1104 audit(1696274581.388:1428): pid=5597 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:23:01.388000 audit[5597]: CRED_DISP pid=5597 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:23:01.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.17:22-10.200.12.6:45428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:23:03.086458 systemd[1]: run-containerd-runc-k8s.io-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479-runc.DnEQsI.mount: Deactivated successfully. Oct 2 19:23:03.494259 kubelet[2460]: E1002 19:23:03.494150 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-kpr4m" podUID=8e4f34af-ccb8-43ab-8b95-270c1edaea43 Oct 2 19:23:03.495381 kubelet[2460]: E1002 19:23:03.495319 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:23:03.664000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:23:03.664000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d0ba60 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:23:03.664000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:23:03.665000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:23:03.665000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001071f20 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:23:03.665000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:23:03.668000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:23:03.668000 audit[2339]: AVC avc: denied { watch } for pid=2339 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:23:03.668000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012ee040 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:23:03.668000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:23:03.668000 audit[2339]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d0baa0 a2=fc6 a3=0 items=0 ppid=2195 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:23:03.668000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:23:07.493790 kubelet[2460]: E1002 19:23:07.493756 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" podUID=6a359fc6-593a-402b-bdd8-bb29d5a8560e Oct 2 19:23:14.495191 kubelet[2460]: E1002 19:23:14.495148 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:23:15.494328 kubelet[2460]: E1002 19:23:15.494199 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-kpr4m" podUID=8e4f34af-ccb8-43ab-8b95-270c1edaea43 Oct 2 19:23:16.310000 audit: BPF prog-id=121 op=UNLOAD Oct 2 19:23:16.312031 systemd[1]: cri-containerd-c483f6554720a7b61539f8f9672d7e2b304c944c7107d502f6b236f2e321059b.scope: Deactivated successfully. Oct 2 19:23:16.312401 systemd[1]: cri-containerd-c483f6554720a7b61539f8f9672d7e2b304c944c7107d502f6b236f2e321059b.scope: Consumed 2.773s CPU time. Oct 2 19:23:16.318485 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 2 19:23:16.318610 kernel: audit: type=1334 audit(1696274596.310:1434): prog-id=121 op=UNLOAD Oct 2 19:23:16.326000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:23:16.333662 kernel: audit: type=1334 audit(1696274596.326:1435): prog-id=124 op=UNLOAD Oct 2 19:23:16.336894 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c483f6554720a7b61539f8f9672d7e2b304c944c7107d502f6b236f2e321059b-rootfs.mount: Deactivated successfully. Oct 2 19:23:16.366058 env[1334]: time="2023-10-02T19:23:16.365997522Z" level=info msg="shim disconnected" id=c483f6554720a7b61539f8f9672d7e2b304c944c7107d502f6b236f2e321059b Oct 2 19:23:16.366058 env[1334]: time="2023-10-02T19:23:16.366055424Z" level=warning msg="cleaning up after shim disconnected" id=c483f6554720a7b61539f8f9672d7e2b304c944c7107d502f6b236f2e321059b namespace=k8s.io Oct 2 19:23:16.366656 env[1334]: time="2023-10-02T19:23:16.366068224Z" level=info msg="cleaning up dead shim" Oct 2 19:23:16.375041 env[1334]: time="2023-10-02T19:23:16.375002177Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:23:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5755 runtime=io.containerd.runc.v2\n" Oct 2 19:23:16.764231 systemd[1]: cri-containerd-968cf6d60a067cf630aa0690af38e2287c5863fd3a143188df14ed7c2c216122.scope: Deactivated successfully. Oct 2 19:23:16.764612 systemd[1]: cri-containerd-968cf6d60a067cf630aa0690af38e2287c5863fd3a143188df14ed7c2c216122.scope: Consumed 3.105s CPU time. Oct 2 19:23:16.766000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:23:16.774352 kubelet[2460]: E1002 19:23:16.774312 2460 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.17:37076->10.200.8.21:2379: read: connection timed out" Oct 2 19:23:16.774801 kernel: audit: type=1334 audit(1696274596.766:1436): prog-id=88 op=UNLOAD Oct 2 19:23:16.774852 kernel: audit: type=1334 audit(1696274596.766:1437): prog-id=89 op=UNLOAD Oct 2 19:23:16.766000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:23:16.785046 systemd[1]: cri-containerd-a80886b9cfa56ad50f95c077208c6009c0d400e1d578413c0020bae3a3c6f370.scope: Deactivated successfully. Oct 2 19:23:16.785324 systemd[1]: cri-containerd-a80886b9cfa56ad50f95c077208c6009c0d400e1d578413c0020bae3a3c6f370.scope: Consumed 1.903s CPU time. Oct 2 19:23:16.789000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:23:16.801598 kernel: audit: type=1334 audit(1696274596.789:1438): prog-id=80 op=UNLOAD Oct 2 19:23:16.801732 kernel: audit: type=1334 audit(1696274596.789:1439): prog-id=98 op=UNLOAD Oct 2 19:23:16.789000 audit: BPF prog-id=98 op=UNLOAD Oct 2 19:23:16.811274 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-968cf6d60a067cf630aa0690af38e2287c5863fd3a143188df14ed7c2c216122-rootfs.mount: Deactivated successfully. Oct 2 19:23:16.819742 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a80886b9cfa56ad50f95c077208c6009c0d400e1d578413c0020bae3a3c6f370-rootfs.mount: Deactivated successfully. Oct 2 19:23:16.829946 env[1334]: time="2023-10-02T19:23:16.829900541Z" level=info msg="shim disconnected" id=968cf6d60a067cf630aa0690af38e2287c5863fd3a143188df14ed7c2c216122 Oct 2 19:23:16.830144 env[1334]: time="2023-10-02T19:23:16.829947243Z" level=warning msg="cleaning up after shim disconnected" id=968cf6d60a067cf630aa0690af38e2287c5863fd3a143188df14ed7c2c216122 namespace=k8s.io Oct 2 19:23:16.830144 env[1334]: time="2023-10-02T19:23:16.829961143Z" level=info msg="cleaning up dead shim" Oct 2 19:23:16.830371 env[1334]: time="2023-10-02T19:23:16.830336154Z" level=info msg="shim disconnected" id=a80886b9cfa56ad50f95c077208c6009c0d400e1d578413c0020bae3a3c6f370 Oct 2 19:23:16.830446 env[1334]: time="2023-10-02T19:23:16.830379655Z" level=warning msg="cleaning up after shim disconnected" id=a80886b9cfa56ad50f95c077208c6009c0d400e1d578413c0020bae3a3c6f370 namespace=k8s.io Oct 2 19:23:16.830446 env[1334]: time="2023-10-02T19:23:16.830391355Z" level=info msg="cleaning up dead shim" Oct 2 19:23:16.841601 env[1334]: time="2023-10-02T19:23:16.841566271Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:23:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5796 runtime=io.containerd.runc.v2\n" Oct 2 19:23:16.842224 env[1334]: time="2023-10-02T19:23:16.842195189Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:23:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5795 runtime=io.containerd.runc.v2\n" Oct 2 19:23:16.998670 kubelet[2460]: I1002 19:23:16.998284 2460 scope.go:115] "RemoveContainer" containerID="968cf6d60a067cf630aa0690af38e2287c5863fd3a143188df14ed7c2c216122" Oct 2 19:23:17.000803 kubelet[2460]: I1002 19:23:17.000778 2460 scope.go:115] "RemoveContainer" containerID="a80886b9cfa56ad50f95c077208c6009c0d400e1d578413c0020bae3a3c6f370" Oct 2 19:23:17.009442 env[1334]: time="2023-10-02T19:23:17.009396615Z" level=info msg="CreateContainer within sandbox \"072a64b58e6707ee99821b6f3e5e53e6a39939791bdd159e351e789fbf5ae411\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Oct 2 19:23:17.010199 env[1334]: time="2023-10-02T19:23:17.010172437Z" level=info msg="CreateContainer within sandbox \"fdb9b97a015902e6446366666ce387112d5426e282245fef3d658178c3685f07\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Oct 2 19:23:17.011594 kubelet[2460]: I1002 19:23:17.011575 2460 scope.go:115] "RemoveContainer" containerID="c483f6554720a7b61539f8f9672d7e2b304c944c7107d502f6b236f2e321059b" Oct 2 19:23:17.013479 env[1334]: time="2023-10-02T19:23:17.013448328Z" level=info msg="CreateContainer within sandbox \"77cf3b3281e60c69528f36893558ec8bbbe1457bdc799267e91659c052d26008\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Oct 2 19:23:17.042512 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3790995827.mount: Deactivated successfully. Oct 2 19:23:17.076666 env[1334]: time="2023-10-02T19:23:17.076585090Z" level=info msg="CreateContainer within sandbox \"fdb9b97a015902e6446366666ce387112d5426e282245fef3d658178c3685f07\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"ca69b3f63c54366747ebc246a503ca78d90f5cf63c09a7c5a4acfbe4392afa12\"" Oct 2 19:23:17.080495 env[1334]: time="2023-10-02T19:23:17.080454198Z" level=info msg="CreateContainer within sandbox \"072a64b58e6707ee99821b6f3e5e53e6a39939791bdd159e351e789fbf5ae411\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"ec449c3956b76e5f777a04e7a55adb1c8b03b314d4837bde505eb1d646972284\"" Oct 2 19:23:17.080860 env[1334]: time="2023-10-02T19:23:17.080684705Z" level=info msg="StartContainer for \"ca69b3f63c54366747ebc246a503ca78d90f5cf63c09a7c5a4acfbe4392afa12\"" Oct 2 19:23:17.083861 env[1334]: time="2023-10-02T19:23:17.083826192Z" level=info msg="CreateContainer within sandbox \"77cf3b3281e60c69528f36893558ec8bbbe1457bdc799267e91659c052d26008\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"090bcb3ee6a680cbadaf09e2e680ec4755dfee63009e09be9764e978aeb89c5a\"" Oct 2 19:23:17.084048 env[1334]: time="2023-10-02T19:23:17.084007097Z" level=info msg="StartContainer for \"ec449c3956b76e5f777a04e7a55adb1c8b03b314d4837bde505eb1d646972284\"" Oct 2 19:23:17.090594 env[1334]: time="2023-10-02T19:23:17.090560080Z" level=info msg="StartContainer for \"090bcb3ee6a680cbadaf09e2e680ec4755dfee63009e09be9764e978aeb89c5a\"" Oct 2 19:23:17.111098 systemd[1]: Started cri-containerd-ca69b3f63c54366747ebc246a503ca78d90f5cf63c09a7c5a4acfbe4392afa12.scope. Oct 2 19:23:17.126832 systemd[1]: Started cri-containerd-ec449c3956b76e5f777a04e7a55adb1c8b03b314d4837bde505eb1d646972284.scope. Oct 2 19:23:17.136662 systemd[1]: Started cri-containerd-090bcb3ee6a680cbadaf09e2e680ec4755dfee63009e09be9764e978aeb89c5a.scope. Oct 2 19:23:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.161466 kernel: audit: type=1400 audit(1696274597.145:1440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.174771 kernel: audit: type=1400 audit(1696274597.145:1441): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.188761 kernel: audit: type=1400 audit(1696274597.145:1442): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.198164 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:23:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit: BPF prog-id=186 op=LOAD Oct 2 19:23:17.145000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[5840]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2149 pid=5840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:23:17.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361363962336636336335343336363734376562633234366135303363 Oct 2 19:23:17.145000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[5840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2149 pid=5840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:23:17.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361363962336636336335343336363734376562633234366135303363 Oct 2 19:23:17.145000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.145000 audit: BPF prog-id=187 op=LOAD Oct 2 19:23:17.145000 audit[5840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001cded0 items=0 ppid=2149 pid=5840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:23:17.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361363962336636336335343336363734376562633234366135303363 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit: BPF prog-id=188 op=LOAD Oct 2 19:23:17.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001cdf18 items=0 ppid=2149 pid=5840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:23:17.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361363962336636336335343336363734376562633234366135303363 Oct 2 19:23:17.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit: BPF prog-id=188 op=UNLOAD Oct 2 19:23:17.190000 audit: BPF prog-id=187 op=UNLOAD Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { perfmon } for pid=5840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit: BPF prog-id=189 op=LOAD Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: AVC avc: denied { bpf } for pid=5840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.190000 audit[5840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001f2328 items=0 ppid=2149 pid=5840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:23:17.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361363962336636336335343336363734376562633234366135303363 Oct 2 19:23:17.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.248000 audit: BPF prog-id=194 op=LOAD Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { bpf } for pid=5857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2553 pid=5857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:23:17.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039306263623365653661363830636261646166303965326536383065 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2553 pid=5857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:23:17.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039306263623365653661363830636261646166303965326536383065 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { bpf } for pid=5857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { bpf } for pid=5857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { bpf } for pid=5857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { bpf } for pid=5857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { bpf } for pid=5857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit: BPF prog-id=195 op=LOAD Oct 2 19:23:17.249000 audit[5857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003a00b0 items=0 ppid=2553 pid=5857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:23:17.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039306263623365653661363830636261646166303965326536383065 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { bpf } for pid=5857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { bpf } for pid=5857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { bpf } for pid=5857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { bpf } for pid=5857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit: BPF prog-id=196 op=LOAD Oct 2 19:23:17.249000 audit[5857]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003a00f8 items=0 ppid=2553 pid=5857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:23:17.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039306263623365653661363830636261646166303965326536383065 Oct 2 19:23:17.249000 audit: BPF prog-id=196 op=UNLOAD Oct 2 19:23:17.249000 audit: BPF prog-id=195 op=UNLOAD Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { bpf } for pid=5857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { bpf } for pid=5857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { bpf } for pid=5857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { perfmon } for pid=5857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { bpf } for pid=5857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit[5857]: AVC avc: denied { bpf } for pid=5857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:23:17.249000 audit: BPF prog-id=197 op=LOAD Oct 2 19:23:17.249000 audit[5857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003a0508 items=0 ppid=2553 pid=5857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:23:17.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039306263623365653661363830636261646166303965326536383065 Oct 2 19:23:17.261396 env[1334]: time="2023-10-02T19:23:17.261357848Z" level=info msg="StartContainer for \"ec449c3956b76e5f777a04e7a55adb1c8b03b314d4837bde505eb1d646972284\" returns successfully" Oct 2 19:23:17.272483 env[1334]: time="2023-10-02T19:23:17.272437157Z" level=info msg="StartContainer for \"ca69b3f63c54366747ebc246a503ca78d90f5cf63c09a7c5a4acfbe4392afa12\" returns successfully" Oct 2 19:23:17.318086 env[1334]: time="2023-10-02T19:23:17.317980928Z" level=info msg="StartContainer for \"090bcb3ee6a680cbadaf09e2e680ec4755dfee63009e09be9764e978aeb89c5a\" returns successfully" Oct 2 19:23:17.663087 kubelet[2460]: E1002 19:23:17.662606 2460 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.0-a-ed15fb6ad9.178a60c0b284a478", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.0-a-ed15fb6ad9", UID:"34d8a86d5fab62f2b5a1da4e91058411", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-ed15fb6ad9"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 23, 10, 403437688, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 23, 10, 403437688, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.17:36878->10.200.8.21:2379: read: connection timed out' (will not retry!) Oct 2 19:23:17.665859 kubelet[2460]: I1002 19:23:17.665681 2460 status_manager.go:809] "Failed to get status for pod" podUID=34d8a86d5fab62f2b5a1da4e91058411 pod="kube-system/kube-apiserver-ci-3510.3.0-a-ed15fb6ad9" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.17:36958->10.200.8.21:2379: read: connection timed out" Oct 2 19:23:18.465000 audit[5883]: AVC avc: denied { watch } for pid=5883 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=6891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:23:18.465000 audit[5883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a08b10 a2=fc6 a3=0 items=0 ppid=2195 pid=5883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:23:18.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:23:18.465000 audit[5883]: AVC avc: denied { watch } for pid=5883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6876 scontext=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:23:18.465000 audit[5883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b26320 a2=fc6 a3=0 items=0 ppid=2195 pid=5883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c533,c880 key=(null) Oct 2 19:23:18.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:23:21.494168 kubelet[2460]: E1002 19:23:21.494136 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" podUID=6a359fc6-593a-402b-bdd8-bb29d5a8560e Oct 2 19:23:23.084819 systemd[1]: run-containerd-runc-k8s.io-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479-runc.R2edYI.mount: Deactivated successfully. Oct 2 19:23:24.078314 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.YvNdes.mount: Deactivated successfully. Oct 2 19:23:25.493828 kubelet[2460]: E1002 19:23:25.493787 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-j2zbp" podUID=5062268a-0b0e-41ea-a78f-0066e6ad7218 Oct 2 19:23:26.775724 kubelet[2460]: E1002 19:23:26.775321 2460 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-ed15fb6ad9?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Oct 2 19:23:27.494307 kubelet[2460]: E1002 19:23:27.494274 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-kpr4m" podUID=8e4f34af-ccb8-43ab-8b95-270c1edaea43 Oct 2 19:23:32.065340 systemd[1]: cri-containerd-090bcb3ee6a680cbadaf09e2e680ec4755dfee63009e09be9764e978aeb89c5a.scope: Deactivated successfully. Oct 2 19:23:32.064000 audit: BPF prog-id=194 op=UNLOAD Oct 2 19:23:32.070281 kernel: kauditd_printk_skb: 237 callbacks suppressed Oct 2 19:23:32.070389 kernel: audit: type=1334 audit(1696274612.064:1489): prog-id=194 op=UNLOAD Oct 2 19:23:32.071000 audit: BPF prog-id=197 op=UNLOAD Oct 2 19:23:32.080587 kernel: audit: type=1334 audit(1696274612.071:1490): prog-id=197 op=UNLOAD Oct 2 19:23:32.092717 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-090bcb3ee6a680cbadaf09e2e680ec4755dfee63009e09be9764e978aeb89c5a-rootfs.mount: Deactivated successfully. Oct 2 19:23:32.191553 env[1334]: time="2023-10-02T19:23:32.191497885Z" level=info msg="shim disconnected" id=090bcb3ee6a680cbadaf09e2e680ec4755dfee63009e09be9764e978aeb89c5a Oct 2 19:23:32.191553 env[1334]: time="2023-10-02T19:23:32.191550086Z" level=warning msg="cleaning up after shim disconnected" id=090bcb3ee6a680cbadaf09e2e680ec4755dfee63009e09be9764e978aeb89c5a namespace=k8s.io Oct 2 19:23:32.192175 env[1334]: time="2023-10-02T19:23:32.191561086Z" level=info msg="cleaning up dead shim" Oct 2 19:23:32.200016 env[1334]: time="2023-10-02T19:23:32.199974880Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:23:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6018 runtime=io.containerd.runc.v2\n" Oct 2 19:23:33.052595 kubelet[2460]: I1002 19:23:33.052560 2460 scope.go:115] "RemoveContainer" containerID="c483f6554720a7b61539f8f9672d7e2b304c944c7107d502f6b236f2e321059b" Oct 2 19:23:33.053076 kubelet[2460]: I1002 19:23:33.052934 2460 scope.go:115] "RemoveContainer" containerID="090bcb3ee6a680cbadaf09e2e680ec4755dfee63009e09be9764e978aeb89c5a" Oct 2 19:23:33.053243 kubelet[2460]: E1002 19:23:33.053210 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-59c686f986-2nk7v_tigera-operator(5c61b3fe-0cbf-4c6f-bea3-305ea89947bc)\"" pod="tigera-operator/tigera-operator-59c686f986-2nk7v" podUID=5c61b3fe-0cbf-4c6f-bea3-305ea89947bc Oct 2 19:23:33.054421 env[1334]: time="2023-10-02T19:23:33.054383656Z" level=info msg="RemoveContainer for \"c483f6554720a7b61539f8f9672d7e2b304c944c7107d502f6b236f2e321059b\"" Oct 2 19:23:33.066667 env[1334]: time="2023-10-02T19:23:33.066615835Z" level=info msg="RemoveContainer for \"c483f6554720a7b61539f8f9672d7e2b304c944c7107d502f6b236f2e321059b\" returns successfully" Oct 2 19:23:33.087261 systemd[1]: run-containerd-runc-k8s.io-11f1b701a50a3512123299264b65063652b2813e6c61a0461e8928a31341e479-runc.55uFYx.mount: Deactivated successfully. Oct 2 19:23:33.254202 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.uuGbhc.mount: Deactivated successfully. Oct 2 19:23:34.246743 systemd[1]: run-containerd-runc-k8s.io-38f9c73923a99119acba3a1ce0ecdb5413f97f02dbad8786c64204a83c9e3cbc-runc.J1ZBaK.mount: Deactivated successfully. Oct 2 19:23:36.493524 kubelet[2460]: E1002 19:23:36.493488 2460 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-75c8955f5f-wcclp" podUID=6a359fc6-593a-402b-bdd8-bb29d5a8560e Oct 2 19:23:36.776075 kubelet[2460]: E1002 19:23:36.775946 2460 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-ed15fb6ad9?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"