Oct 2 19:34:13.023359 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:34:13.023388 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:34:13.023402 kernel: BIOS-provided physical RAM map: Oct 2 19:34:13.023411 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Oct 2 19:34:13.023420 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Oct 2 19:34:13.023429 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Oct 2 19:34:13.023442 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Oct 2 19:34:13.023455 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Oct 2 19:34:13.023469 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Oct 2 19:34:13.023478 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Oct 2 19:34:13.023487 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Oct 2 19:34:13.023496 kernel: printk: bootconsole [earlyser0] enabled Oct 2 19:34:13.023505 kernel: NX (Execute Disable) protection: active Oct 2 19:34:13.023515 kernel: efi: EFI v2.70 by Microsoft Oct 2 19:34:13.023530 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5caa98 RNG=0x3ffd1018 Oct 2 19:34:13.023541 kernel: random: crng init done Oct 2 19:34:13.023551 kernel: SMBIOS 3.1.0 present. Oct 2 19:34:13.023563 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022 Oct 2 19:34:13.023574 kernel: Hypervisor detected: Microsoft Hyper-V Oct 2 19:34:13.023585 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Oct 2 19:34:13.023595 kernel: Hyper-V Host Build:20348-10.0-1-0.1462 Oct 2 19:34:13.023606 kernel: Hyper-V: Nested features: 0x1e0101 Oct 2 19:34:13.023620 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Oct 2 19:34:13.023632 kernel: Hyper-V: Using hypercall for remote TLB flush Oct 2 19:34:13.023643 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Oct 2 19:34:13.023670 kernel: tsc: Marking TSC unstable due to running on Hyper-V Oct 2 19:34:13.023683 kernel: tsc: Detected 2593.907 MHz processor Oct 2 19:34:13.023694 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:34:13.023707 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:34:13.023718 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Oct 2 19:34:13.023730 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:34:13.023741 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Oct 2 19:34:13.023756 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Oct 2 19:34:13.023768 kernel: Using GB pages for direct mapping Oct 2 19:34:13.023780 kernel: Secure boot disabled Oct 2 19:34:13.023791 kernel: ACPI: Early table checksum verification disabled Oct 2 19:34:13.023803 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Oct 2 19:34:13.023815 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:34:13.023826 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:34:13.023839 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Oct 2 19:34:13.023857 kernel: ACPI: FACS 0x000000003FFFE000 000040 Oct 2 19:34:13.023869 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:34:13.023881 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:34:13.023894 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:34:13.023907 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:34:13.023919 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:34:13.023934 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:34:13.023947 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Oct 2 19:34:13.023959 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Oct 2 19:34:13.023972 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Oct 2 19:34:13.023984 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Oct 2 19:34:13.023997 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Oct 2 19:34:13.024010 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Oct 2 19:34:13.024022 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Oct 2 19:34:13.024036 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Oct 2 19:34:13.024049 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Oct 2 19:34:13.024061 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Oct 2 19:34:13.024074 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Oct 2 19:34:13.024086 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 2 19:34:13.024099 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 2 19:34:13.024110 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Oct 2 19:34:13.024122 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Oct 2 19:34:13.024135 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Oct 2 19:34:13.024150 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Oct 2 19:34:13.024162 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Oct 2 19:34:13.024174 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Oct 2 19:34:13.024186 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Oct 2 19:34:13.024198 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Oct 2 19:34:13.024210 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Oct 2 19:34:13.024223 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Oct 2 19:34:13.024235 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Oct 2 19:34:13.024247 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Oct 2 19:34:13.024262 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Oct 2 19:34:13.024273 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Oct 2 19:34:13.024285 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Oct 2 19:34:13.024296 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Oct 2 19:34:13.024307 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Oct 2 19:34:13.024319 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Oct 2 19:34:13.024331 kernel: Zone ranges: Oct 2 19:34:13.024342 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:34:13.024354 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 2 19:34:13.024368 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Oct 2 19:34:13.024379 kernel: Movable zone start for each node Oct 2 19:34:13.024390 kernel: Early memory node ranges Oct 2 19:34:13.024402 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Oct 2 19:34:13.024414 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Oct 2 19:34:13.024425 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Oct 2 19:34:13.024437 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Oct 2 19:34:13.024448 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Oct 2 19:34:13.024459 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:34:13.024473 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Oct 2 19:34:13.024485 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Oct 2 19:34:13.024496 kernel: ACPI: PM-Timer IO Port: 0x408 Oct 2 19:34:13.024507 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Oct 2 19:34:13.024519 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Oct 2 19:34:13.024531 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:34:13.024542 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:34:13.024554 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Oct 2 19:34:13.024565 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Oct 2 19:34:13.024579 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Oct 2 19:34:13.024590 kernel: Booting paravirtualized kernel on Hyper-V Oct 2 19:34:13.024602 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:34:13.024614 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Oct 2 19:34:13.024625 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Oct 2 19:34:13.024637 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Oct 2 19:34:13.024648 kernel: pcpu-alloc: [0] 0 1 Oct 2 19:34:13.024693 kernel: Hyper-V: PV spinlocks enabled Oct 2 19:34:13.024703 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 2 19:34:13.024718 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Oct 2 19:34:13.024729 kernel: Policy zone: Normal Oct 2 19:34:13.024743 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:34:13.024756 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:34:13.024768 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Oct 2 19:34:13.024780 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 19:34:13.024794 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:34:13.024806 kernel: Memory: 8073736K/8387460K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 313464K reserved, 0K cma-reserved) Oct 2 19:34:13.024820 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 19:34:13.024833 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:34:13.024855 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:34:13.024870 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:34:13.024884 kernel: rcu: RCU event tracing is enabled. Oct 2 19:34:13.024896 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 19:34:13.024909 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:34:13.024921 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:34:13.024933 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:34:13.024946 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 19:34:13.024958 kernel: Using NULL legacy PIC Oct 2 19:34:13.024975 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Oct 2 19:34:13.024990 kernel: Console: colour dummy device 80x25 Oct 2 19:34:13.025002 kernel: printk: console [tty1] enabled Oct 2 19:34:13.025016 kernel: printk: console [ttyS0] enabled Oct 2 19:34:13.025028 kernel: printk: bootconsole [earlyser0] disabled Oct 2 19:34:13.025044 kernel: ACPI: Core revision 20210730 Oct 2 19:34:13.025064 kernel: Failed to register legacy timer interrupt Oct 2 19:34:13.025077 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:34:13.025089 kernel: Hyper-V: Using IPI hypercalls Oct 2 19:34:13.025100 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593907) Oct 2 19:34:13.025112 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:34:13.025125 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:34:13.025137 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:34:13.025150 kernel: Spectre V2 : Mitigation: Retpolines Oct 2 19:34:13.025162 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:34:13.025178 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Oct 2 19:34:13.025192 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Oct 2 19:34:13.025204 kernel: RETBleed: Vulnerable Oct 2 19:34:13.025216 kernel: Speculative Store Bypass: Vulnerable Oct 2 19:34:13.025228 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:34:13.025241 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 2 19:34:13.025254 kernel: GDS: Unknown: Dependent on hypervisor status Oct 2 19:34:13.025267 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:34:13.025279 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:34:13.025291 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:34:13.025306 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Oct 2 19:34:13.025319 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Oct 2 19:34:13.025331 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Oct 2 19:34:13.025343 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:34:13.025355 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Oct 2 19:34:13.025367 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Oct 2 19:34:13.025379 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Oct 2 19:34:13.025391 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Oct 2 19:34:13.025403 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:34:13.025415 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:34:13.025428 kernel: LSM: Security Framework initializing Oct 2 19:34:13.025441 kernel: SELinux: Initializing. Oct 2 19:34:13.025458 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:34:13.025472 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 2 19:34:13.025486 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Oct 2 19:34:13.025500 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Oct 2 19:34:13.025514 kernel: signal: max sigframe size: 3632 Oct 2 19:34:13.025528 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:34:13.025541 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 2 19:34:13.025555 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:34:13.025573 kernel: x86: Booting SMP configuration: Oct 2 19:34:13.025587 kernel: .... node #0, CPUs: #1 Oct 2 19:34:13.025603 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Oct 2 19:34:13.025618 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:34:13.025631 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 19:34:13.025645 kernel: smpboot: Max logical packages: 1 Oct 2 19:34:13.025669 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Oct 2 19:34:13.025682 kernel: devtmpfs: initialized Oct 2 19:34:13.025696 kernel: x86/mm: Memory block size: 128MB Oct 2 19:34:13.025709 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Oct 2 19:34:13.025726 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:34:13.025739 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 19:34:13.025753 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:34:13.025766 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:34:13.025780 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:34:13.025794 kernel: audit: type=2000 audit(1696275252.023:1): state=initialized audit_enabled=0 res=1 Oct 2 19:34:13.025806 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:34:13.025820 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:34:13.025833 kernel: cpuidle: using governor menu Oct 2 19:34:13.025849 kernel: ACPI: bus type PCI registered Oct 2 19:34:13.025863 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:34:13.025876 kernel: dca service started, version 1.12.1 Oct 2 19:34:13.025889 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:34:13.025903 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:34:13.025917 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:34:13.025930 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:34:13.025942 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:34:13.025956 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:34:13.025972 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:34:13.025985 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:34:13.025999 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:34:13.026013 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:34:13.026027 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 19:34:13.026040 kernel: ACPI: Interpreter enabled Oct 2 19:34:13.026053 kernel: ACPI: PM: (supports S0 S5) Oct 2 19:34:13.026066 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:34:13.026079 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:34:13.026096 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Oct 2 19:34:13.026109 kernel: iommu: Default domain type: Translated Oct 2 19:34:13.026123 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:34:13.026136 kernel: vgaarb: loaded Oct 2 19:34:13.026149 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:34:13.026162 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:34:13.026175 kernel: PTP clock support registered Oct 2 19:34:13.026189 kernel: Registered efivars operations Oct 2 19:34:13.026202 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:34:13.026215 kernel: PCI: System does not support PCI Oct 2 19:34:13.026231 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Oct 2 19:34:13.026244 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:34:13.026257 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:34:13.026271 kernel: pnp: PnP ACPI init Oct 2 19:34:13.026283 kernel: pnp: PnP ACPI: found 3 devices Oct 2 19:34:13.026296 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:34:13.026309 kernel: NET: Registered PF_INET protocol family Oct 2 19:34:13.026323 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 2 19:34:13.026340 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Oct 2 19:34:13.026353 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:34:13.026367 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:34:13.026380 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 2 19:34:13.026394 kernel: TCP: Hash tables configured (established 65536 bind 65536) Oct 2 19:34:13.026407 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:34:13.026421 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Oct 2 19:34:13.026434 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:34:13.026447 kernel: NET: Registered PF_XDP protocol family Oct 2 19:34:13.026464 kernel: PCI: CLS 0 bytes, default 64 Oct 2 19:34:13.026477 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 2 19:34:13.026491 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Oct 2 19:34:13.026504 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 2 19:34:13.026517 kernel: Initialise system trusted keyrings Oct 2 19:34:13.026531 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Oct 2 19:34:13.026544 kernel: Key type asymmetric registered Oct 2 19:34:13.026557 kernel: Asymmetric key parser 'x509' registered Oct 2 19:34:13.026569 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:34:13.026585 kernel: io scheduler mq-deadline registered Oct 2 19:34:13.026598 kernel: io scheduler kyber registered Oct 2 19:34:13.026611 kernel: io scheduler bfq registered Oct 2 19:34:13.026623 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:34:13.026636 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:34:13.026648 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:34:13.026672 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Oct 2 19:34:13.026684 kernel: i8042: PNP: No PS/2 controller found. Oct 2 19:34:13.026845 kernel: rtc_cmos 00:02: registered as rtc0 Oct 2 19:34:13.026976 kernel: rtc_cmos 00:02: setting system clock to 2023-10-02T19:34:12 UTC (1696275252) Oct 2 19:34:13.027087 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Oct 2 19:34:13.027103 kernel: fail to initialize ptp_kvm Oct 2 19:34:13.027116 kernel: intel_pstate: CPU model not supported Oct 2 19:34:13.027130 kernel: efifb: probing for efifb Oct 2 19:34:13.027143 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Oct 2 19:34:13.027155 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Oct 2 19:34:13.027167 kernel: efifb: scrolling: redraw Oct 2 19:34:13.027183 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Oct 2 19:34:13.027195 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 19:34:13.027209 kernel: fb0: EFI VGA frame buffer device Oct 2 19:34:13.027222 kernel: pstore: Registered efi as persistent store backend Oct 2 19:34:13.027234 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:34:13.027247 kernel: Segment Routing with IPv6 Oct 2 19:34:13.027259 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:34:13.027272 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:34:13.027284 kernel: Key type dns_resolver registered Oct 2 19:34:13.027299 kernel: IPI shorthand broadcast: enabled Oct 2 19:34:13.027312 kernel: sched_clock: Marking stable (761477300, 22278400)->(996856400, -213100700) Oct 2 19:34:13.027325 kernel: registered taskstats version 1 Oct 2 19:34:13.027338 kernel: Loading compiled-in X.509 certificates Oct 2 19:34:13.027350 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:34:13.027363 kernel: Key type .fscrypt registered Oct 2 19:34:13.027375 kernel: Key type fscrypt-provisioning registered Oct 2 19:34:13.027388 kernel: pstore: Using crash dump compression: deflate Oct 2 19:34:13.027403 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 19:34:13.027415 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:34:13.027427 kernel: ima: No architecture policies found Oct 2 19:34:13.027439 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:34:13.027452 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:34:13.027465 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:34:13.027478 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:34:13.027491 kernel: Run /init as init process Oct 2 19:34:13.027504 kernel: with arguments: Oct 2 19:34:13.027517 kernel: /init Oct 2 19:34:13.027532 kernel: with environment: Oct 2 19:34:13.027545 kernel: HOME=/ Oct 2 19:34:13.027557 kernel: TERM=linux Oct 2 19:34:13.027570 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:34:13.027585 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:34:13.027600 systemd[1]: Detected virtualization microsoft. Oct 2 19:34:13.027614 systemd[1]: Detected architecture x86-64. Oct 2 19:34:13.027630 systemd[1]: Running in initrd. Oct 2 19:34:13.027643 systemd[1]: No hostname configured, using default hostname. Oct 2 19:34:13.027668 systemd[1]: Hostname set to . Oct 2 19:34:13.027688 systemd[1]: Initializing machine ID from random generator. Oct 2 19:34:13.027702 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:34:13.027716 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:34:13.027729 systemd[1]: Reached target cryptsetup.target. Oct 2 19:34:13.027742 systemd[1]: Reached target paths.target. Oct 2 19:34:13.027755 systemd[1]: Reached target slices.target. Oct 2 19:34:13.027772 systemd[1]: Reached target swap.target. Oct 2 19:34:13.027786 systemd[1]: Reached target timers.target. Oct 2 19:34:13.027801 systemd[1]: Listening on iscsid.socket. Oct 2 19:34:13.027815 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:34:13.027829 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:34:13.027843 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:34:13.027856 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:34:13.027873 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:34:13.027886 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:34:13.027900 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:34:13.027914 systemd[1]: Reached target sockets.target. Oct 2 19:34:13.027928 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:34:13.027941 systemd[1]: Finished network-cleanup.service. Oct 2 19:34:13.027955 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:34:13.027970 systemd[1]: Starting systemd-journald.service... Oct 2 19:34:13.027983 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:34:13.028000 systemd[1]: Starting systemd-resolved.service... Oct 2 19:34:13.028014 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:34:13.028033 systemd-journald[183]: Journal started Oct 2 19:34:13.028098 systemd-journald[183]: Runtime Journal (/run/log/journal/cf77b1f8b221494c8a80851368ac9262) is 8.0M, max 159.0M, 151.0M free. Oct 2 19:34:13.023485 systemd-modules-load[184]: Inserted module 'overlay' Oct 2 19:34:13.045148 systemd[1]: Started systemd-journald.service. Oct 2 19:34:13.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.046127 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:34:13.062335 kernel: audit: type=1130 audit(1696275253.045:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.060013 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:34:13.066500 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:34:13.095942 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:34:13.095970 kernel: audit: type=1130 audit(1696275253.059:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.091476 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:34:13.094444 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:34:13.104986 systemd-resolved[185]: Positive Trust Anchors: Oct 2 19:34:13.132055 kernel: Bridge firewalling registered Oct 2 19:34:13.132082 kernel: audit: type=1130 audit(1696275253.065:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.104998 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:34:13.106710 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:34:13.109859 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:34:13.153924 kernel: SCSI subsystem initialized Oct 2 19:34:13.128493 systemd-modules-load[184]: Inserted module 'br_netfilter' Oct 2 19:34:13.159159 systemd-resolved[185]: Defaulting to hostname 'linux'. Oct 2 19:34:13.163096 systemd[1]: Started systemd-resolved.service. Oct 2 19:34:13.164243 systemd[1]: Reached target nss-lookup.target. Oct 2 19:34:13.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.177466 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:34:13.204602 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:34:13.204636 kernel: audit: type=1130 audit(1696275253.089:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.204650 kernel: audit: type=1130 audit(1696275253.129:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.204667 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:34:13.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.211195 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:34:13.222830 kernel: audit: type=1130 audit(1696275253.163:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.237198 kernel: audit: type=1130 audit(1696275253.210:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.237414 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:34:13.241175 systemd-modules-load[184]: Inserted module 'dm_multipath' Oct 2 19:34:13.246589 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:34:13.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.255837 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:34:13.269564 kernel: audit: type=1130 audit(1696275253.251:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.269616 dracut-cmdline[200]: dracut-dracut-053 Oct 2 19:34:13.269616 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:34:13.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.278994 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:34:13.304139 kernel: audit: type=1130 audit(1696275253.288:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.352682 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:34:13.366679 kernel: iscsi: registered transport (tcp) Oct 2 19:34:13.391259 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:34:13.391334 kernel: QLogic iSCSI HBA Driver Oct 2 19:34:13.420856 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:34:13.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.426396 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:34:13.479516 kernel: raid6: avx512x4 gen() 16716 MB/s Oct 2 19:34:13.499687 kernel: raid6: avx512x4 xor() 7527 MB/s Oct 2 19:34:13.519673 kernel: raid6: avx512x2 gen() 16977 MB/s Oct 2 19:34:13.540675 kernel: raid6: avx512x2 xor() 28479 MB/s Oct 2 19:34:13.560672 kernel: raid6: avx512x1 gen() 17638 MB/s Oct 2 19:34:13.580678 kernel: raid6: avx512x1 xor() 25822 MB/s Oct 2 19:34:13.600671 kernel: raid6: avx2x4 gen() 18332 MB/s Oct 2 19:34:13.620669 kernel: raid6: avx2x4 xor() 8123 MB/s Oct 2 19:34:13.639679 kernel: raid6: avx2x2 gen() 18593 MB/s Oct 2 19:34:13.659672 kernel: raid6: avx2x2 xor() 22011 MB/s Oct 2 19:34:13.679666 kernel: raid6: avx2x1 gen() 14239 MB/s Oct 2 19:34:13.699666 kernel: raid6: avx2x1 xor() 19237 MB/s Oct 2 19:34:13.719668 kernel: raid6: sse2x4 gen() 11622 MB/s Oct 2 19:34:13.739665 kernel: raid6: sse2x4 xor() 7309 MB/s Oct 2 19:34:13.759667 kernel: raid6: sse2x2 gen() 12791 MB/s Oct 2 19:34:13.779669 kernel: raid6: sse2x2 xor() 7614 MB/s Oct 2 19:34:13.799667 kernel: raid6: sse2x1 gen() 11529 MB/s Oct 2 19:34:13.823087 kernel: raid6: sse2x1 xor() 5871 MB/s Oct 2 19:34:13.823108 kernel: raid6: using algorithm avx2x2 gen() 18593 MB/s Oct 2 19:34:13.823120 kernel: raid6: .... xor() 22011 MB/s, rmw enabled Oct 2 19:34:13.827257 kernel: raid6: using avx512x2 recovery algorithm Oct 2 19:34:13.845678 kernel: xor: automatically using best checksumming function avx Oct 2 19:34:13.940680 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:34:13.949208 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:34:13.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.953000 audit: BPF prog-id=7 op=LOAD Oct 2 19:34:13.953000 audit: BPF prog-id=8 op=LOAD Oct 2 19:34:13.954825 systemd[1]: Starting systemd-udevd.service... Oct 2 19:34:13.969417 systemd-udevd[384]: Using default interface naming scheme 'v252'. Oct 2 19:34:13.974024 systemd[1]: Started systemd-udevd.service. Oct 2 19:34:13.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:13.982191 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:34:13.998849 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation Oct 2 19:34:14.030126 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:34:14.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:14.036071 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:34:14.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:14.070943 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:34:14.117677 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:34:14.142669 kernel: hv_vmbus: Vmbus version:5.2 Oct 2 19:34:14.157980 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:34:14.158029 kernel: AES CTR mode by8 optimization enabled Oct 2 19:34:14.175696 kernel: hv_vmbus: registering driver hv_storvsc Oct 2 19:34:14.187500 kernel: hv_vmbus: registering driver hyperv_keyboard Oct 2 19:34:14.187542 kernel: scsi host0: storvsc_host_t Oct 2 19:34:14.187718 kernel: hv_vmbus: registering driver hv_netvsc Oct 2 19:34:14.187731 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Oct 2 19:34:14.201089 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Oct 2 19:34:14.201671 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 19:34:14.207908 kernel: scsi host1: storvsc_host_t Oct 2 19:34:14.213681 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Oct 2 19:34:14.227673 kernel: hv_vmbus: registering driver hid_hyperv Oct 2 19:34:14.233672 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Oct 2 19:34:14.240672 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Oct 2 19:34:14.258941 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Oct 2 19:34:14.259226 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Oct 2 19:34:14.268401 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Oct 2 19:34:14.268614 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Oct 2 19:34:14.268766 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Oct 2 19:34:14.268888 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 2 19:34:14.271678 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Oct 2 19:34:14.271828 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Oct 2 19:34:14.282668 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:34:14.287670 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 2 19:34:14.410711 kernel: hv_netvsc 000d3ab6-981b-000d-3ab6-981b000d3ab6 eth0: VF slot 1 added Oct 2 19:34:14.429916 kernel: hv_vmbus: registering driver hv_pci Oct 2 19:34:14.429972 kernel: hv_pci 3846841e-2291-4108-bd7a-f0fa4dedf074: PCI VMBus probing: Using version 0x10004 Oct 2 19:34:14.443168 kernel: hv_pci 3846841e-2291-4108-bd7a-f0fa4dedf074: PCI host bridge to bus 2291:00 Oct 2 19:34:14.443350 kernel: pci_bus 2291:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Oct 2 19:34:14.443480 kernel: pci_bus 2291:00: No busn resource found for root bus, will use [bus 00-ff] Oct 2 19:34:14.453750 kernel: pci 2291:00:02.0: [15b3:1016] type 00 class 0x020000 Oct 2 19:34:14.464542 kernel: pci 2291:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Oct 2 19:34:14.481941 kernel: pci 2291:00:02.0: enabling Extended Tags Oct 2 19:34:14.499678 kernel: pci 2291:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 2291:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Oct 2 19:34:14.500424 kernel: pci_bus 2291:00: busn_res: [bus 00-ff] end is updated to 00 Oct 2 19:34:14.510186 kernel: pci 2291:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Oct 2 19:34:14.620546 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:34:14.638154 kernel: mlx5_core 2291:00:02.0: firmware version: 14.30.1224 Oct 2 19:34:14.638396 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (451) Oct 2 19:34:14.658668 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:34:14.785010 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:34:14.801675 kernel: mlx5_core 2291:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Oct 2 19:34:14.866632 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:34:14.870096 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:34:14.871874 systemd[1]: Starting disk-uuid.service... Oct 2 19:34:14.888929 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:34:14.895671 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:34:14.903668 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:34:14.961554 kernel: mlx5_core 2291:00:02.0: Supported tc offload range - chains: 1, prios: 1 Oct 2 19:34:14.961775 kernel: mlx5_core 2291:00:02.0: mlx5e_tc_post_act_init:40:(pid 212): firmware level support is missing Oct 2 19:34:14.970679 kernel: hv_netvsc 000d3ab6-981b-000d-3ab6-981b000d3ab6 eth0: VF registering: eth1 Oct 2 19:34:14.970853 kernel: mlx5_core 2291:00:02.0 eth1: joined to eth0 Oct 2 19:34:14.994673 kernel: mlx5_core 2291:00:02.0 enP8849s1: renamed from eth1 Oct 2 19:34:15.912381 disk-uuid[553]: The operation has completed successfully. Oct 2 19:34:15.915037 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:34:15.980615 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:34:15.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:15.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:15.980751 systemd[1]: Finished disk-uuid.service. Oct 2 19:34:15.991874 systemd[1]: Starting verity-setup.service... Oct 2 19:34:16.024682 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:34:16.226291 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:34:16.231298 systemd[1]: Finished verity-setup.service. Oct 2 19:34:16.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:16.236484 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:34:16.313676 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:34:16.314324 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:34:16.316649 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:34:16.317464 systemd[1]: Starting ignition-setup.service... Oct 2 19:34:16.343260 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:34:16.343296 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:34:16.343327 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:34:16.322149 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:34:16.401551 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 19:34:16.407296 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:34:16.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:16.412000 audit: BPF prog-id=9 op=LOAD Oct 2 19:34:16.413643 systemd[1]: Starting systemd-networkd.service... Oct 2 19:34:16.439034 systemd-networkd[825]: lo: Link UP Oct 2 19:34:16.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:16.439047 systemd-networkd[825]: lo: Gained carrier Oct 2 19:34:16.439626 systemd-networkd[825]: Enumeration completed Oct 2 19:34:16.439718 systemd[1]: Started systemd-networkd.service. Oct 2 19:34:16.443627 systemd[1]: Reached target network.target. Oct 2 19:34:16.444122 systemd-networkd[825]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:34:16.458826 systemd[1]: Starting iscsiuio.service... Oct 2 19:34:16.468421 systemd[1]: Started iscsiuio.service. Oct 2 19:34:16.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:16.474328 systemd[1]: Starting iscsid.service... Oct 2 19:34:16.481488 iscsid[830]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:34:16.481488 iscsid[830]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:34:16.481488 iscsid[830]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:34:16.481488 iscsid[830]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:34:16.505734 iscsid[830]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:34:16.505734 iscsid[830]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:34:16.513872 systemd[1]: Started iscsid.service. Oct 2 19:34:16.523804 kernel: mlx5_core 2291:00:02.0 enP8849s1: Link up Oct 2 19:34:16.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:16.521314 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:34:16.534039 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:34:16.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:16.538611 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:34:16.543161 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:34:16.547956 systemd[1]: Reached target remote-fs.target. Oct 2 19:34:16.552975 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:34:16.561340 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:34:16.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:16.568594 systemd[1]: Finished ignition-setup.service. Oct 2 19:34:16.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:16.573628 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:34:16.586705 kernel: hv_netvsc 000d3ab6-981b-000d-3ab6-981b000d3ab6 eth0: Data path switched to VF: enP8849s1 Oct 2 19:34:16.587433 systemd-networkd[825]: enP8849s1: Link UP Oct 2 19:34:16.594354 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:34:16.587570 systemd-networkd[825]: eth0: Link UP Oct 2 19:34:16.594436 systemd-networkd[825]: eth0: Gained carrier Oct 2 19:34:16.603273 systemd-networkd[825]: enP8849s1: Gained carrier Oct 2 19:34:16.639746 systemd-networkd[825]: eth0: DHCPv4 address 10.200.8.17/24, gateway 10.200.8.1 acquired from 168.63.129.16 Oct 2 19:34:18.441838 systemd-networkd[825]: eth0: Gained IPv6LL Oct 2 19:34:19.120873 ignition[845]: Ignition 2.14.0 Oct 2 19:34:19.120888 ignition[845]: Stage: fetch-offline Oct 2 19:34:19.120967 ignition[845]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:34:19.121009 ignition[845]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:34:19.221269 ignition[845]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:34:19.221448 ignition[845]: parsed url from cmdline: "" Oct 2 19:34:19.221452 ignition[845]: no config URL provided Oct 2 19:34:19.221457 ignition[845]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:34:19.254688 kernel: kauditd_printk_skb: 18 callbacks suppressed Oct 2 19:34:19.254728 kernel: audit: type=1130 audit(1696275259.232:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:19.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:19.227751 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:34:19.221465 ignition[845]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:34:19.234087 systemd[1]: Starting ignition-fetch.service... Oct 2 19:34:19.221471 ignition[845]: failed to fetch config: resource requires networking Oct 2 19:34:19.221714 ignition[845]: Ignition finished successfully Oct 2 19:34:19.242368 ignition[851]: Ignition 2.14.0 Oct 2 19:34:19.242373 ignition[851]: Stage: fetch Oct 2 19:34:19.242484 ignition[851]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:34:19.242508 ignition[851]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:34:19.274567 ignition[851]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:34:19.274761 ignition[851]: parsed url from cmdline: "" Oct 2 19:34:19.274765 ignition[851]: no config URL provided Oct 2 19:34:19.274771 ignition[851]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:34:19.274779 ignition[851]: no config at "/usr/lib/ignition/user.ign" Oct 2 19:34:19.274816 ignition[851]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Oct 2 19:34:19.292440 ignition[851]: GET result: OK Oct 2 19:34:19.292463 ignition[851]: failed to retrieve userdata from IMDS, falling back to custom data: not a config (empty) Oct 2 19:34:19.396525 ignition[851]: opening config device: "/dev/sr0" Oct 2 19:34:19.396988 ignition[851]: getting drive status for "/dev/sr0" Oct 2 19:34:19.397042 ignition[851]: drive status: OK Oct 2 19:34:19.397102 ignition[851]: mounting config device Oct 2 19:34:19.397124 ignition[851]: op(1): [started] mounting "/dev/sr0" at "/tmp/ignition-azure2654570244" Oct 2 19:34:19.422505 ignition[851]: op(1): [finished] mounting "/dev/sr0" at "/tmp/ignition-azure2654570244" Oct 2 19:34:19.426005 kernel: UDF-fs: INFO Mounting volume 'UDF Volume', timestamp 2023/10/03 00:00 (1000) Oct 2 19:34:19.423715 ignition[851]: checking for config drive Oct 2 19:34:19.424036 ignition[851]: reading config Oct 2 19:34:19.424448 ignition[851]: op(2): [started] unmounting "/dev/sr0" at "/tmp/ignition-azure2654570244" Oct 2 19:34:19.429476 ignition[851]: op(2): [finished] unmounting "/dev/sr0" at "/tmp/ignition-azure2654570244" Oct 2 19:34:19.430492 ignition[851]: config has been read from custom data Oct 2 19:34:19.430576 ignition[851]: parsing config with SHA512: 7894ffe340d53d70e7832a57ba1ca6b4ac51473ccf4e370857241b1c53c0cb45b892d6932fd7f61e1c8b48889efcc65cc5776107fb2632fb8f5f885f295eb2a7 Oct 2 19:34:19.436414 systemd[1]: tmp-ignition\x2dazure2654570244.mount: Deactivated successfully. Oct 2 19:34:19.454332 unknown[851]: fetched base config from "system" Oct 2 19:34:19.454347 unknown[851]: fetched base config from "system" Oct 2 19:34:19.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:19.455092 ignition[851]: fetch: fetch complete Oct 2 19:34:19.477871 kernel: audit: type=1130 audit(1696275259.460:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:19.454354 unknown[851]: fetched user config from "azure" Oct 2 19:34:19.455099 ignition[851]: fetch: fetch passed Oct 2 19:34:19.457074 systemd[1]: Finished ignition-fetch.service. Oct 2 19:34:19.455222 ignition[851]: Ignition finished successfully Oct 2 19:34:19.462682 systemd[1]: Starting ignition-kargs.service... Oct 2 19:34:19.481996 ignition[858]: Ignition 2.14.0 Oct 2 19:34:19.482003 ignition[858]: Stage: kargs Oct 2 19:34:19.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:19.491417 systemd[1]: Finished ignition-kargs.service. Oct 2 19:34:19.509935 kernel: audit: type=1130 audit(1696275259.494:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:19.482111 ignition[858]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:34:19.496241 systemd[1]: Starting ignition-disks.service... Oct 2 19:34:19.482139 ignition[858]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:34:19.487915 ignition[858]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:34:19.489214 ignition[858]: kargs: kargs passed Oct 2 19:34:19.489259 ignition[858]: Ignition finished successfully Oct 2 19:34:19.522647 systemd[1]: Finished ignition-disks.service. Oct 2 19:34:19.541749 kernel: audit: type=1130 audit(1696275259.526:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:19.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:19.504444 ignition[865]: Ignition 2.14.0 Oct 2 19:34:19.539857 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:34:19.504451 ignition[865]: Stage: disks Oct 2 19:34:19.546072 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:34:19.504559 ignition[865]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:34:19.504584 ignition[865]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:34:19.519511 ignition[865]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:34:19.521287 ignition[865]: disks: disks passed Oct 2 19:34:19.521335 ignition[865]: Ignition finished successfully Oct 2 19:34:19.562695 systemd[1]: Reached target local-fs.target. Oct 2 19:34:19.564957 systemd[1]: Reached target sysinit.target. Oct 2 19:34:19.565882 systemd[1]: Reached target basic.target. Oct 2 19:34:19.571561 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:34:19.616952 systemd-fsck[873]: ROOT: clean, 603/7326000 files, 481068/7359488 blocks Oct 2 19:34:19.622594 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:34:19.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:19.628287 systemd[1]: Mounting sysroot.mount... Oct 2 19:34:19.643791 kernel: audit: type=1130 audit(1696275259.627:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:19.654700 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:34:19.654898 systemd[1]: Mounted sysroot.mount. Oct 2 19:34:19.656993 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:34:19.682491 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:34:19.688076 systemd[1]: Starting flatcar-metadata-hostname.service... Oct 2 19:34:19.693247 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:34:19.694214 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:34:19.703153 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:34:19.729721 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:34:19.735826 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:34:19.750672 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (883) Oct 2 19:34:19.754153 initrd-setup-root[888]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:34:19.762856 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:34:19.762877 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:34:19.762889 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:34:19.770459 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:34:19.793489 initrd-setup-root[914]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:34:19.807758 initrd-setup-root[922]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:34:19.814529 initrd-setup-root[930]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:34:20.142675 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:34:20.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:20.159096 kernel: audit: type=1130 audit(1696275260.144:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:20.158355 systemd[1]: Starting ignition-mount.service... Oct 2 19:34:20.165620 systemd[1]: Starting sysroot-boot.service... Oct 2 19:34:20.192534 ignition[949]: INFO : Ignition 2.14.0 Oct 2 19:34:20.192534 ignition[949]: INFO : Stage: mount Oct 2 19:34:20.211506 kernel: audit: type=1130 audit(1696275260.196:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:20.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:20.194721 systemd[1]: Finished sysroot-boot.service. Oct 2 19:34:20.213643 ignition[949]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:34:20.213643 ignition[949]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:34:20.213643 ignition[949]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:34:20.213643 ignition[949]: INFO : mount: mount passed Oct 2 19:34:20.213643 ignition[949]: INFO : Ignition finished successfully Oct 2 19:34:20.214129 systemd[1]: Finished ignition-mount.service. Oct 2 19:34:20.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:20.248666 kernel: audit: type=1130 audit(1696275260.234:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:20.424088 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:34:20.424199 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:34:20.938391 coreos-metadata[882]: Oct 02 19:34:20.938 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Oct 2 19:34:20.951826 coreos-metadata[882]: Oct 02 19:34:20.951 INFO Fetch successful Oct 2 19:34:20.985890 coreos-metadata[882]: Oct 02 19:34:20.985 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Oct 2 19:34:21.001854 coreos-metadata[882]: Oct 02 19:34:21.001 INFO Fetch successful Oct 2 19:34:21.017558 coreos-metadata[882]: Oct 02 19:34:21.017 INFO wrote hostname ci-3510.3.0-a-58c23d0da1 to /sysroot/etc/hostname Oct 2 19:34:21.019299 systemd[1]: Finished flatcar-metadata-hostname.service. Oct 2 19:34:21.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:21.027771 systemd[1]: Starting ignition-files.service... Oct 2 19:34:21.041561 kernel: audit: type=1130 audit(1696275261.026:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:21.047107 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:34:21.061668 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (961) Oct 2 19:34:21.071563 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:34:21.071594 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:34:21.071607 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:34:21.079905 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:34:21.092501 ignition[980]: INFO : Ignition 2.14.0 Oct 2 19:34:21.092501 ignition[980]: INFO : Stage: files Oct 2 19:34:21.096529 ignition[980]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:34:21.096529 ignition[980]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:34:21.108159 ignition[980]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:34:21.164253 ignition[980]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:34:21.168014 ignition[980]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:34:21.168014 ignition[980]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:34:21.196635 ignition[980]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:34:21.200754 ignition[980]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:34:21.200754 ignition[980]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:34:21.200754 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:34:21.200754 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Oct 2 19:34:21.197367 unknown[980]: wrote ssh authorized keys file for user: core Oct 2 19:34:21.547709 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 19:34:22.508627 ignition[980]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Oct 2 19:34:22.518629 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:34:22.518629 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.24.2-linux-amd64.tar.gz" Oct 2 19:34:22.518629 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.24.2/crictl-v1.24.2-linux-amd64.tar.gz: attempt #1 Oct 2 19:34:22.721103 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 19:34:23.007957 ignition[980]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 961188117863ca9af5b084e84691e372efee93ad09daf6a0422e8d75a5803f394d8968064f7ca89f14e8973766201e731241f32538cf2c8d91f0233e786302df Oct 2 19:34:23.019387 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.24.2-linux-amd64.tar.gz" Oct 2 19:34:23.019387 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:34:23.019387 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:34:23.209488 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 19:34:24.889776 ignition[980]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 43b8f213f1732c092e34008d5334e6622a6603f7ec5890c395ac911d50069d0dc11a81fa38436df40fc875a10fee6ee13aa285c017f1de210171065e847c99c5 Oct 2 19:34:24.898812 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:34:24.898812 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:34:24.898812 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:34:25.034537 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 19:34:28.461807 ignition[980]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 82b36a0b83a1d48ef1f70e3ed2a263b3ce935304cdc0606d194b290217fb04f98628b0d82e200b51ccf5c05c718b2476274ae710bb143fffe28dc6bbf8407d54 Oct 2 19:34:28.470380 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:34:28.470380 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:34:28.470380 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:34:28.610943 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 19:34:30.188535 ignition[980]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 9006cd791c99f5421c09ae8f6029fdd0ea4608909f590dea41ba4dd5c500440272e9ece21489d1f192966717987251ded5394ea1dd4c5d091b700ac1c8cfa392 Oct 2 19:34:30.197008 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:34:30.197008 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:34:30.197008 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:34:30.197008 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:34:30.197008 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:34:30.197008 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:34:30.232864 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (982) Oct 2 19:34:30.227807 systemd[1]: mnt-oem2415603906.mount: Deactivated successfully. Oct 2 19:34:30.235523 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:34:30.235523 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 19:34:30.235523 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:34:30.235523 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2415603906" Oct 2 19:34:30.235523 ignition[980]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2415603906": device or resource busy Oct 2 19:34:30.235523 ignition[980]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2415603906", trying btrfs: device or resource busy Oct 2 19:34:30.235523 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2415603906" Oct 2 19:34:30.235523 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2415603906" Oct 2 19:34:30.235523 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem2415603906" Oct 2 19:34:30.299687 kernel: audit: type=1130 audit(1696275270.257:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.248905 systemd[1]: mnt-oem1895633918.mount: Deactivated successfully. Oct 2 19:34:30.302070 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem2415603906" Oct 2 19:34:30.302070 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Oct 2 19:34:30.302070 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:34:30.302070 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:34:30.302070 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1895633918" Oct 2 19:34:30.302070 ignition[980]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1895633918": device or resource busy Oct 2 19:34:30.302070 ignition[980]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1895633918", trying btrfs: device or resource busy Oct 2 19:34:30.302070 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1895633918" Oct 2 19:34:30.302070 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1895633918" Oct 2 19:34:30.302070 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem1895633918" Oct 2 19:34:30.302070 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem1895633918" Oct 2 19:34:30.302070 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 19:34:30.302070 ignition[980]: INFO : files: op(13): [started] processing unit "waagent.service" Oct 2 19:34:30.302070 ignition[980]: INFO : files: op(13): [finished] processing unit "waagent.service" Oct 2 19:34:30.302070 ignition[980]: INFO : files: op(14): [started] processing unit "nvidia.service" Oct 2 19:34:30.302070 ignition[980]: INFO : files: op(14): [finished] processing unit "nvidia.service" Oct 2 19:34:30.302070 ignition[980]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:34:30.253378 systemd[1]: Finished ignition-files.service. Oct 2 19:34:30.320317 ignition[980]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:34:30.320317 ignition[980]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:34:30.320317 ignition[980]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:34:30.320317 ignition[980]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Oct 2 19:34:30.320317 ignition[980]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:34:30.320317 ignition[980]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:34:30.320317 ignition[980]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Oct 2 19:34:30.320317 ignition[980]: INFO : files: op(19): [started] setting preset to enabled for "waagent.service" Oct 2 19:34:30.320317 ignition[980]: INFO : files: op(19): [finished] setting preset to enabled for "waagent.service" Oct 2 19:34:30.320317 ignition[980]: INFO : files: op(1a): [started] setting preset to enabled for "nvidia.service" Oct 2 19:34:30.320317 ignition[980]: INFO : files: op(1a): [finished] setting preset to enabled for "nvidia.service" Oct 2 19:34:30.320317 ignition[980]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:34:30.320317 ignition[980]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:34:30.320317 ignition[980]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:34:30.320317 ignition[980]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:34:30.320317 ignition[980]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:34:30.320317 ignition[980]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:34:30.320317 ignition[980]: INFO : files: files passed Oct 2 19:34:30.320317 ignition[980]: INFO : Ignition finished successfully Oct 2 19:34:30.271287 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:34:30.442933 initrd-setup-root-after-ignition[1005]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:34:30.275814 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:34:30.276716 systemd[1]: Starting ignition-quench.service... Oct 2 19:34:30.299761 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:34:30.311203 systemd[1]: Finished ignition-quench.service. Oct 2 19:34:30.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.468799 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:34:30.497262 kernel: audit: type=1130 audit(1696275270.467:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.497299 kernel: audit: type=1131 audit(1696275270.467:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.497541 systemd[1]: Reached target ignition-complete.target. Oct 2 19:34:30.514402 kernel: audit: type=1130 audit(1696275270.496:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.518372 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:34:30.536947 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:34:30.537248 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:34:30.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.559837 systemd[1]: Reached target initrd-fs.target. Oct 2 19:34:30.580906 kernel: audit: type=1130 audit(1696275270.543:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.580930 kernel: audit: type=1131 audit(1696275270.543:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.583540 systemd[1]: Reached target initrd.target. Oct 2 19:34:30.587787 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:34:30.590052 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:34:30.611496 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:34:30.635897 kernel: audit: type=1130 audit(1696275270.613:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.629307 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:34:30.645661 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:34:30.650127 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:34:30.655393 systemd[1]: Stopped target timers.target. Oct 2 19:34:30.662738 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:34:30.663419 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:34:30.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.672316 systemd[1]: Stopped target initrd.target. Oct 2 19:34:30.688439 kernel: audit: type=1131 audit(1696275270.671:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.691110 systemd[1]: Stopped target basic.target. Oct 2 19:34:30.695668 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:34:30.700247 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:34:30.704819 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:34:30.709678 systemd[1]: Stopped target remote-fs.target. Oct 2 19:34:30.713741 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:34:30.718279 systemd[1]: Stopped target sysinit.target. Oct 2 19:34:30.722341 systemd[1]: Stopped target local-fs.target. Oct 2 19:34:30.726377 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:34:30.730639 systemd[1]: Stopped target swap.target. Oct 2 19:34:30.734563 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:34:30.737153 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:34:30.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.741397 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:34:30.758753 kernel: audit: type=1131 audit(1696275270.740:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.758866 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:34:30.761396 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:34:30.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.765755 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:34:30.783601 kernel: audit: type=1131 audit(1696275270.764:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.765896 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:34:30.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.786131 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:34:30.788597 systemd[1]: Stopped ignition-files.service. Oct 2 19:34:30.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.792683 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Oct 2 19:34:30.795509 systemd[1]: Stopped flatcar-metadata-hostname.service. Oct 2 19:34:30.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.801358 systemd[1]: Stopping ignition-mount.service... Oct 2 19:34:30.811198 ignition[1018]: INFO : Ignition 2.14.0 Oct 2 19:34:30.811198 ignition[1018]: INFO : Stage: umount Oct 2 19:34:30.811198 ignition[1018]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:34:30.811198 ignition[1018]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Oct 2 19:34:30.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.804563 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:34:30.833883 ignition[1018]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Oct 2 19:34:30.833883 ignition[1018]: INFO : umount: umount passed Oct 2 19:34:30.833883 ignition[1018]: INFO : Ignition finished successfully Oct 2 19:34:30.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.806745 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:34:30.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.807002 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:34:30.811386 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:34:30.813354 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:34:30.833709 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:34:30.833804 systemd[1]: Stopped ignition-mount.service. Oct 2 19:34:30.841175 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:34:30.841260 systemd[1]: Stopped ignition-disks.service. Oct 2 19:34:30.844537 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:34:30.844581 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:34:30.849100 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 19:34:30.849148 systemd[1]: Stopped ignition-fetch.service. Oct 2 19:34:30.852848 systemd[1]: Stopped target network.target. Oct 2 19:34:30.855797 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:34:30.855849 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:34:30.858194 systemd[1]: Stopped target paths.target. Oct 2 19:34:30.860098 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:34:30.874899 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:34:30.881735 systemd[1]: Stopped target slices.target. Oct 2 19:34:30.883619 systemd[1]: Stopped target sockets.target. Oct 2 19:34:30.889951 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:34:30.890001 systemd[1]: Closed iscsid.socket. Oct 2 19:34:30.906536 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:34:30.908267 systemd[1]: Closed iscsiuio.socket. Oct 2 19:34:30.917488 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:34:30.917547 systemd[1]: Stopped ignition-setup.service. Oct 2 19:34:30.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.922186 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:34:30.925772 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:34:30.932707 systemd-networkd[825]: eth0: DHCPv6 lease lost Oct 2 19:34:30.935792 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:34:30.937378 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:34:30.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.937471 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:34:30.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.943034 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:34:30.943125 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:34:30.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.949858 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:34:30.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.949941 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:34:30.957000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:34:30.957000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:34:30.953857 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:34:30.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.953943 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:34:30.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.958724 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:34:30.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.958756 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:34:30.961869 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:34:30.961915 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:34:30.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:30.964633 systemd[1]: Stopping network-cleanup.service... Oct 2 19:34:30.968116 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:34:30.968174 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:34:30.972252 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:34:30.972302 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:34:30.976959 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:34:30.978704 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:34:30.987251 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:34:31.004070 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:34:31.006783 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:34:31.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:31.011800 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:34:31.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:31.011860 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:34:31.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:31.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:31.014433 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:34:31.014469 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:34:31.019148 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:34:31.019191 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:34:31.021388 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:34:31.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:31.021433 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:34:31.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:31.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:31.023430 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:34:31.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:31.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:31.023469 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:34:31.028268 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:34:31.039535 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 19:34:31.039601 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 19:34:31.044546 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:34:31.044590 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:34:31.048451 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:34:31.048488 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:34:31.081976 kernel: hv_netvsc 000d3ab6-981b-000d-3ab6-981b000d3ab6 eth0: Data path switched from VF: enP8849s1 Oct 2 19:34:31.051208 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:34:31.051297 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:34:31.096365 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:34:31.096447 systemd[1]: Stopped network-cleanup.service. Oct 2 19:34:31.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:31.103273 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:34:31.108549 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:34:31.119608 systemd[1]: Switching root. Oct 2 19:34:31.147090 iscsid[830]: iscsid shutting down. Oct 2 19:34:31.149098 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Oct 2 19:34:31.149167 systemd-journald[183]: Journal stopped Oct 2 19:34:43.557942 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:34:43.557968 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:34:43.557981 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:34:43.557990 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:34:43.557998 kernel: SELinux: policy capability open_perms=1 Oct 2 19:34:43.558009 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:34:43.558019 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:34:43.558031 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:34:43.558039 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:34:43.558051 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:34:43.558061 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:34:43.558072 systemd[1]: Successfully loaded SELinux policy in 305.339ms. Oct 2 19:34:43.558084 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 23.415ms. Oct 2 19:34:43.558095 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:34:43.558111 systemd[1]: Detected virtualization microsoft. Oct 2 19:34:43.558120 systemd[1]: Detected architecture x86-64. Oct 2 19:34:43.558132 systemd[1]: Detected first boot. Oct 2 19:34:43.558143 systemd[1]: Hostname set to . Oct 2 19:34:43.558154 systemd[1]: Initializing machine ID from random generator. Oct 2 19:34:43.558166 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:34:43.558177 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:34:43.558191 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:34:43.558201 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:34:43.558213 kernel: kauditd_printk_skb: 40 callbacks suppressed Oct 2 19:34:43.558223 kernel: audit: type=1334 audit(1696275283.020:88): prog-id=12 op=LOAD Oct 2 19:34:43.558233 kernel: audit: type=1334 audit(1696275283.020:89): prog-id=3 op=UNLOAD Oct 2 19:34:43.558245 kernel: audit: type=1334 audit(1696275283.025:90): prog-id=13 op=LOAD Oct 2 19:34:43.558255 kernel: audit: type=1334 audit(1696275283.030:91): prog-id=14 op=LOAD Oct 2 19:34:43.558266 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:34:43.558276 kernel: audit: type=1334 audit(1696275283.031:92): prog-id=4 op=UNLOAD Oct 2 19:34:43.558287 kernel: audit: type=1334 audit(1696275283.031:93): prog-id=5 op=UNLOAD Oct 2 19:34:43.558298 kernel: audit: type=1131 audit(1696275283.032:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.558310 systemd[1]: Stopped iscsiuio.service. Oct 2 19:34:43.558322 kernel: audit: type=1334 audit(1696275283.077:95): prog-id=12 op=UNLOAD Oct 2 19:34:43.558334 kernel: audit: type=1131 audit(1696275283.083:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.558344 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:34:43.558356 systemd[1]: Stopped iscsid.service. Oct 2 19:34:43.558365 kernel: audit: type=1131 audit(1696275283.105:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.558377 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:34:43.558388 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:34:43.558401 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:34:43.558416 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:34:43.558427 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:34:43.558438 systemd[1]: Created slice system-getty.slice. Oct 2 19:34:43.558448 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:34:43.558460 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:34:43.558472 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:34:43.558482 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:34:43.558493 systemd[1]: Created slice user.slice. Oct 2 19:34:43.558506 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:34:43.558518 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:34:43.558529 systemd[1]: Set up automount boot.automount. Oct 2 19:34:43.558542 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:34:43.558554 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:34:43.558564 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:34:43.558575 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:34:43.558585 systemd[1]: Reached target integritysetup.target. Oct 2 19:34:43.558600 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:34:43.558609 systemd[1]: Reached target remote-fs.target. Oct 2 19:34:43.558622 systemd[1]: Reached target slices.target. Oct 2 19:34:43.558633 systemd[1]: Reached target swap.target. Oct 2 19:34:43.558644 systemd[1]: Reached target torcx.target. Oct 2 19:34:43.558672 systemd[1]: Reached target veritysetup.target. Oct 2 19:34:43.558686 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:34:43.558697 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:34:43.558708 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:34:43.558721 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:34:43.558731 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:34:43.558744 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:34:43.558755 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:34:43.558766 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:34:43.558779 systemd[1]: Mounting media.mount... Oct 2 19:34:43.558792 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:34:43.558805 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:34:43.558814 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:34:43.558827 systemd[1]: Mounting tmp.mount... Oct 2 19:34:43.558840 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:34:43.558850 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:34:43.558862 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:34:43.558876 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:34:43.558888 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:34:43.558897 systemd[1]: Starting modprobe@drm.service... Oct 2 19:34:43.558910 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:34:43.558923 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:34:43.558932 systemd[1]: Starting modprobe@loop.service... Oct 2 19:34:43.558945 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:34:43.558956 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:34:43.558967 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:34:43.558980 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:34:43.558991 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:34:43.559004 systemd[1]: Stopped systemd-journald.service. Oct 2 19:34:43.559014 systemd[1]: Starting systemd-journald.service... Oct 2 19:34:43.559025 kernel: loop: module loaded Oct 2 19:34:43.559037 kernel: fuse: init (API version 7.34) Oct 2 19:34:43.559048 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:34:43.559058 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:34:43.559071 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:34:43.559085 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:34:43.559095 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:34:43.559107 systemd[1]: Stopped verity-setup.service. Oct 2 19:34:43.559118 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:34:43.559130 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:34:43.559140 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:34:43.559152 systemd[1]: Mounted media.mount. Oct 2 19:34:43.559164 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:34:43.559175 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:34:43.559193 systemd-journald[1148]: Journal started Oct 2 19:34:43.559235 systemd-journald[1148]: Runtime Journal (/run/log/journal/221516db5d464c86a114d72a6f22baf7) is 8.0M, max 159.0M, 151.0M free. Oct 2 19:34:33.244000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:34:33.915000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:34:33.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:34:33.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:34:33.930000 audit: BPF prog-id=10 op=LOAD Oct 2 19:34:33.930000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:34:33.930000 audit: BPF prog-id=11 op=LOAD Oct 2 19:34:33.930000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:34:43.020000 audit: BPF prog-id=12 op=LOAD Oct 2 19:34:43.020000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:34:43.025000 audit: BPF prog-id=13 op=LOAD Oct 2 19:34:43.030000 audit: BPF prog-id=14 op=LOAD Oct 2 19:34:43.031000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:34:43.031000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:34:43.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.077000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:34:43.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.454000 audit: BPF prog-id=15 op=LOAD Oct 2 19:34:43.454000 audit: BPF prog-id=16 op=LOAD Oct 2 19:34:43.454000 audit: BPF prog-id=17 op=LOAD Oct 2 19:34:43.454000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:34:43.454000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:34:43.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.554000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:34:43.554000 audit[1148]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe566e44a0 a2=4000 a3=7ffe566e453c items=0 ppid=1 pid=1148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:43.554000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:34:43.018905 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:34:35.097810 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:34:43.032974 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:34:35.098225 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:34:35.098247 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:34:35.098284 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:34:35.098296 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:34:35.098340 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:34:35.098354 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:34:35.098571 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:34:35.098625 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:34:35.098642 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:34:35.099176 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:34:35.099220 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:34:35.099242 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:34:35.099259 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:34:35.099277 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:34:35.099293 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:35Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:34:41.632003 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:41Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:34:41.632319 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:41Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:34:41.632463 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:41Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:34:41.632690 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:41Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:34:41.632755 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:41Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:34:41.632822 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2023-10-02T19:34:41Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:34:43.568950 systemd[1]: Started systemd-journald.service. Oct 2 19:34:43.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.569457 systemd[1]: Mounted tmp.mount. Oct 2 19:34:43.571259 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:34:43.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.574526 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:34:43.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.577291 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:34:43.577434 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:34:43.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.579966 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:34:43.580098 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:34:43.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.582834 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:34:43.582966 systemd[1]: Finished modprobe@drm.service. Oct 2 19:34:43.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.585465 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:34:43.585588 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:34:43.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.588234 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:34:43.588369 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:34:43.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.590939 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:34:43.591071 systemd[1]: Finished modprobe@loop.service. Oct 2 19:34:43.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.593593 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:34:43.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.596270 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:34:43.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.599463 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:34:43.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.602100 systemd[1]: Reached target network-pre.target. Oct 2 19:34:43.606639 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:34:43.612836 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:34:43.614825 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:34:43.629677 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:34:43.633212 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:34:43.635947 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:34:43.637372 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:34:43.639768 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:34:43.641336 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:34:43.644868 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:34:43.651200 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:34:43.656264 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:34:43.676748 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:34:43.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.679349 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:34:43.686986 systemd-journald[1148]: Time spent on flushing to /var/log/journal/221516db5d464c86a114d72a6f22baf7 is 17.197ms for 1169 entries. Oct 2 19:34:43.686986 systemd-journald[1148]: System Journal (/var/log/journal/221516db5d464c86a114d72a6f22baf7) is 8.0M, max 2.6G, 2.6G free. Oct 2 19:34:43.747112 systemd-journald[1148]: Received client request to flush runtime journal. Oct 2 19:34:43.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.691476 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:34:43.695961 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:34:43.747503 udevadm[1174]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 19:34:43.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:43.724014 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:34:43.747948 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:34:44.076877 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:34:44.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:44.080810 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:34:44.396697 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:34:44.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:44.731369 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:34:44.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:44.734000 audit: BPF prog-id=18 op=LOAD Oct 2 19:34:44.734000 audit: BPF prog-id=19 op=LOAD Oct 2 19:34:44.734000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:34:44.734000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:34:44.735576 systemd[1]: Starting systemd-udevd.service... Oct 2 19:34:44.754101 systemd-udevd[1179]: Using default interface naming scheme 'v252'. Oct 2 19:34:44.947693 systemd[1]: Started systemd-udevd.service. Oct 2 19:34:44.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:44.951000 audit: BPF prog-id=20 op=LOAD Oct 2 19:34:44.953242 systemd[1]: Starting systemd-networkd.service... Oct 2 19:34:44.990038 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 19:34:45.034000 audit: BPF prog-id=21 op=LOAD Oct 2 19:34:45.034000 audit: BPF prog-id=22 op=LOAD Oct 2 19:34:45.034000 audit: BPF prog-id=23 op=LOAD Oct 2 19:34:45.036692 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:34:45.041000 audit[1188]: AVC avc: denied { confidentiality } for pid=1188 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:34:45.065670 kernel: hv_vmbus: registering driver hv_balloon Oct 2 19:34:45.073733 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:34:45.073798 kernel: hv_vmbus: registering driver hyperv_fb Oct 2 19:34:45.094678 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Oct 2 19:34:45.041000 audit[1188]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d3e0fefe00 a1=f884 a2=7fdf20ff3bc5 a3=5 items=10 ppid=1179 pid=1188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:45.041000 audit: CWD cwd="/" Oct 2 19:34:45.041000 audit: PATH item=0 name=(null) inode=15802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:34:45.041000 audit: PATH item=1 name=(null) inode=15803 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:34:45.041000 audit: PATH item=2 name=(null) inode=15802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:34:45.041000 audit: PATH item=3 name=(null) inode=15804 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:34:45.041000 audit: PATH item=4 name=(null) inode=15802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:34:45.041000 audit: PATH item=5 name=(null) inode=15805 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:34:45.041000 audit: PATH item=6 name=(null) inode=15802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:34:45.041000 audit: PATH item=7 name=(null) inode=15806 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:34:45.041000 audit: PATH item=8 name=(null) inode=15802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:34:45.041000 audit: PATH item=9 name=(null) inode=15807 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:34:45.041000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:34:45.109665 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Oct 2 19:34:45.109724 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Oct 2 19:34:45.115511 systemd[1]: Started systemd-userdbd.service. Oct 2 19:34:45.122609 kernel: hv_utils: Registering HyperV Utility Driver Oct 2 19:34:45.122666 kernel: hv_vmbus: registering driver hv_utils Oct 2 19:34:45.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:45.129677 kernel: hv_utils: Heartbeat IC version 3.0 Oct 2 19:34:45.129740 kernel: hv_utils: Shutdown IC version 3.2 Oct 2 19:34:45.134846 kernel: hv_utils: TimeSync IC version 4.0 Oct 2 19:34:45.801976 kernel: Console: switching to colour dummy device 80x25 Oct 2 19:34:45.808842 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 19:34:45.985901 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1182) Oct 2 19:34:46.020894 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Oct 2 19:34:46.048812 systemd-networkd[1190]: lo: Link UP Oct 2 19:34:46.048827 systemd-networkd[1190]: lo: Gained carrier Oct 2 19:34:46.049461 systemd-networkd[1190]: Enumeration completed Oct 2 19:34:46.049567 systemd[1]: Started systemd-networkd.service. Oct 2 19:34:46.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:46.054192 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:34:46.068621 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:34:46.072896 systemd-networkd[1190]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:34:46.105899 kernel: mlx5_core 2291:00:02.0 enP8849s1: Link up Oct 2 19:34:46.143845 systemd-networkd[1190]: enP8849s1: Link UP Oct 2 19:34:46.144033 kernel: hv_netvsc 000d3ab6-981b-000d-3ab6-981b000d3ab6 eth0: Data path switched to VF: enP8849s1 Oct 2 19:34:46.144471 systemd-networkd[1190]: eth0: Link UP Oct 2 19:34:46.144557 systemd-networkd[1190]: eth0: Gained carrier Oct 2 19:34:46.149142 systemd-networkd[1190]: enP8849s1: Gained carrier Oct 2 19:34:46.171026 systemd-networkd[1190]: eth0: DHCPv4 address 10.200.8.17/24, gateway 10.200.8.1 acquired from 168.63.129.16 Oct 2 19:34:46.172564 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:34:46.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:46.176664 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:34:46.429199 lvm[1257]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:34:46.461028 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:34:46.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:46.464262 systemd[1]: Reached target cryptsetup.target. Oct 2 19:34:46.468245 systemd[1]: Starting lvm2-activation.service... Oct 2 19:34:46.473570 lvm[1258]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:34:46.493788 systemd[1]: Finished lvm2-activation.service. Oct 2 19:34:46.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:46.496949 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:34:46.499638 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:34:46.499676 systemd[1]: Reached target local-fs.target. Oct 2 19:34:46.501811 systemd[1]: Reached target machines.target. Oct 2 19:34:46.505296 systemd[1]: Starting ldconfig.service... Oct 2 19:34:46.518254 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:34:46.518349 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:34:46.519544 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:34:46.522969 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:34:46.527123 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:34:46.529959 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:34:46.530064 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:34:46.531125 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:34:46.559324 systemd-tmpfiles[1263]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:34:47.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:47.104422 systemd-tmpfiles[1263]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:34:47.143375 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1260 (bootctl) Oct 2 19:34:47.144895 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:34:47.436153 systemd-networkd[1190]: eth0: Gained IPv6LL Oct 2 19:34:47.442834 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:34:47.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:47.452543 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:34:47.461274 systemd-tmpfiles[1263]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:34:47.908427 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:34:47.909101 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:34:47.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:48.234890 systemd-fsck[1270]: fsck.fat 4.2 (2021-01-31) Oct 2 19:34:48.234890 systemd-fsck[1270]: /dev/sda1: 789 files, 115069/258078 clusters Oct 2 19:34:48.237158 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:34:48.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:48.242377 systemd[1]: Mounting boot.mount... Oct 2 19:34:48.255861 systemd[1]: Mounted boot.mount. Oct 2 19:34:48.270375 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:34:48.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:48.812539 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:34:48.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:48.816754 systemd[1]: Starting audit-rules.service... Oct 2 19:34:48.818752 kernel: kauditd_printk_skb: 73 callbacks suppressed Oct 2 19:34:48.818821 kernel: audit: type=1130 audit(1696275288.815:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:48.833647 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:34:48.837200 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:34:48.841824 systemd[1]: Starting systemd-resolved.service... Oct 2 19:34:48.849389 kernel: audit: type=1334 audit(1696275288.839:157): prog-id=24 op=LOAD Oct 2 19:34:48.839000 audit: BPF prog-id=24 op=LOAD Oct 2 19:34:48.847000 audit: BPF prog-id=25 op=LOAD Oct 2 19:34:48.850927 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:34:48.854648 kernel: audit: type=1334 audit(1696275288.847:158): prog-id=25 op=LOAD Oct 2 19:34:48.856404 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:34:48.879000 audit[1282]: SYSTEM_BOOT pid=1282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:34:48.881186 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:34:48.892892 kernel: audit: type=1127 audit(1696275288.879:159): pid=1282 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 19:34:48.913291 kernel: audit: type=1130 audit(1696275288.894:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:48.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:48.942900 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:34:48.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:48.946191 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:34:48.958902 kernel: audit: type=1130 audit(1696275288.944:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:48.989860 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:34:48.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:48.992582 systemd[1]: Reached target time-set.target. Oct 2 19:34:49.007072 kernel: audit: type=1130 audit(1696275288.991:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:49.007839 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:34:49.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:49.024022 kernel: audit: type=1130 audit(1696275289.010:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:34:49.069775 systemd-resolved[1280]: Positive Trust Anchors: Oct 2 19:34:49.069794 systemd-resolved[1280]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:34:49.069832 systemd-resolved[1280]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:34:49.077000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:34:49.078184 augenrules[1297]: No rules Oct 2 19:34:49.079060 systemd[1]: Finished audit-rules.service. Oct 2 19:34:49.077000 audit[1297]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffca3578630 a2=420 a3=0 items=0 ppid=1276 pid=1297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:49.105790 kernel: audit: type=1305 audit(1696275289.077:164): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:34:49.105855 kernel: audit: type=1300 audit(1696275289.077:164): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffca3578630 a2=420 a3=0 items=0 ppid=1276 pid=1297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:34:49.077000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:34:49.173893 systemd-resolved[1280]: Using system hostname 'ci-3510.3.0-a-58c23d0da1'. Oct 2 19:34:49.175691 systemd[1]: Started systemd-resolved.service. Oct 2 19:34:49.178166 systemd[1]: Reached target network.target. Oct 2 19:34:49.180606 systemd[1]: Reached target network-online.target. Oct 2 19:34:49.182898 systemd[1]: Reached target nss-lookup.target. Oct 2 19:34:49.215189 systemd-timesyncd[1281]: Contacted time server 162.159.200.123:123 (0.flatcar.pool.ntp.org). Oct 2 19:34:49.215265 systemd-timesyncd[1281]: Initial clock synchronization to Mon 2023-10-02 19:34:49.215810 UTC. Oct 2 19:34:53.244178 ldconfig[1259]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:34:53.259663 systemd[1]: Finished ldconfig.service. Oct 2 19:34:53.264725 systemd[1]: Starting systemd-update-done.service... Oct 2 19:34:53.287371 systemd[1]: Finished systemd-update-done.service. Oct 2 19:34:53.290113 systemd[1]: Reached target sysinit.target. Oct 2 19:34:53.292479 systemd[1]: Started motdgen.path. Oct 2 19:34:53.294354 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:34:53.297863 systemd[1]: Started logrotate.timer. Oct 2 19:34:53.300785 systemd[1]: Started mdadm.timer. Oct 2 19:34:53.302662 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:34:53.304797 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:34:53.304832 systemd[1]: Reached target paths.target. Oct 2 19:34:53.306742 systemd[1]: Reached target timers.target. Oct 2 19:34:53.309027 systemd[1]: Listening on dbus.socket. Oct 2 19:34:53.312047 systemd[1]: Starting docker.socket... Oct 2 19:34:53.336970 systemd[1]: Listening on sshd.socket. Oct 2 19:34:53.339418 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:34:53.339946 systemd[1]: Listening on docker.socket. Oct 2 19:34:53.342001 systemd[1]: Reached target sockets.target. Oct 2 19:34:53.344016 systemd[1]: Reached target basic.target. Oct 2 19:34:53.346040 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:34:53.346071 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:34:53.347235 systemd[1]: Starting containerd.service... Oct 2 19:34:53.350818 systemd[1]: Starting dbus.service... Oct 2 19:34:53.353843 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:34:53.357276 systemd[1]: Starting extend-filesystems.service... Oct 2 19:34:53.359677 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:34:53.361209 systemd[1]: Starting motdgen.service... Oct 2 19:34:53.364350 systemd[1]: Started nvidia.service. Oct 2 19:34:53.369040 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:34:53.372444 systemd[1]: Starting prepare-critools.service... Oct 2 19:34:53.376159 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:34:53.380601 systemd[1]: Starting sshd-keygen.service... Oct 2 19:34:53.386710 systemd[1]: Starting systemd-logind.service... Oct 2 19:34:53.388915 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:34:53.388994 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 19:34:53.389530 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:34:53.390841 systemd[1]: Starting update-engine.service... Oct 2 19:34:53.394445 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:34:53.402102 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:34:53.402353 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:34:53.432583 jq[1324]: true Oct 2 19:34:53.433526 jq[1307]: false Oct 2 19:34:53.435120 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:34:53.435315 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:34:53.448970 extend-filesystems[1308]: Found sda Oct 2 19:34:53.451229 extend-filesystems[1308]: Found sda1 Oct 2 19:34:53.452921 extend-filesystems[1308]: Found sda2 Oct 2 19:34:53.454689 extend-filesystems[1308]: Found sda3 Oct 2 19:34:53.454689 extend-filesystems[1308]: Found usr Oct 2 19:34:53.454689 extend-filesystems[1308]: Found sda4 Oct 2 19:34:53.454689 extend-filesystems[1308]: Found sda6 Oct 2 19:34:53.454689 extend-filesystems[1308]: Found sda7 Oct 2 19:34:53.454689 extend-filesystems[1308]: Found sda9 Oct 2 19:34:53.454689 extend-filesystems[1308]: Checking size of /dev/sda9 Oct 2 19:34:53.476968 jq[1333]: true Oct 2 19:34:53.478447 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:34:53.478679 systemd[1]: Finished motdgen.service. Oct 2 19:34:53.537549 systemd-logind[1320]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 2 19:34:53.541083 systemd-logind[1320]: New seat seat0. Oct 2 19:34:53.546545 extend-filesystems[1308]: Old size kept for /dev/sda9 Oct 2 19:34:53.556976 extend-filesystems[1308]: Found sr0 Oct 2 19:34:53.561215 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:34:53.561403 systemd[1]: Finished extend-filesystems.service. Oct 2 19:34:53.568191 tar[1327]: ./ Oct 2 19:34:53.568191 tar[1327]: ./macvlan Oct 2 19:34:53.572621 tar[1328]: crictl Oct 2 19:34:53.596403 env[1342]: time="2023-10-02T19:34:53.596355011Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:34:53.601127 bash[1354]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:34:53.601644 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:34:53.635239 dbus-daemon[1306]: [system] SELinux support is enabled Oct 2 19:34:53.635410 systemd[1]: Started dbus.service. Oct 2 19:34:53.640235 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:34:53.640258 systemd[1]: Reached target system-config.target. Oct 2 19:34:53.642737 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:34:53.642767 systemd[1]: Reached target user-config.target. Oct 2 19:34:53.650003 systemd[1]: Started systemd-logind.service. Oct 2 19:34:53.682550 env[1342]: time="2023-10-02T19:34:53.682504168Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:34:53.690076 env[1342]: time="2023-10-02T19:34:53.690035344Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:34:53.691659 env[1342]: time="2023-10-02T19:34:53.691625302Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:34:53.691775 env[1342]: time="2023-10-02T19:34:53.691757807Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:34:53.692109 env[1342]: time="2023-10-02T19:34:53.692081219Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:34:53.692209 env[1342]: time="2023-10-02T19:34:53.692193723Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:34:53.692287 env[1342]: time="2023-10-02T19:34:53.692272126Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:34:53.692349 env[1342]: time="2023-10-02T19:34:53.692338329Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:34:53.692489 env[1342]: time="2023-10-02T19:34:53.692473333Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:34:53.692805 env[1342]: time="2023-10-02T19:34:53.692784045Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:34:53.693081 env[1342]: time="2023-10-02T19:34:53.693058355Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:34:53.693168 env[1342]: time="2023-10-02T19:34:53.693154458Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:34:53.693286 env[1342]: time="2023-10-02T19:34:53.693270063Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:34:53.693349 env[1342]: time="2023-10-02T19:34:53.693337965Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:34:53.717901 env[1342]: time="2023-10-02T19:34:53.717265642Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:34:53.717901 env[1342]: time="2023-10-02T19:34:53.717310944Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:34:53.717901 env[1342]: time="2023-10-02T19:34:53.717330945Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:34:53.717901 env[1342]: time="2023-10-02T19:34:53.717378646Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:34:53.717901 env[1342]: time="2023-10-02T19:34:53.717398847Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:34:53.717901 env[1342]: time="2023-10-02T19:34:53.717416848Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:34:53.717901 env[1342]: time="2023-10-02T19:34:53.717435348Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:34:53.717901 env[1342]: time="2023-10-02T19:34:53.717453749Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:34:53.717901 env[1342]: time="2023-10-02T19:34:53.717471150Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:34:53.717901 env[1342]: time="2023-10-02T19:34:53.717487850Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:34:53.717901 env[1342]: time="2023-10-02T19:34:53.717506551Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:34:53.717901 env[1342]: time="2023-10-02T19:34:53.717523752Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:34:53.717901 env[1342]: time="2023-10-02T19:34:53.717653056Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:34:53.717901 env[1342]: time="2023-10-02T19:34:53.717741160Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:34:53.719204 env[1342]: time="2023-10-02T19:34:53.718792798Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:34:53.719204 env[1342]: time="2023-10-02T19:34:53.718833600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:34:53.719204 env[1342]: time="2023-10-02T19:34:53.718865401Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:34:53.719204 env[1342]: time="2023-10-02T19:34:53.718948504Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:34:53.719204 env[1342]: time="2023-10-02T19:34:53.719027507Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:34:53.719204 env[1342]: time="2023-10-02T19:34:53.719059308Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:34:53.719204 env[1342]: time="2023-10-02T19:34:53.719075908Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:34:53.719204 env[1342]: time="2023-10-02T19:34:53.719092409Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:34:53.719204 env[1342]: time="2023-10-02T19:34:53.719109410Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:34:53.719204 env[1342]: time="2023-10-02T19:34:53.719138211Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:34:53.719204 env[1342]: time="2023-10-02T19:34:53.719155911Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:34:53.719204 env[1342]: time="2023-10-02T19:34:53.719176112Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:34:53.719893 env[1342]: time="2023-10-02T19:34:53.719859337Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:34:53.720009 env[1342]: time="2023-10-02T19:34:53.719991342Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:34:53.720107 env[1342]: time="2023-10-02T19:34:53.720091446Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:34:53.720203 env[1342]: time="2023-10-02T19:34:53.720186949Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:34:53.720304 env[1342]: time="2023-10-02T19:34:53.720284853Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:34:53.720400 env[1342]: time="2023-10-02T19:34:53.720385756Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:34:53.720508 env[1342]: time="2023-10-02T19:34:53.720493660Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:34:53.720617 env[1342]: time="2023-10-02T19:34:53.720603064Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:34:53.721031 env[1342]: time="2023-10-02T19:34:53.720955077Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:34:53.749917 env[1342]: time="2023-10-02T19:34:53.721176085Z" level=info msg="Connect containerd service" Oct 2 19:34:53.749917 env[1342]: time="2023-10-02T19:34:53.721233388Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:34:53.749917 env[1342]: time="2023-10-02T19:34:53.722000516Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:34:53.749917 env[1342]: time="2023-10-02T19:34:53.722125820Z" level=info msg="Start subscribing containerd event" Oct 2 19:34:53.749917 env[1342]: time="2023-10-02T19:34:53.722176922Z" level=info msg="Start recovering state" Oct 2 19:34:53.749917 env[1342]: time="2023-10-02T19:34:53.722243225Z" level=info msg="Start event monitor" Oct 2 19:34:53.749917 env[1342]: time="2023-10-02T19:34:53.722269225Z" level=info msg="Start snapshots syncer" Oct 2 19:34:53.749917 env[1342]: time="2023-10-02T19:34:53.722281726Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:34:53.749917 env[1342]: time="2023-10-02T19:34:53.722293126Z" level=info msg="Start streaming server" Oct 2 19:34:53.749917 env[1342]: time="2023-10-02T19:34:53.722338728Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:34:53.749917 env[1342]: time="2023-10-02T19:34:53.722397830Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:34:53.749917 env[1342]: time="2023-10-02T19:34:53.722462833Z" level=info msg="containerd successfully booted in 0.129214s" Oct 2 19:34:53.722519 systemd[1]: Started containerd.service. Oct 2 19:34:53.731267 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 19:34:53.752514 tar[1327]: ./static Oct 2 19:34:53.850152 tar[1327]: ./vlan Oct 2 19:34:53.929030 tar[1327]: ./portmap Oct 2 19:34:54.001327 tar[1327]: ./host-local Oct 2 19:34:54.060001 tar[1327]: ./vrf Oct 2 19:34:54.105277 systemd[1]: Finished prepare-critools.service. Oct 2 19:34:54.125847 tar[1327]: ./bridge Oct 2 19:34:54.173279 tar[1327]: ./tuning Oct 2 19:34:54.210387 tar[1327]: ./firewall Oct 2 19:34:54.230404 update_engine[1321]: I1002 19:34:54.229609 1321 main.cc:92] Flatcar Update Engine starting Oct 2 19:34:54.255676 tar[1327]: ./host-device Oct 2 19:34:54.283947 systemd[1]: Started update-engine.service. Oct 2 19:34:54.286650 update_engine[1321]: I1002 19:34:54.285595 1321 update_check_scheduler.cc:74] Next update check in 7m16s Oct 2 19:34:54.289101 systemd[1]: Started locksmithd.service. Oct 2 19:34:54.299994 tar[1327]: ./sbr Oct 2 19:34:54.332440 tar[1327]: ./loopback Oct 2 19:34:54.364362 tar[1327]: ./dhcp Oct 2 19:34:54.456440 tar[1327]: ./ptp Oct 2 19:34:54.498532 tar[1327]: ./ipvlan Oct 2 19:34:54.539284 tar[1327]: ./bandwidth Oct 2 19:34:54.615137 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:34:54.971553 sshd_keygen[1332]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:34:54.991373 systemd[1]: Finished sshd-keygen.service. Oct 2 19:34:54.995097 systemd[1]: Starting issuegen.service... Oct 2 19:34:54.998423 systemd[1]: Started waagent.service. Oct 2 19:34:55.004520 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:34:55.004662 systemd[1]: Finished issuegen.service. Oct 2 19:34:55.008223 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:34:55.031055 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:34:55.037221 systemd[1]: Started getty@tty1.service. Oct 2 19:34:55.041428 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 19:34:55.044434 systemd[1]: Reached target getty.target. Oct 2 19:34:55.047008 systemd[1]: Reached target multi-user.target. Oct 2 19:34:55.051298 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:34:55.059129 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:34:55.059301 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:34:55.062143 systemd[1]: Startup finished in 975ms (firmware) + 21.375s (loader) + 915ms (kernel) + 20.059s (initrd) + 21.651s (userspace) = 1min 4.977s. Oct 2 19:34:55.384540 login[1427]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:34:55.386305 login[1428]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:34:55.415816 systemd[1]: Created slice user-500.slice. Oct 2 19:34:55.417236 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:34:55.419348 systemd-logind[1320]: New session 1 of user core. Oct 2 19:34:55.422447 systemd-logind[1320]: New session 2 of user core. Oct 2 19:34:55.437701 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:34:55.439230 systemd[1]: Starting user@500.service... Oct 2 19:34:55.442396 (systemd)[1431]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:34:55.582533 systemd[1431]: Queued start job for default target default.target. Oct 2 19:34:55.583188 systemd[1431]: Reached target paths.target. Oct 2 19:34:55.583219 systemd[1431]: Reached target sockets.target. Oct 2 19:34:55.583240 systemd[1431]: Reached target timers.target. Oct 2 19:34:55.583260 systemd[1431]: Reached target basic.target. Oct 2 19:34:55.583378 systemd[1]: Started user@500.service. Oct 2 19:34:55.584653 systemd[1]: Started session-1.scope. Oct 2 19:34:55.585542 systemd[1]: Started session-2.scope. Oct 2 19:34:55.586526 systemd[1431]: Reached target default.target. Oct 2 19:34:55.586736 systemd[1431]: Startup finished in 138ms. Oct 2 19:34:55.666044 locksmithd[1407]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:35:00.317552 waagent[1422]: 2023-10-02T19:35:00.317434Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Oct 2 19:35:00.331198 waagent[1422]: 2023-10-02T19:35:00.319942Z INFO Daemon Daemon OS: flatcar 3510.3.0 Oct 2 19:35:00.331198 waagent[1422]: 2023-10-02T19:35:00.320839Z INFO Daemon Daemon Python: 3.9.16 Oct 2 19:35:00.331198 waagent[1422]: 2023-10-02T19:35:00.322034Z INFO Daemon Daemon Run daemon Oct 2 19:35:00.331198 waagent[1422]: 2023-10-02T19:35:00.323076Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.0' Oct 2 19:35:00.335761 waagent[1422]: 2023-10-02T19:35:00.335626Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 19:35:00.344480 waagent[1422]: 2023-10-02T19:35:00.344354Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 19:35:00.349733 waagent[1422]: 2023-10-02T19:35:00.349659Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 19:35:00.361054 waagent[1422]: 2023-10-02T19:35:00.351615Z INFO Daemon Daemon Using waagent for provisioning Oct 2 19:35:00.361054 waagent[1422]: 2023-10-02T19:35:00.353923Z INFO Daemon Daemon Activate resource disk Oct 2 19:35:00.361054 waagent[1422]: 2023-10-02T19:35:00.355918Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Oct 2 19:35:00.363555 waagent[1422]: 2023-10-02T19:35:00.363481Z INFO Daemon Daemon Found device: None Oct 2 19:35:00.395064 waagent[1422]: 2023-10-02T19:35:00.364937Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Oct 2 19:35:00.395064 waagent[1422]: 2023-10-02T19:35:00.365838Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Oct 2 19:35:00.395064 waagent[1422]: 2023-10-02T19:35:00.367608Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 19:35:00.395064 waagent[1422]: 2023-10-02T19:35:00.368627Z INFO Daemon Daemon Running default provisioning handler Oct 2 19:35:00.395064 waagent[1422]: 2023-10-02T19:35:00.378283Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Oct 2 19:35:00.395064 waagent[1422]: 2023-10-02T19:35:00.381332Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Oct 2 19:35:00.395064 waagent[1422]: 2023-10-02T19:35:00.382198Z INFO Daemon Daemon cloud-init is enabled: False Oct 2 19:35:00.395064 waagent[1422]: 2023-10-02T19:35:00.383155Z INFO Daemon Daemon Copying ovf-env.xml Oct 2 19:35:00.402805 waagent[1422]: 2023-10-02T19:35:00.402663Z INFO Daemon Daemon Successfully mounted dvd Oct 2 19:35:00.472583 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Oct 2 19:35:00.490161 waagent[1422]: 2023-10-02T19:35:00.490020Z INFO Daemon Daemon Detect protocol endpoint Oct 2 19:35:00.493413 waagent[1422]: 2023-10-02T19:35:00.493326Z INFO Daemon Daemon Clean protocol and wireserver endpoint Oct 2 19:35:00.497081 waagent[1422]: 2023-10-02T19:35:00.497016Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Oct 2 19:35:00.500868 waagent[1422]: 2023-10-02T19:35:00.500800Z INFO Daemon Daemon Test for route to 168.63.129.16 Oct 2 19:35:00.504199 waagent[1422]: 2023-10-02T19:35:00.504136Z INFO Daemon Daemon Route to 168.63.129.16 exists Oct 2 19:35:00.507124 waagent[1422]: 2023-10-02T19:35:00.507059Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Oct 2 19:35:00.642507 waagent[1422]: 2023-10-02T19:35:00.642349Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Oct 2 19:35:00.650956 waagent[1422]: 2023-10-02T19:35:00.644551Z INFO Daemon Daemon Wire protocol version:2012-11-30 Oct 2 19:35:00.650956 waagent[1422]: 2023-10-02T19:35:00.645386Z INFO Daemon Daemon Server preferred version:2015-04-05 Oct 2 19:35:01.164077 waagent[1422]: 2023-10-02T19:35:01.163923Z INFO Daemon Daemon Initializing goal state during protocol detection Oct 2 19:35:01.176288 waagent[1422]: 2023-10-02T19:35:01.176214Z INFO Daemon Daemon Forcing an update of the goal state.. Oct 2 19:35:01.179663 waagent[1422]: 2023-10-02T19:35:01.179598Z INFO Daemon Daemon Fetching goal state [incarnation 1] Oct 2 19:35:01.254688 waagent[1422]: 2023-10-02T19:35:01.254573Z INFO Daemon Daemon Found private key matching thumbprint 2091C42943BCBBBC6AC4768F2566A4AC66713252 Oct 2 19:35:01.266811 waagent[1422]: 2023-10-02T19:35:01.256066Z INFO Daemon Daemon Certificate with thumbprint 088AD27EE4A219B04C1983FBE5ACC6D66BF24525 has no matching private key. Oct 2 19:35:01.266811 waagent[1422]: 2023-10-02T19:35:01.257289Z INFO Daemon Daemon Fetch goal state completed Oct 2 19:35:01.327393 waagent[1422]: 2023-10-02T19:35:01.327303Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 57925840-b276-47f0-937f-d4f6b34fc0ae New eTag: 8174947743940775883] Oct 2 19:35:01.336811 waagent[1422]: 2023-10-02T19:35:01.329484Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 19:35:01.339202 waagent[1422]: 2023-10-02T19:35:01.339149Z INFO Daemon Daemon Starting provisioning Oct 2 19:35:01.346305 waagent[1422]: 2023-10-02T19:35:01.340414Z INFO Daemon Daemon Handle ovf-env.xml. Oct 2 19:35:01.346305 waagent[1422]: 2023-10-02T19:35:01.341376Z INFO Daemon Daemon Set hostname [ci-3510.3.0-a-58c23d0da1] Oct 2 19:35:01.356566 waagent[1422]: 2023-10-02T19:35:01.356448Z INFO Daemon Daemon Publish hostname [ci-3510.3.0-a-58c23d0da1] Oct 2 19:35:01.365096 waagent[1422]: 2023-10-02T19:35:01.358155Z INFO Daemon Daemon Examine /proc/net/route for primary interface Oct 2 19:35:01.365096 waagent[1422]: 2023-10-02T19:35:01.358747Z INFO Daemon Daemon Primary interface is [eth0] Oct 2 19:35:01.371989 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Oct 2 19:35:01.372236 systemd[1]: Stopped systemd-networkd-wait-online.service. Oct 2 19:35:01.372307 systemd[1]: Stopping systemd-networkd-wait-online.service... Oct 2 19:35:01.372637 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:35:01.377925 systemd-networkd[1190]: eth0: DHCPv6 lease lost Oct 2 19:35:01.379272 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:35:01.379460 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:35:01.381684 systemd[1]: Starting systemd-networkd.service... Oct 2 19:35:01.412161 systemd-networkd[1472]: enP8849s1: Link UP Oct 2 19:35:01.412170 systemd-networkd[1472]: enP8849s1: Gained carrier Oct 2 19:35:01.413472 systemd-networkd[1472]: eth0: Link UP Oct 2 19:35:01.413481 systemd-networkd[1472]: eth0: Gained carrier Oct 2 19:35:01.413910 systemd-networkd[1472]: lo: Link UP Oct 2 19:35:01.413918 systemd-networkd[1472]: lo: Gained carrier Oct 2 19:35:01.414231 systemd-networkd[1472]: eth0: Gained IPv6LL Oct 2 19:35:01.414861 systemd-networkd[1472]: Enumeration completed Oct 2 19:35:01.414965 systemd[1]: Started systemd-networkd.service. Oct 2 19:35:01.417216 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:35:01.419964 systemd-networkd[1472]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:35:01.423977 waagent[1422]: 2023-10-02T19:35:01.423756Z INFO Daemon Daemon Create user account if not exists Oct 2 19:35:01.431710 waagent[1422]: 2023-10-02T19:35:01.425635Z INFO Daemon Daemon User core already exists, skip useradd Oct 2 19:35:01.431710 waagent[1422]: 2023-10-02T19:35:01.426465Z INFO Daemon Daemon Configure sudoer Oct 2 19:35:01.432735 waagent[1422]: 2023-10-02T19:35:01.432651Z INFO Daemon Daemon Configure sshd Oct 2 19:35:01.436858 waagent[1422]: 2023-10-02T19:35:01.433808Z INFO Daemon Daemon Deploy ssh public key. Oct 2 19:35:01.456471 systemd-networkd[1472]: eth0: DHCPv4 address 10.200.8.17/24, gateway 10.200.8.1 acquired from 168.63.129.16 Oct 2 19:35:01.460200 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:35:01.483723 waagent[1422]: 2023-10-02T19:35:01.483484Z INFO Daemon Daemon Decode custom data Oct 2 19:35:01.486798 waagent[1422]: 2023-10-02T19:35:01.486728Z INFO Daemon Daemon Save custom data Oct 2 19:35:02.733686 waagent[1422]: 2023-10-02T19:35:02.733588Z INFO Daemon Daemon Provisioning complete Oct 2 19:35:02.748431 waagent[1422]: 2023-10-02T19:35:02.748356Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Oct 2 19:35:02.752069 waagent[1422]: 2023-10-02T19:35:02.751999Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Oct 2 19:35:02.758034 waagent[1422]: 2023-10-02T19:35:02.757968Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Oct 2 19:35:03.021524 waagent[1484]: 2023-10-02T19:35:03.021354Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Oct 2 19:35:03.022240 waagent[1484]: 2023-10-02T19:35:03.022172Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:35:03.022383 waagent[1484]: 2023-10-02T19:35:03.022329Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:35:03.033387 waagent[1484]: 2023-10-02T19:35:03.033312Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Oct 2 19:35:03.033551 waagent[1484]: 2023-10-02T19:35:03.033492Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Oct 2 19:35:03.092350 waagent[1484]: 2023-10-02T19:35:03.092225Z INFO ExtHandler ExtHandler Found private key matching thumbprint 2091C42943BCBBBC6AC4768F2566A4AC66713252 Oct 2 19:35:03.092574 waagent[1484]: 2023-10-02T19:35:03.092511Z INFO ExtHandler ExtHandler Certificate with thumbprint 088AD27EE4A219B04C1983FBE5ACC6D66BF24525 has no matching private key. Oct 2 19:35:03.092812 waagent[1484]: 2023-10-02T19:35:03.092760Z INFO ExtHandler ExtHandler Fetch goal state completed Oct 2 19:35:03.106677 waagent[1484]: 2023-10-02T19:35:03.106614Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 427ad648-423a-4951-b23d-7b34faa20703 New eTag: 8174947743940775883] Oct 2 19:35:03.107256 waagent[1484]: 2023-10-02T19:35:03.107196Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Oct 2 19:35:03.174450 waagent[1484]: 2023-10-02T19:35:03.174325Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 19:35:03.183256 waagent[1484]: 2023-10-02T19:35:03.183176Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1484 Oct 2 19:35:03.186646 waagent[1484]: 2023-10-02T19:35:03.186576Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 19:35:03.187902 waagent[1484]: 2023-10-02T19:35:03.187833Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 19:35:03.261580 waagent[1484]: 2023-10-02T19:35:03.261500Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 19:35:03.262103 waagent[1484]: 2023-10-02T19:35:03.262020Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 19:35:03.270214 waagent[1484]: 2023-10-02T19:35:03.270161Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 19:35:03.270676 waagent[1484]: 2023-10-02T19:35:03.270617Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 19:35:03.271750 waagent[1484]: 2023-10-02T19:35:03.271649Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Oct 2 19:35:03.272995 waagent[1484]: 2023-10-02T19:35:03.272936Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 19:35:03.273437 waagent[1484]: 2023-10-02T19:35:03.273381Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:35:03.273587 waagent[1484]: 2023-10-02T19:35:03.273540Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:35:03.274119 waagent[1484]: 2023-10-02T19:35:03.274063Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 19:35:03.274403 waagent[1484]: 2023-10-02T19:35:03.274347Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 19:35:03.274403 waagent[1484]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 19:35:03.274403 waagent[1484]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 19:35:03.274403 waagent[1484]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 19:35:03.274403 waagent[1484]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:35:03.274403 waagent[1484]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:35:03.274403 waagent[1484]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:35:03.276783 waagent[1484]: 2023-10-02T19:35:03.276688Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 19:35:03.277278 waagent[1484]: 2023-10-02T19:35:03.277216Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 19:35:03.277375 waagent[1484]: 2023-10-02T19:35:03.277312Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 19:35:03.278157 waagent[1484]: 2023-10-02T19:35:03.278102Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:35:03.278314 waagent[1484]: 2023-10-02T19:35:03.278267Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:35:03.278735 waagent[1484]: 2023-10-02T19:35:03.278677Z INFO EnvHandler ExtHandler Configure routes Oct 2 19:35:03.278901 waagent[1484]: 2023-10-02T19:35:03.278826Z INFO EnvHandler ExtHandler Gateway:None Oct 2 19:35:03.279025 waagent[1484]: 2023-10-02T19:35:03.278980Z INFO EnvHandler ExtHandler Routes:None Oct 2 19:35:03.279738 waagent[1484]: 2023-10-02T19:35:03.279681Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 19:35:03.279903 waagent[1484]: 2023-10-02T19:35:03.279839Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 19:35:03.280301 waagent[1484]: 2023-10-02T19:35:03.280248Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 19:35:03.293278 waagent[1484]: 2023-10-02T19:35:03.293211Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Oct 2 19:35:03.294157 waagent[1484]: 2023-10-02T19:35:03.294095Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 19:35:03.295332 waagent[1484]: 2023-10-02T19:35:03.295180Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Oct 2 19:35:03.301584 waagent[1484]: 2023-10-02T19:35:03.301521Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1472' Oct 2 19:35:03.343048 waagent[1484]: 2023-10-02T19:35:03.342971Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Oct 2 19:35:03.370800 waagent[1484]: 2023-10-02T19:35:03.370683Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 19:35:03.370800 waagent[1484]: Executing ['ip', '-a', '-o', 'link']: Oct 2 19:35:03.370800 waagent[1484]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 19:35:03.370800 waagent[1484]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b6:98:1b brd ff:ff:ff:ff:ff:ff Oct 2 19:35:03.370800 waagent[1484]: 3: enP8849s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b6:98:1b brd ff:ff:ff:ff:ff:ff\ altname enP8849p0s2 Oct 2 19:35:03.370800 waagent[1484]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 19:35:03.370800 waagent[1484]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 19:35:03.370800 waagent[1484]: 2: eth0 inet 10.200.8.17/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 19:35:03.370800 waagent[1484]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 19:35:03.370800 waagent[1484]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 19:35:03.370800 waagent[1484]: 2: eth0 inet6 fe80::20d:3aff:feb6:981b/64 scope link \ valid_lft forever preferred_lft forever Oct 2 19:35:03.786209 waagent[1484]: 2023-10-02T19:35:03.786142Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.10.0.3 -- exiting Oct 2 19:35:04.762752 waagent[1422]: 2023-10-02T19:35:04.762582Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Oct 2 19:35:04.769439 waagent[1422]: 2023-10-02T19:35:04.769377Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.10.0.3 to be the latest agent Oct 2 19:35:05.739041 waagent[1516]: 2023-10-02T19:35:05.738934Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.10.0.3) Oct 2 19:35:05.739723 waagent[1516]: 2023-10-02T19:35:05.739658Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.0 Oct 2 19:35:05.739868 waagent[1516]: 2023-10-02T19:35:05.739815Z INFO ExtHandler ExtHandler Python: 3.9.16 Oct 2 19:35:05.749023 waagent[1516]: 2023-10-02T19:35:05.748925Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.0; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Oct 2 19:35:05.749396 waagent[1516]: 2023-10-02T19:35:05.749340Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:35:05.749553 waagent[1516]: 2023-10-02T19:35:05.749506Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:35:05.760729 waagent[1516]: 2023-10-02T19:35:05.760654Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Oct 2 19:35:05.768539 waagent[1516]: 2023-10-02T19:35:05.768479Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Oct 2 19:35:05.769409 waagent[1516]: 2023-10-02T19:35:05.769351Z INFO ExtHandler Oct 2 19:35:05.769552 waagent[1516]: 2023-10-02T19:35:05.769504Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 796993e5-fc9e-442b-a961-3666b35b2cea eTag: 8174947743940775883 source: Fabric] Oct 2 19:35:05.770235 waagent[1516]: 2023-10-02T19:35:05.770179Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Oct 2 19:35:05.771280 waagent[1516]: 2023-10-02T19:35:05.771220Z INFO ExtHandler Oct 2 19:35:05.771411 waagent[1516]: 2023-10-02T19:35:05.771360Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Oct 2 19:35:05.777351 waagent[1516]: 2023-10-02T19:35:05.777302Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Oct 2 19:35:05.777749 waagent[1516]: 2023-10-02T19:35:05.777702Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Oct 2 19:35:05.796992 waagent[1516]: 2023-10-02T19:35:05.796939Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Oct 2 19:35:05.858851 waagent[1516]: 2023-10-02T19:35:05.858731Z INFO ExtHandler Downloaded certificate {'thumbprint': '2091C42943BCBBBC6AC4768F2566A4AC66713252', 'hasPrivateKey': True} Oct 2 19:35:05.859747 waagent[1516]: 2023-10-02T19:35:05.859685Z INFO ExtHandler Downloaded certificate {'thumbprint': '088AD27EE4A219B04C1983FBE5ACC6D66BF24525', 'hasPrivateKey': False} Oct 2 19:35:05.860710 waagent[1516]: 2023-10-02T19:35:05.860650Z INFO ExtHandler Fetch goal state completed Oct 2 19:35:05.881334 waagent[1516]: 2023-10-02T19:35:05.881269Z INFO ExtHandler ExtHandler WALinuxAgent-2.10.0.3 running as process 1516 Oct 2 19:35:05.884523 waagent[1516]: 2023-10-02T19:35:05.884463Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.0', '', 'Flatcar Container Linux by Kinvolk'] Oct 2 19:35:05.885993 waagent[1516]: 2023-10-02T19:35:05.885937Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Oct 2 19:35:05.890339 waagent[1516]: 2023-10-02T19:35:05.890286Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Oct 2 19:35:05.890676 waagent[1516]: 2023-10-02T19:35:05.890621Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Oct 2 19:35:05.898129 waagent[1516]: 2023-10-02T19:35:05.898075Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Oct 2 19:35:05.898561 waagent[1516]: 2023-10-02T19:35:05.898505Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Oct 2 19:35:05.904042 waagent[1516]: 2023-10-02T19:35:05.903949Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Oct 2 19:35:05.909263 waagent[1516]: 2023-10-02T19:35:05.909208Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Oct 2 19:35:05.910563 waagent[1516]: 2023-10-02T19:35:05.910506Z INFO ExtHandler ExtHandler Starting env monitor service. Oct 2 19:35:05.910971 waagent[1516]: 2023-10-02T19:35:05.910914Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:35:05.911297 waagent[1516]: 2023-10-02T19:35:05.911242Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:35:05.911798 waagent[1516]: 2023-10-02T19:35:05.911742Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Oct 2 19:35:05.912087 waagent[1516]: 2023-10-02T19:35:05.912031Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Oct 2 19:35:05.912087 waagent[1516]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Oct 2 19:35:05.912087 waagent[1516]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Oct 2 19:35:05.912087 waagent[1516]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Oct 2 19:35:05.912087 waagent[1516]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:35:05.912087 waagent[1516]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:35:05.912087 waagent[1516]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Oct 2 19:35:05.914136 waagent[1516]: 2023-10-02T19:35:05.914046Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Oct 2 19:35:05.915142 waagent[1516]: 2023-10-02T19:35:05.915071Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Oct 2 19:35:05.915423 waagent[1516]: 2023-10-02T19:35:05.915371Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Oct 2 19:35:05.915590 waagent[1516]: 2023-10-02T19:35:05.915538Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Oct 2 19:35:05.915868 waagent[1516]: 2023-10-02T19:35:05.915819Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Oct 2 19:35:05.918911 waagent[1516]: 2023-10-02T19:35:05.918779Z INFO EnvHandler ExtHandler Configure routes Oct 2 19:35:05.921141 waagent[1516]: 2023-10-02T19:35:05.921070Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Oct 2 19:35:05.921259 waagent[1516]: 2023-10-02T19:35:05.921199Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Oct 2 19:35:05.924293 waagent[1516]: 2023-10-02T19:35:05.924180Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Oct 2 19:35:05.924629 waagent[1516]: 2023-10-02T19:35:05.924567Z INFO EnvHandler ExtHandler Gateway:None Oct 2 19:35:05.925678 waagent[1516]: 2023-10-02T19:35:05.925620Z INFO EnvHandler ExtHandler Routes:None Oct 2 19:35:05.937185 waagent[1516]: 2023-10-02T19:35:05.937121Z INFO MonitorHandler ExtHandler Network interfaces: Oct 2 19:35:05.937185 waagent[1516]: Executing ['ip', '-a', '-o', 'link']: Oct 2 19:35:05.937185 waagent[1516]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Oct 2 19:35:05.937185 waagent[1516]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b6:98:1b brd ff:ff:ff:ff:ff:ff Oct 2 19:35:05.937185 waagent[1516]: 3: enP8849s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b6:98:1b brd ff:ff:ff:ff:ff:ff\ altname enP8849p0s2 Oct 2 19:35:05.937185 waagent[1516]: Executing ['ip', '-4', '-a', '-o', 'address']: Oct 2 19:35:05.937185 waagent[1516]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Oct 2 19:35:05.937185 waagent[1516]: 2: eth0 inet 10.200.8.17/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Oct 2 19:35:05.937185 waagent[1516]: Executing ['ip', '-6', '-a', '-o', 'address']: Oct 2 19:35:05.937185 waagent[1516]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Oct 2 19:35:05.937185 waagent[1516]: 2: eth0 inet6 fe80::20d:3aff:feb6:981b/64 scope link \ valid_lft forever preferred_lft forever Oct 2 19:35:05.945442 waagent[1516]: 2023-10-02T19:35:05.945358Z INFO ExtHandler ExtHandler Downloading agent manifest Oct 2 19:35:05.963615 waagent[1516]: 2023-10-02T19:35:05.963555Z INFO ExtHandler ExtHandler Oct 2 19:35:05.963764 waagent[1516]: 2023-10-02T19:35:05.963714Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: c92c6e54-b832-4e70-b5db-5f81b7b0d7b6 correlation 6e433586-f9f7-4dad-81b3-85fd4d45bd1a created: 2023-10-02T19:33:38.762161Z] Oct 2 19:35:05.965316 waagent[1516]: 2023-10-02T19:35:05.965252Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Oct 2 19:35:05.970625 waagent[1516]: 2023-10-02T19:35:05.970540Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 6 ms] Oct 2 19:35:06.006777 waagent[1516]: 2023-10-02T19:35:06.006663Z INFO ExtHandler ExtHandler Looking for existing remote access users. Oct 2 19:35:06.027643 waagent[1516]: 2023-10-02T19:35:06.027576Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.10.0.3 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 05542183-DC4A-4850-B3D9-D4AD702503B1;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Oct 2 19:35:06.069317 waagent[1516]: 2023-10-02T19:35:06.069211Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Oct 2 19:35:06.069317 waagent[1516]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:35:06.069317 waagent[1516]: pkts bytes target prot opt in out source destination Oct 2 19:35:06.069317 waagent[1516]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:35:06.069317 waagent[1516]: pkts bytes target prot opt in out source destination Oct 2 19:35:06.069317 waagent[1516]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:35:06.069317 waagent[1516]: pkts bytes target prot opt in out source destination Oct 2 19:35:06.069317 waagent[1516]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Oct 2 19:35:06.069317 waagent[1516]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 19:35:06.069317 waagent[1516]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 19:35:06.076227 waagent[1516]: 2023-10-02T19:35:06.076126Z INFO EnvHandler ExtHandler Current Firewall rules: Oct 2 19:35:06.076227 waagent[1516]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:35:06.076227 waagent[1516]: pkts bytes target prot opt in out source destination Oct 2 19:35:06.076227 waagent[1516]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:35:06.076227 waagent[1516]: pkts bytes target prot opt in out source destination Oct 2 19:35:06.076227 waagent[1516]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Oct 2 19:35:06.076227 waagent[1516]: pkts bytes target prot opt in out source destination Oct 2 19:35:06.076227 waagent[1516]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Oct 2 19:35:06.076227 waagent[1516]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Oct 2 19:35:06.076227 waagent[1516]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Oct 2 19:35:06.076754 waagent[1516]: 2023-10-02T19:35:06.076702Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Oct 2 19:35:33.877983 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Oct 2 19:35:39.473958 update_engine[1321]: I1002 19:35:39.473870 1321 update_attempter.cc:505] Updating boot flags... Oct 2 19:35:45.230294 systemd[1]: Created slice system-sshd.slice. Oct 2 19:35:45.231823 systemd[1]: Started sshd@0-10.200.8.17:22-10.200.12.6:48414.service. Oct 2 19:35:46.034697 sshd[1603]: Accepted publickey for core from 10.200.12.6 port 48414 ssh2: RSA SHA256:QTj/0Yd7w+agvpAJ3ZvxSnjeGijkbUdqm8sftt8AuvE Oct 2 19:35:46.036257 sshd[1603]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:35:46.041792 systemd[1]: Started session-3.scope. Oct 2 19:35:46.042338 systemd-logind[1320]: New session 3 of user core. Oct 2 19:35:46.578546 systemd[1]: Started sshd@1-10.200.8.17:22-10.200.12.6:48428.service. Oct 2 19:35:47.204639 sshd[1611]: Accepted publickey for core from 10.200.12.6 port 48428 ssh2: RSA SHA256:QTj/0Yd7w+agvpAJ3ZvxSnjeGijkbUdqm8sftt8AuvE Oct 2 19:35:47.207398 sshd[1611]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:35:47.211964 systemd[1]: Started session-4.scope. Oct 2 19:35:47.212577 systemd-logind[1320]: New session 4 of user core. Oct 2 19:35:47.647069 sshd[1611]: pam_unix(sshd:session): session closed for user core Oct 2 19:35:47.650563 systemd[1]: sshd@1-10.200.8.17:22-10.200.12.6:48428.service: Deactivated successfully. Oct 2 19:35:47.651568 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:35:47.652334 systemd-logind[1320]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:35:47.653167 systemd-logind[1320]: Removed session 4. Oct 2 19:35:47.751394 systemd[1]: Started sshd@2-10.200.8.17:22-10.200.12.6:33176.service. Oct 2 19:35:48.387908 sshd[1617]: Accepted publickey for core from 10.200.12.6 port 33176 ssh2: RSA SHA256:QTj/0Yd7w+agvpAJ3ZvxSnjeGijkbUdqm8sftt8AuvE Oct 2 19:35:48.389554 sshd[1617]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:35:48.395061 systemd[1]: Started session-5.scope. Oct 2 19:35:48.395502 systemd-logind[1320]: New session 5 of user core. Oct 2 19:35:48.827532 sshd[1617]: pam_unix(sshd:session): session closed for user core Oct 2 19:35:48.830663 systemd[1]: sshd@2-10.200.8.17:22-10.200.12.6:33176.service: Deactivated successfully. Oct 2 19:35:48.831903 systemd-logind[1320]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:35:48.832016 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:35:48.833319 systemd-logind[1320]: Removed session 5. Oct 2 19:35:48.933173 systemd[1]: Started sshd@3-10.200.8.17:22-10.200.12.6:33180.service. Oct 2 19:35:49.566331 sshd[1623]: Accepted publickey for core from 10.200.12.6 port 33180 ssh2: RSA SHA256:QTj/0Yd7w+agvpAJ3ZvxSnjeGijkbUdqm8sftt8AuvE Oct 2 19:35:49.567955 sshd[1623]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:35:49.573633 systemd[1]: Started session-6.scope. Oct 2 19:35:49.574212 systemd-logind[1320]: New session 6 of user core. Oct 2 19:35:50.013554 sshd[1623]: pam_unix(sshd:session): session closed for user core Oct 2 19:35:50.016682 systemd[1]: sshd@3-10.200.8.17:22-10.200.12.6:33180.service: Deactivated successfully. Oct 2 19:35:50.017657 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:35:50.018395 systemd-logind[1320]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:35:50.019269 systemd-logind[1320]: Removed session 6. Oct 2 19:35:50.119413 systemd[1]: Started sshd@4-10.200.8.17:22-10.200.12.6:33182.service. Oct 2 19:35:50.760695 sshd[1629]: Accepted publickey for core from 10.200.12.6 port 33182 ssh2: RSA SHA256:QTj/0Yd7w+agvpAJ3ZvxSnjeGijkbUdqm8sftt8AuvE Oct 2 19:35:50.762285 sshd[1629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:35:50.767240 systemd[1]: Started session-7.scope. Oct 2 19:35:50.767814 systemd-logind[1320]: New session 7 of user core. Oct 2 19:35:51.311422 sudo[1632]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:35:51.311742 sudo[1632]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:35:51.331079 dbus-daemon[1306]: Э\u0013صU: received setenforce notice (enforcing=-1267714720) Oct 2 19:35:51.332826 sudo[1632]: pam_unix(sudo:session): session closed for user root Oct 2 19:35:51.445135 sshd[1629]: pam_unix(sshd:session): session closed for user core Oct 2 19:35:51.448790 systemd[1]: sshd@4-10.200.8.17:22-10.200.12.6:33182.service: Deactivated successfully. Oct 2 19:35:51.449866 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:35:51.450650 systemd-logind[1320]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:35:51.451617 systemd-logind[1320]: Removed session 7. Oct 2 19:35:51.548609 systemd[1]: Started sshd@5-10.200.8.17:22-10.200.12.6:33198.service. Oct 2 19:35:52.171953 sshd[1636]: Accepted publickey for core from 10.200.12.6 port 33198 ssh2: RSA SHA256:QTj/0Yd7w+agvpAJ3ZvxSnjeGijkbUdqm8sftt8AuvE Oct 2 19:35:52.173589 sshd[1636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:35:52.178578 systemd[1]: Started session-8.scope. Oct 2 19:35:52.179046 systemd-logind[1320]: New session 8 of user core. Oct 2 19:35:52.513490 sudo[1640]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:35:52.513752 sudo[1640]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:35:52.516414 sudo[1640]: pam_unix(sudo:session): session closed for user root Oct 2 19:35:52.520665 sudo[1639]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:35:52.520944 sudo[1639]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:35:52.529386 systemd[1]: Stopping audit-rules.service... Oct 2 19:35:52.528000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:35:52.534097 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:35:52.534170 kernel: audit: type=1305 audit(1696275352.528:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:35:52.534430 auditctl[1643]: No rules Oct 2 19:35:52.534841 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:35:52.535010 systemd[1]: Stopped audit-rules.service. Oct 2 19:35:52.536489 systemd[1]: Starting audit-rules.service... Oct 2 19:35:52.528000 audit[1643]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe24d8190 a2=420 a3=0 items=0 ppid=1 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:52.556998 kernel: audit: type=1300 audit(1696275352.528:165): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe24d8190 a2=420 a3=0 items=0 ppid=1 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:52.560905 kernel: audit: type=1327 audit(1696275352.528:165): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:35:52.528000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:35:52.558361 systemd[1]: Finished audit-rules.service. Oct 2 19:35:52.561068 augenrules[1660]: No rules Oct 2 19:35:52.559193 sudo[1639]: pam_unix(sudo:session): session closed for user root Oct 2 19:35:52.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:52.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:52.573893 kernel: audit: type=1131 audit(1696275352.533:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:52.573938 kernel: audit: type=1130 audit(1696275352.556:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:52.557000 audit[1639]: USER_END pid=1639 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:35:52.596760 kernel: audit: type=1106 audit(1696275352.557:168): pid=1639 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:35:52.596815 kernel: audit: type=1104 audit(1696275352.557:169): pid=1639 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:35:52.557000 audit[1639]: CRED_DISP pid=1639 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:35:52.658356 sshd[1636]: pam_unix(sshd:session): session closed for user core Oct 2 19:35:52.658000 audit[1636]: USER_END pid=1636 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:35:52.661847 systemd-logind[1320]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:35:52.663420 systemd[1]: sshd@5-10.200.8.17:22-10.200.12.6:33198.service: Deactivated successfully. Oct 2 19:35:52.664207 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:35:52.665535 systemd-logind[1320]: Removed session 8. Oct 2 19:35:52.658000 audit[1636]: CRED_DISP pid=1636 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:35:52.688705 kernel: audit: type=1106 audit(1696275352.658:170): pid=1636 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:35:52.688762 kernel: audit: type=1104 audit(1696275352.658:171): pid=1636 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:35:52.688782 kernel: audit: type=1131 audit(1696275352.658:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.17:22-10.200.12.6:33198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:52.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.17:22-10.200.12.6:33198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:52.773319 systemd[1]: Started sshd@6-10.200.8.17:22-10.200.12.6:33208.service. Oct 2 19:35:52.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.17:22-10.200.12.6:33208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:53.625000 audit[1666]: USER_ACCT pid=1666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:35:53.627849 sshd[1666]: Accepted publickey for core from 10.200.12.6 port 33208 ssh2: RSA SHA256:QTj/0Yd7w+agvpAJ3ZvxSnjeGijkbUdqm8sftt8AuvE Oct 2 19:35:53.627000 audit[1666]: CRED_ACQ pid=1666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:35:53.627000 audit[1666]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc1c6c260 a2=3 a3=0 items=0 ppid=1 pid=1666 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:53.627000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:35:53.629481 sshd[1666]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:35:53.634296 systemd[1]: Started session-9.scope. Oct 2 19:35:53.634978 systemd-logind[1320]: New session 9 of user core. Oct 2 19:35:53.637000 audit[1666]: USER_START pid=1666 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:35:53.638000 audit[1668]: CRED_ACQ pid=1668 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:35:54.063000 audit[1669]: USER_ACCT pid=1669 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:35:54.063000 audit[1669]: CRED_REFR pid=1669 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:35:54.065302 sudo[1669]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:35:54.065625 sudo[1669]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:35:54.065000 audit[1669]: USER_START pid=1669 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:35:55.182594 systemd[1]: Starting docker.service... Oct 2 19:35:55.225170 env[1684]: time="2023-10-02T19:35:55.225117366Z" level=info msg="Starting up" Oct 2 19:35:55.227114 env[1684]: time="2023-10-02T19:35:55.227024068Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:35:55.227114 env[1684]: time="2023-10-02T19:35:55.227043367Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:35:55.227114 env[1684]: time="2023-10-02T19:35:55.227062666Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:35:55.227114 env[1684]: time="2023-10-02T19:35:55.227075066Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:35:55.228762 env[1684]: time="2023-10-02T19:35:55.228742680Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:35:55.228889 env[1684]: time="2023-10-02T19:35:55.228865674Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:35:55.228997 env[1684]: time="2023-10-02T19:35:55.228980168Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:35:55.229049 env[1684]: time="2023-10-02T19:35:55.229040865Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:35:55.351135 env[1684]: time="2023-10-02T19:35:55.351087318Z" level=info msg="Loading containers: start." Oct 2 19:35:55.386000 audit[1711]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.386000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fffec533320 a2=0 a3=7fffec53330c items=0 ppid=1684 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.386000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:35:55.388000 audit[1713]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.388000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffeb1751270 a2=0 a3=7ffeb175125c items=0 ppid=1684 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.388000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:35:55.390000 audit[1715]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.390000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd24524d00 a2=0 a3=7ffd24524cec items=0 ppid=1684 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.390000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:35:55.391000 audit[1717]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.391000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdc51fe050 a2=0 a3=7ffdc51fe03c items=0 ppid=1684 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.391000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:35:55.393000 audit[1719]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.393000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe6cf3ceb0 a2=0 a3=7ffe6cf3ce9c items=0 ppid=1684 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.393000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:35:55.395000 audit[1721]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.395000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb5b0dea0 a2=0 a3=7ffdb5b0de8c items=0 ppid=1684 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.395000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:35:55.420000 audit[1723]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.420000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffea4e4e460 a2=0 a3=7ffea4e4e44c items=0 ppid=1684 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.420000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:35:55.422000 audit[1725]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.422000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffeb1ccd670 a2=0 a3=7ffeb1ccd65c items=0 ppid=1684 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.422000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:35:55.424000 audit[1727]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.424000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd103af3d0 a2=0 a3=7ffd103af3bc items=0 ppid=1684 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.424000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:35:55.445000 audit[1731]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.445000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffd076be50 a2=0 a3=7fffd076be3c items=0 ppid=1684 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.445000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:35:55.448000 audit[1732]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.448000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffef94832f0 a2=0 a3=7ffef94832dc items=0 ppid=1684 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.448000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:35:55.481901 kernel: Initializing XFRM netlink socket Oct 2 19:35:55.513686 env[1684]: time="2023-10-02T19:35:55.513652697Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:35:55.564000 audit[1740]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.564000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc8b53aab0 a2=0 a3=7ffc8b53aa9c items=0 ppid=1684 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.564000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:35:55.601000 audit[1743]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.601000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd3e9d5b30 a2=0 a3=7ffd3e9d5b1c items=0 ppid=1684 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.601000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:35:55.604000 audit[1746]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.604000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffed2f7dc0 a2=0 a3=7fffed2f7dac items=0 ppid=1684 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.604000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:35:55.606000 audit[1748]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.606000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcc7311e50 a2=0 a3=7ffcc7311e3c items=0 ppid=1684 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.606000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:35:55.608000 audit[1750]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.608000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd25b06700 a2=0 a3=7ffd25b066ec items=0 ppid=1684 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.608000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:35:55.610000 audit[1752]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.610000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffaf14d950 a2=0 a3=7fffaf14d93c items=0 ppid=1684 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.610000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:35:55.612000 audit[1754]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.612000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe31e2dac0 a2=0 a3=7ffe31e2daac items=0 ppid=1684 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.612000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:35:55.614000 audit[1756]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.614000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffeb13a2290 a2=0 a3=7ffeb13a227c items=0 ppid=1684 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.614000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:35:55.616000 audit[1758]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.616000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc897da490 a2=0 a3=7ffc897da47c items=0 ppid=1684 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.616000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:35:55.618000 audit[1760]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.618000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe86b6c820 a2=0 a3=7ffe86b6c80c items=0 ppid=1684 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.618000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:35:55.620000 audit[1762]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.620000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffde32ebc20 a2=0 a3=7ffde32ebc0c items=0 ppid=1684 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.620000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:35:55.621593 systemd-networkd[1472]: docker0: Link UP Oct 2 19:35:55.651000 audit[1766]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.651000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd155950a0 a2=0 a3=7ffd1559508c items=0 ppid=1684 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.651000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:35:55.651000 audit[1767]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:35:55.651000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc649c9970 a2=0 a3=7ffc649c995c items=0 ppid=1684 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:35:55.651000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:35:55.653238 env[1684]: time="2023-10-02T19:35:55.653203554Z" level=info msg="Loading containers: done." Oct 2 19:35:55.664416 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck314211508-merged.mount: Deactivated successfully. Oct 2 19:35:55.719441 env[1684]: time="2023-10-02T19:35:55.719362667Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:35:55.720218 env[1684]: time="2023-10-02T19:35:55.720144227Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:35:55.720595 env[1684]: time="2023-10-02T19:35:55.720577805Z" level=info msg="Daemon has completed initialization" Oct 2 19:35:55.758455 systemd[1]: Started docker.service. Oct 2 19:35:55.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:55.767225 env[1684]: time="2023-10-02T19:35:55.767178219Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:35:55.784303 systemd[1]: Reloading. Oct 2 19:35:55.856950 /usr/lib/systemd/system-generators/torcx-generator[1814]: time="2023-10-02T19:35:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:35:55.856986 /usr/lib/systemd/system-generators/torcx-generator[1814]: time="2023-10-02T19:35:55Z" level=info msg="torcx already run" Oct 2 19:35:55.954413 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:35:55.954432 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:35:55.972256 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:35:56.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit: BPF prog-id=32 op=LOAD Oct 2 19:35:56.036000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit: BPF prog-id=33 op=LOAD Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.036000 audit: BPF prog-id=34 op=LOAD Oct 2 19:35:56.036000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:35:56.036000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:35:56.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.037000 audit: BPF prog-id=35 op=LOAD Oct 2 19:35:56.037000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit: BPF prog-id=36 op=LOAD Oct 2 19:35:56.038000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit: BPF prog-id=37 op=LOAD Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.039000 audit: BPF prog-id=38 op=LOAD Oct 2 19:35:56.039000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:35:56.039000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:35:56.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.040000 audit: BPF prog-id=39 op=LOAD Oct 2 19:35:56.040000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit: BPF prog-id=40 op=LOAD Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.041000 audit: BPF prog-id=41 op=LOAD Oct 2 19:35:56.041000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:35:56.041000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:35:56.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.044000 audit: BPF prog-id=42 op=LOAD Oct 2 19:35:56.044000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:35:56.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.046000 audit: BPF prog-id=43 op=LOAD Oct 2 19:35:56.046000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:35:56.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit: BPF prog-id=44 op=LOAD Oct 2 19:35:56.048000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit: BPF prog-id=45 op=LOAD Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:35:56.048000 audit: BPF prog-id=46 op=LOAD Oct 2 19:35:56.048000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:35:56.048000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:35:56.060205 systemd[1]: Started kubelet.service. Oct 2 19:35:56.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:35:56.122431 kubelet[1876]: E1002 19:35:56.122380 1876 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:35:56.124112 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:35:56.124264 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:35:56.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:35:59.836315 env[1342]: time="2023-10-02T19:35:59.836265171Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.25.14\"" Oct 2 19:36:00.505242 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount223241455.mount: Deactivated successfully. Oct 2 19:36:02.669017 env[1342]: time="2023-10-02T19:36:02.668959219Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:02.676998 env[1342]: time="2023-10-02T19:36:02.676958382Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:48f6f02f2e904b54753777e0487169939971458e169171892d46ca1579632d3f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:02.682123 env[1342]: time="2023-10-02T19:36:02.682087066Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:02.685475 env[1342]: time="2023-10-02T19:36:02.685439125Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:bb3eff7d20d94d44ffea47066a4400a70ede58abd9de01c80400817a955397b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:02.686201 env[1342]: time="2023-10-02T19:36:02.686161794Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.25.14\" returns image reference \"sha256:48f6f02f2e904b54753777e0487169939971458e169171892d46ca1579632d3f\"" Oct 2 19:36:02.696413 env[1342]: time="2023-10-02T19:36:02.696387563Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.25.14\"" Oct 2 19:36:04.930721 env[1342]: time="2023-10-02T19:36:04.930662395Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:04.940452 env[1342]: time="2023-10-02T19:36:04.940415506Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2fdc9124e4ab3b396594897e15b74bfe70445ab8f9340ad81af657f2c971118f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:04.945661 env[1342]: time="2023-10-02T19:36:04.945628898Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:04.950952 env[1342]: time="2023-10-02T19:36:04.950924487Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:44d63bed8020f7610851a1a653ad7c6df83bd02ad128303de939a39997854ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:04.951523 env[1342]: time="2023-10-02T19:36:04.951493064Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.25.14\" returns image reference \"sha256:2fdc9124e4ab3b396594897e15b74bfe70445ab8f9340ad81af657f2c971118f\"" Oct 2 19:36:04.961498 env[1342]: time="2023-10-02T19:36:04.961473565Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.25.14\"" Oct 2 19:36:06.173218 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:36:06.187844 kernel: kauditd_printk_skb: 258 callbacks suppressed Oct 2 19:36:06.187941 kernel: audit: type=1130 audit(1696275366.172:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:06.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:06.173469 systemd[1]: Stopped kubelet.service. Oct 2 19:36:06.175064 systemd[1]: Started kubelet.service. Oct 2 19:36:06.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:06.220831 kernel: audit: type=1131 audit(1696275366.172:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:06.220925 kernel: audit: type=1130 audit(1696275366.172:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:06.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:06.251298 kubelet[1903]: E1002 19:36:06.251255 1903 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:36:06.255348 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:36:06.255510 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:36:06.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:36:06.271894 kernel: audit: type=1131 audit(1696275366.254:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:36:06.446286 env[1342]: time="2023-10-02T19:36:06.446156769Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:06.453258 env[1342]: time="2023-10-02T19:36:06.453221302Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:62a4b43588914100df65a99bb32d7c829fcc21b747a4ae400801eda76994ec7a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:06.459760 env[1342]: time="2023-10-02T19:36:06.459726456Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:06.465133 env[1342]: time="2023-10-02T19:36:06.465102553Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:207b36120eca76bf8607682a3ee37e12b5156b921a9379d776b297ab01ca8198,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:06.465793 env[1342]: time="2023-10-02T19:36:06.465763628Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.25.14\" returns image reference \"sha256:62a4b43588914100df65a99bb32d7c829fcc21b747a4ae400801eda76994ec7a\"" Oct 2 19:36:06.475750 env[1342]: time="2023-10-02T19:36:06.475720851Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\"" Oct 2 19:36:07.575050 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4044413789.mount: Deactivated successfully. Oct 2 19:36:08.060444 env[1342]: time="2023-10-02T19:36:08.060377932Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:08.068502 env[1342]: time="2023-10-02T19:36:08.068452642Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b2d7e01cd611a8a377680226224d6d7f70eea58e8e603b1874585a279866f6a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:08.073324 env[1342]: time="2023-10-02T19:36:08.073293069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:08.077962 env[1342]: time="2023-10-02T19:36:08.077929602Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:4a23f328943342be6a3eeda75cc7a01d175bcf8b096611c97d2aa14c843cf326,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:08.078437 env[1342]: time="2023-10-02T19:36:08.078407185Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\" returns image reference \"sha256:b2d7e01cd611a8a377680226224d6d7f70eea58e8e603b1874585a279866f6a2\"" Oct 2 19:36:08.087984 env[1342]: time="2023-10-02T19:36:08.087954943Z" level=info msg="PullImage \"registry.k8s.io/pause:3.8\"" Oct 2 19:36:08.671850 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2059590860.mount: Deactivated successfully. Oct 2 19:36:08.704286 env[1342]: time="2023-10-02T19:36:08.704243246Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:08.714637 env[1342]: time="2023-10-02T19:36:08.714605274Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4873874c08efc72e9729683a83ffbb7502ee729e9a5ac097723806ea7fa13517,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:08.721043 env[1342]: time="2023-10-02T19:36:08.721013745Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:08.727339 env[1342]: time="2023-10-02T19:36:08.727307419Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:9001185023633d17a2f98ff69b6ff2615b8ea02a825adffa40422f51dfdcde9d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:08.727908 env[1342]: time="2023-10-02T19:36:08.727861799Z" level=info msg="PullImage \"registry.k8s.io/pause:3.8\" returns image reference \"sha256:4873874c08efc72e9729683a83ffbb7502ee729e9a5ac097723806ea7fa13517\"" Oct 2 19:36:08.738263 env[1342]: time="2023-10-02T19:36:08.738239427Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Oct 2 19:36:09.607436 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount825877663.mount: Deactivated successfully. Oct 2 19:36:13.758014 env[1342]: time="2023-10-02T19:36:13.757962464Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:13.767438 env[1342]: time="2023-10-02T19:36:13.767400967Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:13.773089 env[1342]: time="2023-10-02T19:36:13.773059089Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:13.778856 env[1342]: time="2023-10-02T19:36:13.778820208Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:13.779389 env[1342]: time="2023-10-02T19:36:13.779360891Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Oct 2 19:36:13.789332 env[1342]: time="2023-10-02T19:36:13.789304878Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Oct 2 19:36:14.386545 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1272930099.mount: Deactivated successfully. Oct 2 19:36:15.012083 env[1342]: time="2023-10-02T19:36:15.012031937Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:15.019583 env[1342]: time="2023-10-02T19:36:15.019545512Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:15.025463 env[1342]: time="2023-10-02T19:36:15.025435336Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:15.028696 env[1342]: time="2023-10-02T19:36:15.028664240Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:15.029192 env[1342]: time="2023-10-02T19:36:15.029162925Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Oct 2 19:36:16.423228 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 19:36:16.423489 systemd[1]: Stopped kubelet.service. Oct 2 19:36:16.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:16.439896 kernel: audit: type=1130 audit(1696275376.422:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:16.440349 systemd[1]: Started kubelet.service. Oct 2 19:36:16.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:16.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:16.476544 kernel: audit: type=1131 audit(1696275376.422:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:16.476622 kernel: audit: type=1130 audit(1696275376.439:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:16.528573 kubelet[1982]: E1002 19:36:16.528534 1982 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 19:36:16.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:36:16.531805 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:36:16.531973 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:36:16.548386 kernel: audit: type=1131 audit(1696275376.531:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:36:17.200439 systemd[1]: Stopped kubelet.service. Oct 2 19:36:17.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:17.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:17.218393 systemd[1]: Reloading. Oct 2 19:36:17.231054 kernel: audit: type=1130 audit(1696275377.200:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:17.231145 kernel: audit: type=1131 audit(1696275377.202:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:17.305433 /usr/lib/systemd/system-generators/torcx-generator[2011]: time="2023-10-02T19:36:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:36:17.305857 /usr/lib/systemd/system-generators/torcx-generator[2011]: time="2023-10-02T19:36:17Z" level=info msg="torcx already run" Oct 2 19:36:17.387157 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:36:17.387175 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:36:17.404840 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:36:17.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482980 kernel: audit: type=1400 audit(1696275377.467:391): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.502786 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:36:17.502871 kernel: audit: type=1400 audit(1696275377.467:392): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.502908 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 19:36:17.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.481000 audit: BPF prog-id=47 op=LOAD Oct 2 19:36:17.481000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit: BPF prog-id=48 op=LOAD Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.482000 audit: BPF prog-id=49 op=LOAD Oct 2 19:36:17.482000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:36:17.482000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:36:17.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.483000 audit: BPF prog-id=50 op=LOAD Oct 2 19:36:17.483000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit: BPF prog-id=51 op=LOAD Oct 2 19:36:17.484000 audit: BPF prog-id=36 op=UNLOAD Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit: BPF prog-id=52 op=LOAD Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit: BPF prog-id=53 op=LOAD Oct 2 19:36:17.507000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:36:17.507000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit: BPF prog-id=54 op=LOAD Oct 2 19:36:17.508000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit: BPF prog-id=55 op=LOAD Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.508000 audit: BPF prog-id=56 op=LOAD Oct 2 19:36:17.508000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:36:17.508000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:36:17.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.511000 audit: BPF prog-id=57 op=LOAD Oct 2 19:36:17.511000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:36:17.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.512000 audit: BPF prog-id=58 op=LOAD Oct 2 19:36:17.513000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:36:17.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.514000 audit: BPF prog-id=59 op=LOAD Oct 2 19:36:17.514000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit: BPF prog-id=60 op=LOAD Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.515000 audit: BPF prog-id=61 op=LOAD Oct 2 19:36:17.515000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:36:17.515000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:36:17.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:17.532278 systemd[1]: Started kubelet.service. Oct 2 19:36:17.581013 kubelet[2075]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 19:36:17.581013 kubelet[2075]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:36:17.581013 kubelet[2075]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:36:17.581442 kubelet[2075]: I1002 19:36:17.581089 2075 server.go:200] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:36:17.582323 kubelet[2075]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 19:36:17.582323 kubelet[2075]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:36:17.582323 kubelet[2075]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:36:17.849422 kubelet[2075]: I1002 19:36:17.849310 2075 server.go:413] "Kubelet version" kubeletVersion="v1.25.10" Oct 2 19:36:17.849422 kubelet[2075]: I1002 19:36:17.849336 2075 server.go:415] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:36:17.849867 kubelet[2075]: I1002 19:36:17.849847 2075 server.go:825] "Client rotation is on, will bootstrap in background" Oct 2 19:36:17.855217 kubelet[2075]: E1002 19:36:17.855183 2075 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.17:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:17.855358 kubelet[2075]: I1002 19:36:17.855236 2075 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:36:17.857219 kubelet[2075]: I1002 19:36:17.857196 2075 server.go:660] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:36:17.857422 kubelet[2075]: I1002 19:36:17.857404 2075 container_manager_linux.go:262] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:36:17.857510 kubelet[2075]: I1002 19:36:17.857489 2075 container_manager_linux.go:267] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] ExperimentalCPUManagerPolicy:none ExperimentalCPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container ExperimentalCPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none} Oct 2 19:36:17.857638 kubelet[2075]: I1002 19:36:17.857518 2075 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:36:17.857638 kubelet[2075]: I1002 19:36:17.857539 2075 container_manager_linux.go:302] "Creating device plugin manager" devicePluginEnabled=true Oct 2 19:36:17.857726 kubelet[2075]: I1002 19:36:17.857644 2075 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:36:17.860140 kubelet[2075]: I1002 19:36:17.860121 2075 kubelet.go:381] "Attempting to sync node with API server" Oct 2 19:36:17.860140 kubelet[2075]: I1002 19:36:17.860141 2075 kubelet.go:270] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:36:17.860257 kubelet[2075]: I1002 19:36:17.860161 2075 kubelet.go:281] "Adding apiserver pod source" Oct 2 19:36:17.860257 kubelet[2075]: I1002 19:36:17.860174 2075 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:36:17.868674 kubelet[2075]: W1002 19:36:17.868595 2075 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: Get "https://10.200.8.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-58c23d0da1&limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:17.868674 kubelet[2075]: E1002 19:36:17.868670 2075 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-58c23d0da1&limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:17.868804 kubelet[2075]: I1002 19:36:17.868767 2075 kuberuntime_manager.go:240] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:36:17.869063 kubelet[2075]: W1002 19:36:17.869045 2075 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:36:17.869483 kubelet[2075]: I1002 19:36:17.869463 2075 server.go:1175] "Started kubelet" Oct 2 19:36:17.869606 kubelet[2075]: W1002 19:36:17.869567 2075 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: Get "https://10.200.8.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:17.869678 kubelet[2075]: E1002 19:36:17.869613 2075 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:17.870802 kubelet[2075]: E1002 19:36:17.870403 2075 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-58c23d0da1.178a61780b263d61", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-58c23d0da1", UID:"ci-3510.3.0-a-58c23d0da1", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-58c23d0da1"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 36, 17, 869438305, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 36, 17, 869438305, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.8.17:6443/api/v1/namespaces/default/events": dial tcp 10.200.8.17:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:36:17.870955 kubelet[2075]: I1002 19:36:17.870945 2075 server.go:155] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:36:17.870000 audit[2075]: AVC avc: denied { mac_admin } for pid=2075 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.870000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:36:17.871795 kubelet[2075]: I1002 19:36:17.871610 2075 server.go:438] "Adding debug handlers to kubelet server" Oct 2 19:36:17.870000 audit[2075]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dbb410 a1=c000d72420 a2=c000dbb3e0 a3=25 items=0 ppid=1 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:17.870000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:36:17.872369 kubelet[2075]: I1002 19:36:17.872348 2075 kubelet.go:1274] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:36:17.871000 audit[2075]: AVC avc: denied { mac_admin } for pid=2075 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:17.871000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:36:17.871000 audit[2075]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003e3f40 a1=c000d72438 a2=c000dbb4a0 a3=25 items=0 ppid=1 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:17.872818 kubelet[2075]: E1002 19:36:17.872638 2075 cri_stats_provider.go:452] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:36:17.872818 kubelet[2075]: E1002 19:36:17.872665 2075 kubelet.go:1317] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:36:17.871000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:36:17.873004 kubelet[2075]: I1002 19:36:17.872946 2075 kubelet.go:1278] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:36:17.873155 kubelet[2075]: I1002 19:36:17.873125 2075 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:36:17.874031 kubelet[2075]: I1002 19:36:17.874013 2075 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 19:36:17.875648 kubelet[2075]: I1002 19:36:17.875630 2075 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Oct 2 19:36:17.876416 kubelet[2075]: W1002 19:36:17.876378 2075 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: Get "https://10.200.8.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:17.876573 kubelet[2075]: E1002 19:36:17.876560 2075 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:17.876671 kubelet[2075]: E1002 19:36:17.876654 2075 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:17.877012 kubelet[2075]: E1002 19:36:17.876940 2075 controller.go:144] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-58c23d0da1?timeout=10s": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:17.877000 audit[2089]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2089 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:17.877000 audit[2089]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd0e71a780 a2=0 a3=7ffd0e71a76c items=0 ppid=2075 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:17.877000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:36:17.879000 audit[2090]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:17.879000 audit[2090]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd6990700 a2=0 a3=7ffdd69906ec items=0 ppid=2075 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:17.879000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:36:17.889000 audit[2094]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2094 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:17.889000 audit[2094]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdbcd82180 a2=0 a3=7ffdbcd8216c items=0 ppid=2075 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:17.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:36:17.894000 audit[2096]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2096 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:17.894000 audit[2096]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff30b95b70 a2=0 a3=7fff30b95b5c items=0 ppid=2075 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:17.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:36:17.953000 audit[2099]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2099 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:17.953000 audit[2099]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd263ce210 a2=0 a3=7ffd263ce1fc items=0 ppid=2075 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:17.953000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:36:17.954000 audit[2101]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:17.954000 audit[2101]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc0bf679a0 a2=0 a3=7ffc0bf6798c items=0 ppid=2075 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:17.954000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:36:17.975214 kubelet[2075]: E1002 19:36:17.975180 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:17.987045 kubelet[2075]: I1002 19:36:17.987011 2075 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:17.987499 kubelet[2075]: E1002 19:36:17.987360 2075 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.17:6443/api/v1/nodes\": dial tcp 10.200.8.17:6443: connect: connection refused" node="ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:17.987958 kubelet[2075]: I1002 19:36:17.987943 2075 cpu_manager.go:213] "Starting CPU manager" policy="none" Oct 2 19:36:17.988035 kubelet[2075]: I1002 19:36:17.988027 2075 cpu_manager.go:214] "Reconciling" reconcilePeriod="10s" Oct 2 19:36:17.988100 kubelet[2075]: I1002 19:36:17.988084 2075 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:36:17.993448 kubelet[2075]: I1002 19:36:17.993425 2075 policy_none.go:49] "None policy: Start" Oct 2 19:36:17.994076 kubelet[2075]: I1002 19:36:17.994054 2075 memory_manager.go:168] "Starting memorymanager" policy="None" Oct 2 19:36:17.994076 kubelet[2075]: I1002 19:36:17.994079 2075 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:36:18.002683 systemd[1]: Created slice kubepods.slice. Oct 2 19:36:18.004000 audit[2104]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_rule pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:18.004000 audit[2104]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcc8cffd40 a2=0 a3=7ffcc8cffd2c items=0 ppid=2075 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:36:18.008659 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:36:18.012006 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:36:18.030479 kubelet[2075]: I1002 19:36:18.030458 2075 manager.go:447] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:36:18.028000 audit[2075]: AVC avc: denied { mac_admin } for pid=2075 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:18.028000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:36:18.028000 audit[2075]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dbb770 a1=c000927cc8 a2=c000dbb740 a3=25 items=0 ppid=1 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.028000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:36:18.030836 kubelet[2075]: I1002 19:36:18.030525 2075 server.go:86] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:36:18.030836 kubelet[2075]: I1002 19:36:18.030716 2075 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:36:18.032247 kubelet[2075]: E1002 19:36:18.032149 2075 eviction_manager.go:256] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:18.045000 audit[2108]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:18.045000 audit[2108]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffe0b12c0e0 a2=0 a3=7ffe0b12c0cc items=0 ppid=2075 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.045000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:36:18.046000 audit[2109]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:18.046000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd65f1ed00 a2=0 a3=7ffd65f1ecec items=0 ppid=2075 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.046000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:36:18.048000 audit[2110]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2110 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:18.048000 audit[2110]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1b07b820 a2=0 a3=7ffc1b07b80c items=0 ppid=2075 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.048000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:36:18.051000 audit[2112]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2112 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:18.051000 audit[2112]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffea7819010 a2=0 a3=7ffea7818ffc items=0 ppid=2075 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:36:18.053000 audit[2114]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:18.053000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd35021a90 a2=0 a3=7ffd35021a7c items=0 ppid=2075 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:36:18.055000 audit[2116]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_rule pid=2116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:18.055000 audit[2116]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe40ce68f0 a2=0 a3=7ffe40ce68dc items=0 ppid=2075 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.055000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:36:18.057000 audit[2118]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_rule pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:18.057000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffd97ddaeb0 a2=0 a3=7ffd97ddae9c items=0 ppid=2075 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.057000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:36:18.060000 audit[2120]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_rule pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:18.060000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffd7ba13c80 a2=0 a3=7ffd7ba13c6c items=0 ppid=2075 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.060000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:36:18.062536 kubelet[2075]: I1002 19:36:18.062513 2075 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:36:18.061000 audit[2121]: NETFILTER_CFG table=mangle:44 family=10 entries=2 op=nft_register_chain pid=2121 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:18.061000 audit[2122]: NETFILTER_CFG table=mangle:45 family=2 entries=1 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:18.061000 audit[2122]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc58190cb0 a2=0 a3=7ffc58190c9c items=0 ppid=2075 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.061000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:36:18.061000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd98af2930 a2=0 a3=7ffd98af291c items=0 ppid=2075 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.061000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:36:18.062000 audit[2123]: NETFILTER_CFG table=nat:46 family=2 entries=1 op=nft_register_chain pid=2123 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:18.062000 audit[2123]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde9b2a380 a2=0 a3=7ffde9b2a36c items=0 ppid=2075 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.062000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:36:18.063000 audit[2124]: NETFILTER_CFG table=nat:47 family=10 entries=2 op=nft_register_chain pid=2124 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:18.063000 audit[2124]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffea72b62d0 a2=0 a3=7ffea72b62bc items=0 ppid=2075 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.063000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:36:18.064000 audit[2125]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:18.064000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee81d4280 a2=0 a3=7ffee81d426c items=0 ppid=2075 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:36:18.065000 audit[2127]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_rule pid=2127 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:18.065000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd94be49f0 a2=0 a3=7ffd94be49dc items=0 ppid=2075 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:36:18.066000 audit[2128]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:18.066000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc76c97070 a2=0 a3=7ffc76c9705c items=0 ppid=2075 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:36:18.069000 audit[2130]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2130 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:18.069000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fff3d6eed40 a2=0 a3=7fff3d6eed2c items=0 ppid=2075 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.069000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:36:18.070000 audit[2131]: NETFILTER_CFG table=nat:52 family=10 entries=1 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:18.070000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc811a1890 a2=0 a3=7ffc811a187c items=0 ppid=2075 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.070000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:36:18.071000 audit[2132]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:18.071000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd62db5350 a2=0 a3=7ffd62db533c items=0 ppid=2075 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:36:18.072000 audit[2134]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2134 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:18.072000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffff4c9a000 a2=0 a3=7ffff4c99fec items=0 ppid=2075 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.072000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:36:18.075821 kubelet[2075]: E1002 19:36:18.075800 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:18.074000 audit[2136]: NETFILTER_CFG table=nat:55 family=10 entries=2 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:18.074000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe1406b330 a2=0 a3=7ffe1406b31c items=0 ppid=2075 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:36:18.077423 kubelet[2075]: E1002 19:36:18.077386 2075 controller.go:144] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-58c23d0da1?timeout=10s": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:18.077000 audit[2138]: NETFILTER_CFG table=nat:56 family=10 entries=1 op=nft_register_rule pid=2138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:18.077000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fff0ebdff80 a2=0 a3=7fff0ebdff6c items=0 ppid=2075 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:36:18.079000 audit[2140]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_rule pid=2140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:18.079000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffdea4620d0 a2=0 a3=7ffdea4620bc items=0 ppid=2075 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.079000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:36:18.082000 audit[2142]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_rule pid=2142 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:18.082000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffc89816330 a2=0 a3=7ffc8981631c items=0 ppid=2075 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:36:18.084748 kubelet[2075]: I1002 19:36:18.084729 2075 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:36:18.084824 kubelet[2075]: I1002 19:36:18.084758 2075 status_manager.go:161] "Starting to sync pod status with apiserver" Oct 2 19:36:18.084824 kubelet[2075]: I1002 19:36:18.084778 2075 kubelet.go:2010] "Starting kubelet main sync loop" Oct 2 19:36:18.084936 kubelet[2075]: E1002 19:36:18.084830 2075 kubelet.go:2034] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 19:36:18.085435 kubelet[2075]: W1002 19:36:18.085410 2075 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: Get "https://10.200.8.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:18.085509 kubelet[2075]: E1002 19:36:18.085441 2075 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:18.084000 audit[2143]: NETFILTER_CFG table=mangle:59 family=10 entries=1 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:18.084000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb6ee2fc0 a2=0 a3=7ffcb6ee2fac items=0 ppid=2075 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:36:18.085000 audit[2144]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:18.085000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3b2e9ca0 a2=0 a3=7ffe3b2e9c8c items=0 ppid=2075 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.085000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:36:18.086000 audit[2145]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:18.086000 audit[2145]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3f12a7e0 a2=0 a3=7ffe3f12a7cc items=0 ppid=2075 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:18.086000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:36:18.176999 kubelet[2075]: E1002 19:36:18.176957 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:18.185460 kubelet[2075]: I1002 19:36:18.185428 2075 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:36:18.186949 kubelet[2075]: I1002 19:36:18.186931 2075 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:36:18.188558 kubelet[2075]: I1002 19:36:18.188541 2075 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:36:18.189188 kubelet[2075]: I1002 19:36:18.189080 2075 status_manager.go:667] "Failed to get status for pod" podUID=2db16e4dd71ecff5cb904318016c81b9 pod="kube-system/kube-apiserver-ci-3510.3.0-a-58c23d0da1" err="Get \"https://10.200.8.17:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.0-a-58c23d0da1\": dial tcp 10.200.8.17:6443: connect: connection refused" Oct 2 19:36:18.190669 kubelet[2075]: I1002 19:36:18.190493 2075 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:18.191031 kubelet[2075]: E1002 19:36:18.191018 2075 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.17:6443/api/v1/nodes\": dial tcp 10.200.8.17:6443: connect: connection refused" node="ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:18.191923 kubelet[2075]: I1002 19:36:18.191906 2075 status_manager.go:667] "Failed to get status for pod" podUID=b684ae4af7db32bc76e00878759c5a9f pod="kube-system/kube-controller-manager-ci-3510.3.0-a-58c23d0da1" err="Get \"https://10.200.8.17:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.0-a-58c23d0da1\": dial tcp 10.200.8.17:6443: connect: connection refused" Oct 2 19:36:18.193459 kubelet[2075]: I1002 19:36:18.193236 2075 status_manager.go:667] "Failed to get status for pod" podUID=11ff39f68ecd9ad87ee4e3a5cafc88e1 pod="kube-system/kube-scheduler-ci-3510.3.0-a-58c23d0da1" err="Get \"https://10.200.8.17:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.0-a-58c23d0da1\": dial tcp 10.200.8.17:6443: connect: connection refused" Oct 2 19:36:18.194503 systemd[1]: Created slice kubepods-burstable-pod2db16e4dd71ecff5cb904318016c81b9.slice. Oct 2 19:36:18.208185 systemd[1]: Created slice kubepods-burstable-podb684ae4af7db32bc76e00878759c5a9f.slice. Oct 2 19:36:18.218961 systemd[1]: Created slice kubepods-burstable-pod11ff39f68ecd9ad87ee4e3a5cafc88e1.slice. Oct 2 19:36:18.277957 kubelet[2075]: E1002 19:36:18.277918 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:18.278078 kubelet[2075]: I1002 19:36:18.278033 2075 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/11ff39f68ecd9ad87ee4e3a5cafc88e1-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-58c23d0da1\" (UID: \"11ff39f68ecd9ad87ee4e3a5cafc88e1\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:18.278472 kubelet[2075]: I1002 19:36:18.278267 2075 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2db16e4dd71ecff5cb904318016c81b9-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-58c23d0da1\" (UID: \"2db16e4dd71ecff5cb904318016c81b9\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:18.278472 kubelet[2075]: I1002 19:36:18.278313 2075 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2db16e4dd71ecff5cb904318016c81b9-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-58c23d0da1\" (UID: \"2db16e4dd71ecff5cb904318016c81b9\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:18.278472 kubelet[2075]: I1002 19:36:18.278355 2075 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2db16e4dd71ecff5cb904318016c81b9-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-58c23d0da1\" (UID: \"2db16e4dd71ecff5cb904318016c81b9\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:18.278472 kubelet[2075]: I1002 19:36:18.278396 2075 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b684ae4af7db32bc76e00878759c5a9f-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-58c23d0da1\" (UID: \"b684ae4af7db32bc76e00878759c5a9f\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:18.278472 kubelet[2075]: I1002 19:36:18.278441 2075 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b684ae4af7db32bc76e00878759c5a9f-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-58c23d0da1\" (UID: \"b684ae4af7db32bc76e00878759c5a9f\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:18.278864 kubelet[2075]: I1002 19:36:18.278480 2075 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b684ae4af7db32bc76e00878759c5a9f-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-58c23d0da1\" (UID: \"b684ae4af7db32bc76e00878759c5a9f\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:18.278864 kubelet[2075]: I1002 19:36:18.278523 2075 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b684ae4af7db32bc76e00878759c5a9f-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-58c23d0da1\" (UID: \"b684ae4af7db32bc76e00878759c5a9f\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:18.278864 kubelet[2075]: I1002 19:36:18.278564 2075 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b684ae4af7db32bc76e00878759c5a9f-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-58c23d0da1\" (UID: \"b684ae4af7db32bc76e00878759c5a9f\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:18.378893 kubelet[2075]: E1002 19:36:18.378842 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:18.478269 kubelet[2075]: E1002 19:36:18.478153 2075 controller.go:144] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-58c23d0da1?timeout=10s": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:18.479363 kubelet[2075]: E1002 19:36:18.479330 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:18.507353 env[1342]: time="2023-10-02T19:36:18.507297547Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-58c23d0da1,Uid:2db16e4dd71ecff5cb904318016c81b9,Namespace:kube-system,Attempt:0,}" Oct 2 19:36:18.517789 env[1342]: time="2023-10-02T19:36:18.517754358Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-58c23d0da1,Uid:b684ae4af7db32bc76e00878759c5a9f,Namespace:kube-system,Attempt:0,}" Oct 2 19:36:18.521287 env[1342]: time="2023-10-02T19:36:18.521253561Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-58c23d0da1,Uid:11ff39f68ecd9ad87ee4e3a5cafc88e1,Namespace:kube-system,Attempt:0,}" Oct 2 19:36:18.579925 kubelet[2075]: E1002 19:36:18.579865 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:18.593197 kubelet[2075]: I1002 19:36:18.593177 2075 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:18.593632 kubelet[2075]: E1002 19:36:18.593613 2075 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.17:6443/api/v1/nodes\": dial tcp 10.200.8.17:6443: connect: connection refused" node="ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:18.679977 kubelet[2075]: E1002 19:36:18.679943 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:18.780620 kubelet[2075]: E1002 19:36:18.780275 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:18.880353 kubelet[2075]: E1002 19:36:18.880323 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:18.892768 kubelet[2075]: W1002 19:36:18.892720 2075 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: Get "https://10.200.8.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:18.892859 kubelet[2075]: E1002 19:36:18.892775 2075 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:18.981270 kubelet[2075]: E1002 19:36:18.981233 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:19.032973 kubelet[2075]: W1002 19:36:19.032838 2075 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: Get "https://10.200.8.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:19.032973 kubelet[2075]: E1002 19:36:19.032923 2075 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:19.082889 kubelet[2075]: E1002 19:36:19.082508 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:19.093569 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount602517637.mount: Deactivated successfully. Oct 2 19:36:19.130102 env[1342]: time="2023-10-02T19:36:19.130058389Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:19.137392 env[1342]: time="2023-10-02T19:36:19.137354892Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:19.154847 env[1342]: time="2023-10-02T19:36:19.154803021Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:19.161291 env[1342]: time="2023-10-02T19:36:19.161253846Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:19.172596 env[1342]: time="2023-10-02T19:36:19.172562541Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:19.182722 env[1342]: time="2023-10-02T19:36:19.182681968Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:19.183089 kubelet[2075]: E1002 19:36:19.183064 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:19.190400 env[1342]: time="2023-10-02T19:36:19.190372260Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:19.196093 env[1342]: time="2023-10-02T19:36:19.196062206Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:19.203752 env[1342]: time="2023-10-02T19:36:19.203724599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:19.208980 env[1342]: time="2023-10-02T19:36:19.208948858Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:19.223167 env[1342]: time="2023-10-02T19:36:19.223139575Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:19.232206 env[1342]: time="2023-10-02T19:36:19.232179631Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:19.277423 env[1342]: time="2023-10-02T19:36:19.277350711Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:36:19.277544 env[1342]: time="2023-10-02T19:36:19.277404009Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:36:19.277544 env[1342]: time="2023-10-02T19:36:19.277418609Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:36:19.277741 env[1342]: time="2023-10-02T19:36:19.277609204Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bdcec30f5abc45433b908921012a218bbf56ff1004dfe879ed076ccbb7eda4f0 pid=2153 runtime=io.containerd.runc.v2 Oct 2 19:36:19.278707 kubelet[2075]: E1002 19:36:19.278672 2075 controller.go:144] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-58c23d0da1?timeout=10s": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:19.284019 kubelet[2075]: E1002 19:36:19.283951 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:19.299152 systemd[1]: Started cri-containerd-bdcec30f5abc45433b908921012a218bbf56ff1004dfe879ed076ccbb7eda4f0.scope. Oct 2 19:36:19.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.314000 audit: BPF prog-id=62 op=LOAD Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2153 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264636563333066356162633435343333623930383932313031326132 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2153 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264636563333066356162633435343333623930383932313031326132 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit: BPF prog-id=63 op=LOAD Oct 2 19:36:19.315000 audit[2163]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00009ce40 items=0 ppid=2153 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264636563333066356162633435343333623930383932313031326132 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit: BPF prog-id=64 op=LOAD Oct 2 19:36:19.315000 audit[2163]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00009ce88 items=0 ppid=2153 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264636563333066356162633435343333623930383932313031326132 Oct 2 19:36:19.315000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:36:19.315000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.315000 audit: BPF prog-id=65 op=LOAD Oct 2 19:36:19.315000 audit[2163]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00009d298 items=0 ppid=2153 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264636563333066356162633435343333623930383932313031326132 Oct 2 19:36:19.348967 env[1342]: time="2023-10-02T19:36:19.348719983Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:36:19.348967 env[1342]: time="2023-10-02T19:36:19.348763182Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:36:19.348967 env[1342]: time="2023-10-02T19:36:19.348782681Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:36:19.349225 env[1342]: time="2023-10-02T19:36:19.349155371Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/90229d3cab5882a40f9c11ed350c6b1c2d782282b00a63acfcd186f67f0f0c63 pid=2187 runtime=io.containerd.runc.v2 Oct 2 19:36:19.361968 env[1342]: time="2023-10-02T19:36:19.361929926Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-58c23d0da1,Uid:2db16e4dd71ecff5cb904318016c81b9,Namespace:kube-system,Attempt:0,} returns sandbox id \"bdcec30f5abc45433b908921012a218bbf56ff1004dfe879ed076ccbb7eda4f0\"" Oct 2 19:36:19.366918 env[1342]: time="2023-10-02T19:36:19.366883992Z" level=info msg="CreateContainer within sandbox \"bdcec30f5abc45433b908921012a218bbf56ff1004dfe879ed076ccbb7eda4f0\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:36:19.369648 systemd[1]: Started cri-containerd-90229d3cab5882a40f9c11ed350c6b1c2d782282b00a63acfcd186f67f0f0c63.scope. Oct 2 19:36:19.379596 env[1342]: time="2023-10-02T19:36:19.379518451Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:36:19.379771 env[1342]: time="2023-10-02T19:36:19.379742445Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:36:19.379919 env[1342]: time="2023-10-02T19:36:19.379893341Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:36:19.380371 env[1342]: time="2023-10-02T19:36:19.380229232Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7cd6f9959e182e2e61ad02cd6d932c368c79847d4aec5a401e89957a9237fee7 pid=2224 runtime=io.containerd.runc.v2 Oct 2 19:36:19.384150 kubelet[2075]: E1002 19:36:19.384126 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:19.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.392000 audit: BPF prog-id=66 op=LOAD Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2187 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930323239643363616235383832613430663963313165643335306336 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2187 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930323239643363616235383832613430663963313165643335306336 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit: BPF prog-id=67 op=LOAD Oct 2 19:36:19.393000 audit[2204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b2c50 items=0 ppid=2187 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930323239643363616235383832613430663963313165643335306336 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.393000 audit: BPF prog-id=68 op=LOAD Oct 2 19:36:19.393000 audit[2204]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b2c98 items=0 ppid=2187 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930323239643363616235383832613430663963313165643335306336 Oct 2 19:36:19.395000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:36:19.395000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:36:19.395000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.395000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.395000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.395000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.395000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.395000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.395000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.395000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.395000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.395000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.395000 audit: BPF prog-id=69 op=LOAD Oct 2 19:36:19.395000 audit[2204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b30a8 items=0 ppid=2187 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930323239643363616235383832613430663963313165643335306336 Oct 2 19:36:19.400116 kubelet[2075]: W1002 19:36:19.396232 2075 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: Get "https://10.200.8.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-58c23d0da1&limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:19.400116 kubelet[2075]: E1002 19:36:19.396286 2075 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-58c23d0da1&limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Oct 2 19:36:19.400116 kubelet[2075]: I1002 19:36:19.396940 2075 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:19.400116 kubelet[2075]: E1002 19:36:19.397363 2075 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.17:6443/api/v1/nodes\": dial tcp 10.200.8.17:6443: connect: connection refused" node="ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:19.410351 systemd[1]: Started cri-containerd-7cd6f9959e182e2e61ad02cd6d932c368c79847d4aec5a401e89957a9237fee7.scope. Oct 2 19:36:19.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.424000 audit: BPF prog-id=70 op=LOAD Oct 2 19:36:19.425000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.425000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2224 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763643666393935396531383265326536316164303263643664393332 Oct 2 19:36:19.426000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.426000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2224 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763643666393935396531383265326536316164303263643664393332 Oct 2 19:36:19.426000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.426000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.426000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.426000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.426000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.426000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.426000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.426000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.426000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.426000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.426000 audit: BPF prog-id=71 op=LOAD Oct 2 19:36:19.426000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003031d0 items=0 ppid=2224 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763643666393935396531383265326536316164303263643664393332 Oct 2 19:36:19.427000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.427000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.427000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.427000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.427000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.427000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.427000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.427000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.427000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.427000 audit: BPF prog-id=72 op=LOAD Oct 2 19:36:19.427000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000303218 items=0 ppid=2224 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763643666393935396531383265326536316164303263643664393332 Oct 2 19:36:19.427000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:36:19.428000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:36:19.428000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.428000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.428000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.428000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.428000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.428000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.428000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.428000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.428000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.428000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.428000 audit: BPF prog-id=73 op=LOAD Oct 2 19:36:19.428000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000303628 items=0 ppid=2224 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763643666393935396531383265326536316164303263643664393332 Oct 2 19:36:19.436020 env[1342]: time="2023-10-02T19:36:19.435977726Z" level=info msg="CreateContainer within sandbox \"bdcec30f5abc45433b908921012a218bbf56ff1004dfe879ed076ccbb7eda4f0\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"cc32e51eee1cce4057df4d82167276dc578db23247fd9cfe9758f328ec9339fb\"" Oct 2 19:36:19.436928 env[1342]: time="2023-10-02T19:36:19.436719806Z" level=info msg="StartContainer for \"cc32e51eee1cce4057df4d82167276dc578db23247fd9cfe9758f328ec9339fb\"" Oct 2 19:36:19.444670 env[1342]: time="2023-10-02T19:36:19.444633592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-58c23d0da1,Uid:11ff39f68ecd9ad87ee4e3a5cafc88e1,Namespace:kube-system,Attempt:0,} returns sandbox id \"90229d3cab5882a40f9c11ed350c6b1c2d782282b00a63acfcd186f67f0f0c63\"" Oct 2 19:36:19.447232 env[1342]: time="2023-10-02T19:36:19.447203823Z" level=info msg="CreateContainer within sandbox \"90229d3cab5882a40f9c11ed350c6b1c2d782282b00a63acfcd186f67f0f0c63\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:36:19.462369 systemd[1]: Started cri-containerd-cc32e51eee1cce4057df4d82167276dc578db23247fd9cfe9758f328ec9339fb.scope. Oct 2 19:36:19.478979 env[1342]: time="2023-10-02T19:36:19.478865868Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-58c23d0da1,Uid:b684ae4af7db32bc76e00878759c5a9f,Namespace:kube-system,Attempt:0,} returns sandbox id \"7cd6f9959e182e2e61ad02cd6d932c368c79847d4aec5a401e89957a9237fee7\"" Oct 2 19:36:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.488000 audit: BPF prog-id=74 op=LOAD Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2153 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363333265353165656531636365343035376466346438323136373237 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2153 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363333265353165656531636365343035376466346438323136373237 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit: BPF prog-id=75 op=LOAD Oct 2 19:36:19.489000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023e460 items=0 ppid=2153 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363333265353165656531636365343035376466346438323136373237 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit: BPF prog-id=76 op=LOAD Oct 2 19:36:19.489000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023e4a8 items=0 ppid=2153 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363333265353165656531636365343035376466346438323136373237 Oct 2 19:36:19.489000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:36:19.489000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { perfmon } for pid=2269 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit[2269]: AVC avc: denied { bpf } for pid=2269 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.489000 audit: BPF prog-id=77 op=LOAD Oct 2 19:36:19.489000 audit[2269]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023e8b8 items=0 ppid=2153 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363333265353165656531636365343035376466346438323136373237 Oct 2 19:36:19.493559 kubelet[2075]: E1002 19:36:19.490375 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:19.501201 env[1342]: time="2023-10-02T19:36:19.501166065Z" level=info msg="CreateContainer within sandbox \"7cd6f9959e182e2e61ad02cd6d932c368c79847d4aec5a401e89957a9237fee7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:36:19.518271 env[1342]: time="2023-10-02T19:36:19.518231704Z" level=info msg="CreateContainer within sandbox \"90229d3cab5882a40f9c11ed350c6b1c2d782282b00a63acfcd186f67f0f0c63\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"e10795f73ae2fc7b5c0d846b542f661da2595b8b624c1fe820db4d369fd7546b\"" Oct 2 19:36:19.518869 env[1342]: time="2023-10-02T19:36:19.518838988Z" level=info msg="StartContainer for \"e10795f73ae2fc7b5c0d846b542f661da2595b8b624c1fe820db4d369fd7546b\"" Oct 2 19:36:19.540387 env[1342]: time="2023-10-02T19:36:19.535486838Z" level=info msg="StartContainer for \"cc32e51eee1cce4057df4d82167276dc578db23247fd9cfe9758f328ec9339fb\" returns successfully" Oct 2 19:36:19.558600 systemd[1]: Started cri-containerd-e10795f73ae2fc7b5c0d846b542f661da2595b8b624c1fe820db4d369fd7546b.scope. Oct 2 19:36:19.575740 env[1342]: time="2023-10-02T19:36:19.575688752Z" level=info msg="CreateContainer within sandbox \"7cd6f9959e182e2e61ad02cd6d932c368c79847d4aec5a401e89957a9237fee7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"14f9b0f44e1862aebcdaba8f57bfa24793f8989902d978d17600dc2a4ce9aa0d\"" Oct 2 19:36:19.576297 env[1342]: time="2023-10-02T19:36:19.576255937Z" level=info msg="StartContainer for \"14f9b0f44e1862aebcdaba8f57bfa24793f8989902d978d17600dc2a4ce9aa0d\"" Oct 2 19:36:19.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.580000 audit: BPF prog-id=78 op=LOAD Oct 2 19:36:19.581000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.581000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2187 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531303739356637336165326663376235633064383436623534326636 Oct 2 19:36:19.581000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.581000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2187 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531303739356637336165326663376235633064383436623534326636 Oct 2 19:36:19.582000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.582000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.582000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.582000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.582000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.582000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.582000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.582000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.582000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.582000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.582000 audit: BPF prog-id=79 op=LOAD Oct 2 19:36:19.582000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00036e930 items=0 ppid=2187 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531303739356637336165326663376235633064383436623534326636 Oct 2 19:36:19.583000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.583000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.583000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.583000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.583000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.583000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.583000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.583000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.583000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.583000 audit: BPF prog-id=80 op=LOAD Oct 2 19:36:19.583000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00036e978 items=0 ppid=2187 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531303739356637336165326663376235633064383436623534326636 Oct 2 19:36:19.584000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:36:19.584000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:36:19.584000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.584000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.584000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.584000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.584000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.584000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.584000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.584000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.584000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.584000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.584000 audit: BPF prog-id=81 op=LOAD Oct 2 19:36:19.584000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00036ed88 items=0 ppid=2187 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531303739356637336165326663376235633064383436623534326636 Oct 2 19:36:19.593236 kubelet[2075]: E1002 19:36:19.590869 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:19.612729 systemd[1]: Started cri-containerd-14f9b0f44e1862aebcdaba8f57bfa24793f8989902d978d17600dc2a4ce9aa0d.scope. Oct 2 19:36:19.665135 env[1342]: time="2023-10-02T19:36:19.665088838Z" level=info msg="StartContainer for \"e10795f73ae2fc7b5c0d846b542f661da2595b8b624c1fe820db4d369fd7546b\" returns successfully" Oct 2 19:36:19.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.665000 audit: BPF prog-id=82 op=LOAD Oct 2 19:36:19.666000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.666000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2224 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134663962306634346531383632616562636461626138663537626661 Oct 2 19:36:19.666000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.666000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2224 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134663962306634346531383632616562636461626138663537626661 Oct 2 19:36:19.666000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.666000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.666000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.666000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.666000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.666000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.666000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.666000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.666000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.666000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.666000 audit: BPF prog-id=83 op=LOAD Oct 2 19:36:19.666000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003c8120 items=0 ppid=2224 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134663962306634346531383632616562636461626138663537626661 Oct 2 19:36:19.667000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.667000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.667000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.667000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.667000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.667000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.667000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.667000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.667000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.667000 audit: BPF prog-id=84 op=LOAD Oct 2 19:36:19.667000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003c8168 items=0 ppid=2224 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134663962306634346531383632616562636461626138663537626661 Oct 2 19:36:19.668000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:36:19.668000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:36:19.668000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.668000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.668000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.668000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.668000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.668000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.668000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.668000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.668000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.668000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:19.668000 audit: BPF prog-id=85 op=LOAD Oct 2 19:36:19.668000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003c8578 items=0 ppid=2224 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:19.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134663962306634346531383632616562636461626138663537626661 Oct 2 19:36:19.691553 kubelet[2075]: E1002 19:36:19.691483 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:19.759980 env[1342]: time="2023-10-02T19:36:19.759936376Z" level=info msg="StartContainer for \"14f9b0f44e1862aebcdaba8f57bfa24793f8989902d978d17600dc2a4ce9aa0d\" returns successfully" Oct 2 19:36:19.792067 kubelet[2075]: E1002 19:36:19.791965 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:19.892169 kubelet[2075]: E1002 19:36:19.892087 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:19.992662 kubelet[2075]: E1002 19:36:19.992618 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:20.092565 systemd[1]: run-containerd-runc-k8s.io-bdcec30f5abc45433b908921012a218bbf56ff1004dfe879ed076ccbb7eda4f0-runc.pkxXIz.mount: Deactivated successfully. Oct 2 19:36:20.092850 kubelet[2075]: E1002 19:36:20.092834 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:20.193379 kubelet[2075]: E1002 19:36:20.193345 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:20.293963 kubelet[2075]: E1002 19:36:20.293922 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:20.394899 kubelet[2075]: E1002 19:36:20.394780 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:20.495542 kubelet[2075]: E1002 19:36:20.495509 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:20.596245 kubelet[2075]: E1002 19:36:20.596204 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:20.696702 kubelet[2075]: E1002 19:36:20.696664 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:20.797218 kubelet[2075]: E1002 19:36:20.797177 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:20.897466 kubelet[2075]: E1002 19:36:20.897431 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:20.998265 kubelet[2075]: E1002 19:36:20.998153 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:21.000163 kubelet[2075]: I1002 19:36:21.000138 2075 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:21.098814 kubelet[2075]: E1002 19:36:21.098775 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:21.199985 kubelet[2075]: E1002 19:36:21.199937 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:21.301212 kubelet[2075]: E1002 19:36:21.301082 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:21.402241 kubelet[2075]: E1002 19:36:21.402202 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:21.503025 kubelet[2075]: E1002 19:36:21.502990 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:21.603969 kubelet[2075]: E1002 19:36:21.603847 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:21.614000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:21.621635 kernel: kauditd_printk_skb: 624 callbacks suppressed Oct 2 19:36:21.621700 kernel: audit: type=1400 audit(1696275381.614:707): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:21.614000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0002f2780 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:36:21.665098 kernel: audit: type=1300 audit(1696275381.614:707): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0002f2780 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:36:21.665191 kernel: audit: type=1327 audit(1696275381.614:707): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:21.614000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:21.614000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:21.703897 kernel: audit: type=1400 audit(1696275381.614:708): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:21.703999 kernel: audit: type=1300 audit(1696275381.614:708): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0001da2c0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:36:21.614000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0001da2c0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:36:21.705246 kubelet[2075]: E1002 19:36:21.705223 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:21.614000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:21.747974 kernel: audit: type=1327 audit(1696275381.614:708): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:21.805660 kubelet[2075]: E1002 19:36:21.805615 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:21.906850 kubelet[2075]: E1002 19:36:21.906731 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:22.007706 kubelet[2075]: E1002 19:36:22.007665 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:22.108946 kubelet[2075]: E1002 19:36:22.108919 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:22.209953 kubelet[2075]: E1002 19:36:22.209914 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:22.311182 kubelet[2075]: E1002 19:36:22.311143 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:22.411976 kubelet[2075]: E1002 19:36:22.411929 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:22.512690 kubelet[2075]: E1002 19:36:22.512562 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:22.583000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:22.583000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c004482750 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:36:22.623673 kernel: audit: type=1400 audit(1696275382.583:709): avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:22.623767 kernel: audit: type=1300 audit(1696275382.583:709): arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c004482750 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:36:22.623893 kubelet[2075]: E1002 19:36:22.623852 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:22.583000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:36:22.662568 kernel: audit: type=1327 audit(1696275382.583:709): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:36:22.662664 kernel: audit: type=1400 audit(1696275382.583:710): avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:22.583000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:22.583000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c002ffad40 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:36:22.583000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:36:22.589000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7137 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:22.589000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c004edc5a0 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:36:22.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:36:22.601000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:22.601000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=50 a1=c004edd0e0 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:36:22.601000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:36:22.701000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:22.701000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c001b08340 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:36:22.701000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:36:22.701000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:22.701000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c00558d7d0 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:36:22.701000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:36:22.725336 kubelet[2075]: E1002 19:36:22.725308 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:22.788204 kubelet[2075]: E1002 19:36:22.788101 2075 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.0-a-58c23d0da1\" not found" node="ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:22.825580 kubelet[2075]: E1002 19:36:22.825557 2075 kubelet.go:2448] "Error getting node" err="node \"ci-3510.3.0-a-58c23d0da1\" not found" Oct 2 19:36:22.830372 kubelet[2075]: I1002 19:36:22.830335 2075 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:22.871925 kubelet[2075]: I1002 19:36:22.871898 2075 apiserver.go:52] "Watching apiserver" Oct 2 19:36:22.909712 kubelet[2075]: I1002 19:36:22.909675 2075 reconciler.go:169] "Reconciler: start to sync state" Oct 2 19:36:23.032177 kubelet[2075]: E1002 19:36:23.032143 2075 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:25.626829 systemd[1]: Reloading. Oct 2 19:36:25.720460 /usr/lib/systemd/system-generators/torcx-generator[2401]: time="2023-10-02T19:36:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:36:25.720498 /usr/lib/systemd/system-generators/torcx-generator[2401]: time="2023-10-02T19:36:25Z" level=info msg="torcx already run" Oct 2 19:36:25.804461 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:36:25.804481 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:36:25.823716 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit: BPF prog-id=86 op=LOAD Oct 2 19:36:25.901000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit: BPF prog-id=87 op=LOAD Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.901000 audit: BPF prog-id=88 op=LOAD Oct 2 19:36:25.901000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:36:25.901000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:36:25.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.903000 audit: BPF prog-id=89 op=LOAD Oct 2 19:36:25.903000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit: BPF prog-id=90 op=LOAD Oct 2 19:36:25.904000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit: BPF prog-id=91 op=LOAD Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.904000 audit: BPF prog-id=92 op=LOAD Oct 2 19:36:25.904000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:36:25.904000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:36:25.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.905000 audit: BPF prog-id=93 op=LOAD Oct 2 19:36:25.905000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit: BPF prog-id=94 op=LOAD Oct 2 19:36:25.907000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit: BPF prog-id=95 op=LOAD Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.907000 audit: BPF prog-id=96 op=LOAD Oct 2 19:36:25.907000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:36:25.907000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit: BPF prog-id=97 op=LOAD Oct 2 19:36:25.911000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.912000 audit: BPF prog-id=98 op=LOAD Oct 2 19:36:25.912000 audit: BPF prog-id=78 op=UNLOAD Oct 2 19:36:25.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit: BPF prog-id=99 op=LOAD Oct 2 19:36:25.913000 audit: BPF prog-id=70 op=UNLOAD Oct 2 19:36:25.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.913000 audit: BPF prog-id=100 op=LOAD Oct 2 19:36:25.914000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:36:25.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.915000 audit: BPF prog-id=101 op=LOAD Oct 2 19:36:25.915000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:36:25.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.916000 audit: BPF prog-id=102 op=LOAD Oct 2 19:36:25.916000 audit: BPF prog-id=74 op=UNLOAD Oct 2 19:36:25.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.918000 audit: BPF prog-id=103 op=LOAD Oct 2 19:36:25.918000 audit: BPF prog-id=82 op=UNLOAD Oct 2 19:36:25.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.918000 audit: BPF prog-id=104 op=LOAD Oct 2 19:36:25.918000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit: BPF prog-id=105 op=LOAD Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:25.919000 audit: BPF prog-id=106 op=LOAD Oct 2 19:36:25.919000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:36:25.919000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:36:25.935552 kubelet[2075]: I1002 19:36:25.935525 2075 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:36:25.937043 systemd[1]: Stopping kubelet.service... Oct 2 19:36:25.955182 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:36:25.955382 systemd[1]: Stopped kubelet.service. Oct 2 19:36:25.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:25.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:25.957243 systemd[1]: Started kubelet.service. Oct 2 19:36:26.031195 kubelet[2463]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 19:36:26.031575 kubelet[2463]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:36:26.031646 kubelet[2463]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:36:26.031856 kubelet[2463]: I1002 19:36:26.031819 2463 server.go:200] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:36:26.033318 kubelet[2463]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 19:36:26.033318 kubelet[2463]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:36:26.033318 kubelet[2463]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:36:26.035992 kubelet[2463]: I1002 19:36:26.035969 2463 server.go:413] "Kubelet version" kubeletVersion="v1.25.10" Oct 2 19:36:26.035992 kubelet[2463]: I1002 19:36:26.035987 2463 server.go:415] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:36:26.036263 kubelet[2463]: I1002 19:36:26.036241 2463 server.go:825] "Client rotation is on, will bootstrap in background" Oct 2 19:36:26.037426 kubelet[2463]: I1002 19:36:26.037404 2463 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:36:26.038196 kubelet[2463]: I1002 19:36:26.038180 2463 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:36:26.040857 kubelet[2463]: I1002 19:36:26.040830 2463 server.go:660] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:36:26.041059 kubelet[2463]: I1002 19:36:26.041041 2463 container_manager_linux.go:262] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:36:26.041128 kubelet[2463]: I1002 19:36:26.041113 2463 container_manager_linux.go:267] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] ExperimentalCPUManagerPolicy:none ExperimentalCPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container ExperimentalCPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none} Oct 2 19:36:26.041237 kubelet[2463]: I1002 19:36:26.041134 2463 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:36:26.041237 kubelet[2463]: I1002 19:36:26.041148 2463 container_manager_linux.go:302] "Creating device plugin manager" devicePluginEnabled=true Oct 2 19:36:26.041237 kubelet[2463]: I1002 19:36:26.041184 2463 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:36:26.044368 kubelet[2463]: I1002 19:36:26.044347 2463 kubelet.go:381] "Attempting to sync node with API server" Oct 2 19:36:26.044368 kubelet[2463]: I1002 19:36:26.044367 2463 kubelet.go:270] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:36:26.044496 kubelet[2463]: I1002 19:36:26.044402 2463 kubelet.go:281] "Adding apiserver pod source" Oct 2 19:36:26.044496 kubelet[2463]: I1002 19:36:26.044417 2463 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:36:26.052191 kubelet[2463]: I1002 19:36:26.052174 2463 kuberuntime_manager.go:240] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:36:26.052632 kubelet[2463]: I1002 19:36:26.052612 2463 server.go:1175] "Started kubelet" Oct 2 19:36:26.058577 kubelet[2463]: I1002 19:36:26.058562 2463 server.go:155] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:36:26.059532 kubelet[2463]: I1002 19:36:26.059510 2463 server.go:438] "Adding debug handlers to kubelet server" Oct 2 19:36:26.058000 audit[2463]: AVC avc: denied { mac_admin } for pid=2463 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:26.058000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:36:26.058000 audit[2463]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c7b890 a1=c000d0f260 a2=c000c7b860 a3=25 items=0 ppid=1 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:26.058000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:36:26.061725 kubelet[2463]: I1002 19:36:26.061706 2463 kubelet.go:1274] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:36:26.060000 audit[2463]: AVC avc: denied { mac_admin } for pid=2463 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:26.060000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:36:26.063392 kubelet[2463]: E1002 19:36:26.063376 2463 cri_stats_provider.go:452] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:36:26.063506 kubelet[2463]: E1002 19:36:26.063496 2463 kubelet.go:1317] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:36:26.060000 audit[2463]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d0dda0 a1=c000d0f320 a2=c000c7b920 a3=25 items=0 ppid=1 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:26.060000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:36:26.072896 kubelet[2463]: I1002 19:36:26.069670 2463 kubelet.go:1278] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:36:26.072896 kubelet[2463]: I1002 19:36:26.069706 2463 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:36:26.076582 kubelet[2463]: I1002 19:36:26.076563 2463 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 19:36:26.078148 kubelet[2463]: I1002 19:36:26.078127 2463 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Oct 2 19:36:26.090862 kubelet[2463]: E1002 19:36:26.090845 2463 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:26.107203 kubelet[2463]: I1002 19:36:26.107144 2463 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:36:26.134967 kubelet[2463]: I1002 19:36:26.134946 2463 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:36:26.135139 kubelet[2463]: I1002 19:36:26.135128 2463 status_manager.go:161] "Starting to sync pod status with apiserver" Oct 2 19:36:26.135457 kubelet[2463]: I1002 19:36:26.135440 2463 kubelet.go:2010] "Starting kubelet main sync loop" Oct 2 19:36:26.135610 kubelet[2463]: E1002 19:36:26.135600 2463 kubelet.go:2034] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:36:26.181145 kubelet[2463]: I1002 19:36:26.181124 2463 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:26.198672 kubelet[2463]: I1002 19:36:26.195695 2463 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:26.198672 kubelet[2463]: I1002 19:36:26.195771 2463 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:26.221243 kubelet[2463]: I1002 19:36:26.221215 2463 cpu_manager.go:213] "Starting CPU manager" policy="none" Oct 2 19:36:26.221243 kubelet[2463]: I1002 19:36:26.221240 2463 cpu_manager.go:214] "Reconciling" reconcilePeriod="10s" Oct 2 19:36:26.221404 kubelet[2463]: I1002 19:36:26.221257 2463 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:36:26.221404 kubelet[2463]: I1002 19:36:26.221395 2463 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:36:26.221493 kubelet[2463]: I1002 19:36:26.221410 2463 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 19:36:26.221493 kubelet[2463]: I1002 19:36:26.221417 2463 policy_none.go:49] "None policy: Start" Oct 2 19:36:26.222348 kubelet[2463]: I1002 19:36:26.222324 2463 memory_manager.go:168] "Starting memorymanager" policy="None" Oct 2 19:36:26.222444 kubelet[2463]: I1002 19:36:26.222365 2463 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:36:26.222525 kubelet[2463]: I1002 19:36:26.222510 2463 state_mem.go:75] "Updated machine memory state" Oct 2 19:36:26.226603 kubelet[2463]: I1002 19:36:26.226580 2463 manager.go:447] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:36:26.226684 kubelet[2463]: I1002 19:36:26.226640 2463 server.go:86] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:36:26.225000 audit[2463]: AVC avc: denied { mac_admin } for pid=2463 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:26.225000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:36:26.225000 audit[2463]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001391470 a1=c000633350 a2=c001391440 a3=25 items=0 ppid=1 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:26.225000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:36:26.227040 kubelet[2463]: I1002 19:36:26.226826 2463 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:36:26.239470 kubelet[2463]: I1002 19:36:26.239429 2463 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:36:26.239569 kubelet[2463]: I1002 19:36:26.239511 2463 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:36:26.239569 kubelet[2463]: I1002 19:36:26.239551 2463 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:36:26.379694 kubelet[2463]: I1002 19:36:26.379659 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b684ae4af7db32bc76e00878759c5a9f-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-58c23d0da1\" (UID: \"b684ae4af7db32bc76e00878759c5a9f\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:26.380000 kubelet[2463]: I1002 19:36:26.379985 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b684ae4af7db32bc76e00878759c5a9f-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-58c23d0da1\" (UID: \"b684ae4af7db32bc76e00878759c5a9f\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:26.380129 kubelet[2463]: I1002 19:36:26.380119 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b684ae4af7db32bc76e00878759c5a9f-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-58c23d0da1\" (UID: \"b684ae4af7db32bc76e00878759c5a9f\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:26.380255 kubelet[2463]: I1002 19:36:26.380246 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/11ff39f68ecd9ad87ee4e3a5cafc88e1-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-58c23d0da1\" (UID: \"11ff39f68ecd9ad87ee4e3a5cafc88e1\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:26.380368 kubelet[2463]: I1002 19:36:26.380360 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2db16e4dd71ecff5cb904318016c81b9-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-58c23d0da1\" (UID: \"2db16e4dd71ecff5cb904318016c81b9\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:26.380471 kubelet[2463]: I1002 19:36:26.380463 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2db16e4dd71ecff5cb904318016c81b9-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-58c23d0da1\" (UID: \"2db16e4dd71ecff5cb904318016c81b9\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:26.380569 kubelet[2463]: I1002 19:36:26.380560 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b684ae4af7db32bc76e00878759c5a9f-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-58c23d0da1\" (UID: \"b684ae4af7db32bc76e00878759c5a9f\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:26.380666 kubelet[2463]: I1002 19:36:26.380658 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2db16e4dd71ecff5cb904318016c81b9-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-58c23d0da1\" (UID: \"2db16e4dd71ecff5cb904318016c81b9\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:26.380772 kubelet[2463]: I1002 19:36:26.380764 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b684ae4af7db32bc76e00878759c5a9f-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-58c23d0da1\" (UID: \"b684ae4af7db32bc76e00878759c5a9f\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:27.053100 kubelet[2463]: I1002 19:36:27.053063 2463 apiserver.go:52] "Watching apiserver" Oct 2 19:36:27.385308 kubelet[2463]: I1002 19:36:27.385180 2463 reconciler.go:169] "Reconciler: start to sync state" Oct 2 19:36:27.484766 kubelet[2463]: E1002 19:36:27.484692 2463 kubelet.go:1712] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.0-a-58c23d0da1\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:27.868594 kubelet[2463]: E1002 19:36:27.868555 2463 kubelet.go:1712] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.0-a-58c23d0da1\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:27.931130 kernel: kauditd_printk_skb: 272 callbacks suppressed Oct 2 19:36:27.931259 kernel: audit: type=1400 audit(1696275387.906:964): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:27.906000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:27.906000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d118a0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:36:27.966912 kernel: audit: type=1300 audit(1696275387.906:964): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d118a0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:36:27.906000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:27.997899 kernel: audit: type=1327 audit(1696275387.906:964): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:27.939000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:28.025909 kernel: audit: type=1400 audit(1696275387.939:965): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:27.939000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d118e0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:36:28.057895 kernel: audit: type=1300 audit(1696275387.939:965): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d118e0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:36:27.939000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:28.089276 kernel: audit: type=1327 audit(1696275387.939:965): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:27.944000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:28.113896 kernel: audit: type=1400 audit(1696275387.944:966): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:27.944000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d11940 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:36:28.135189 kubelet[2463]: E1002 19:36:28.135092 2463 kubelet.go:1712] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.0-a-58c23d0da1\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.0-a-58c23d0da1" Oct 2 19:36:28.138995 kernel: audit: type=1300 audit(1696275387.944:966): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d11940 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:36:28.139056 kernel: audit: type=1327 audit(1696275387.944:966): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:27.944000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:27.945000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:28.176054 kernel: audit: type=1400 audit(1696275387.945:967): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:36:27.945000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d11aa0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:36:27.945000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:31.227578 kubelet[2463]: E1002 19:36:31.227537 2463 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:31.900894 sudo[1669]: pam_unix(sudo:session): session closed for user root Oct 2 19:36:31.900000 audit[1669]: USER_END pid=1669 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:36:31.900000 audit[1669]: CRED_DISP pid=1669 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:36:32.000045 sshd[1666]: pam_unix(sshd:session): session closed for user core Oct 2 19:36:32.000000 audit[1666]: USER_END pid=1666 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:36:32.000000 audit[1666]: CRED_DISP pid=1666 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:36:32.003382 systemd[1]: sshd@6-10.200.8.17:22-10.200.12.6:33208.service: Deactivated successfully. Oct 2 19:36:32.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.17:22-10.200.12.6:33208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:36:32.004389 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:36:32.004597 systemd[1]: session-9.scope: Consumed 3.128s CPU time. Oct 2 19:36:32.005150 systemd-logind[1320]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:36:32.006584 systemd-logind[1320]: Removed session 9. Oct 2 19:36:36.229115 kubelet[2463]: E1002 19:36:36.229080 2463 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:38.186000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7171 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:36:38.192047 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 2 19:36:38.192155 kernel: audit: type=1400 audit(1696275398.186:973): avc: denied { watch } for pid=2350 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7171 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:36:38.186000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eeb380 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:36:38.186000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:38.251916 kernel: audit: type=1300 audit(1696275398.186:973): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eeb380 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:36:38.252051 kernel: audit: type=1327 audit(1696275398.186:973): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:36:39.555783 kubelet[2463]: I1002 19:36:39.555725 2463 kuberuntime_manager.go:1050] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:36:39.556375 env[1342]: time="2023-10-02T19:36:39.556322707Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:36:39.556841 kubelet[2463]: I1002 19:36:39.556817 2463 kubelet_network.go:60] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:36:39.557238 kubelet[2463]: E1002 19:36:39.557223 2463 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:40.196062 kubelet[2463]: I1002 19:36:40.196016 2463 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:36:40.201774 systemd[1]: Created slice kubepods-besteffort-pod194a7cea_7499_4e4c_93a4_d2a57c602984.slice. Oct 2 19:36:40.268146 kubelet[2463]: I1002 19:36:40.268113 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/194a7cea-7499-4e4c-93a4-d2a57c602984-xtables-lock\") pod \"kube-proxy-b6pm7\" (UID: \"194a7cea-7499-4e4c-93a4-d2a57c602984\") " pod="kube-system/kube-proxy-b6pm7" Oct 2 19:36:40.268341 kubelet[2463]: I1002 19:36:40.268164 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/194a7cea-7499-4e4c-93a4-d2a57c602984-lib-modules\") pod \"kube-proxy-b6pm7\" (UID: \"194a7cea-7499-4e4c-93a4-d2a57c602984\") " pod="kube-system/kube-proxy-b6pm7" Oct 2 19:36:40.268341 kubelet[2463]: I1002 19:36:40.268202 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lmwfj\" (UniqueName: \"kubernetes.io/projected/194a7cea-7499-4e4c-93a4-d2a57c602984-kube-api-access-lmwfj\") pod \"kube-proxy-b6pm7\" (UID: \"194a7cea-7499-4e4c-93a4-d2a57c602984\") " pod="kube-system/kube-proxy-b6pm7" Oct 2 19:36:40.268341 kubelet[2463]: I1002 19:36:40.268237 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/194a7cea-7499-4e4c-93a4-d2a57c602984-kube-proxy\") pod \"kube-proxy-b6pm7\" (UID: \"194a7cea-7499-4e4c-93a4-d2a57c602984\") " pod="kube-system/kube-proxy-b6pm7" Oct 2 19:36:40.373595 kubelet[2463]: E1002 19:36:40.373563 2463 projected.go:290] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Oct 2 19:36:40.373595 kubelet[2463]: E1002 19:36:40.373590 2463 projected.go:196] Error preparing data for projected volume kube-api-access-lmwfj for pod kube-system/kube-proxy-b6pm7: configmap "kube-root-ca.crt" not found Oct 2 19:36:40.373827 kubelet[2463]: E1002 19:36:40.373655 2463 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/194a7cea-7499-4e4c-93a4-d2a57c602984-kube-api-access-lmwfj podName:194a7cea-7499-4e4c-93a4-d2a57c602984 nodeName:}" failed. No retries permitted until 2023-10-02 19:36:40.873634491 +0000 UTC m=+14.911580197 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-lmwfj" (UniqueName: "kubernetes.io/projected/194a7cea-7499-4e4c-93a4-d2a57c602984-kube-api-access-lmwfj") pod "kube-proxy-b6pm7" (UID: "194a7cea-7499-4e4c-93a4-d2a57c602984") : configmap "kube-root-ca.crt" not found Oct 2 19:36:40.560977 kubelet[2463]: I1002 19:36:40.560844 2463 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:36:40.567363 systemd[1]: Created slice kubepods-besteffort-pod46ac7768_6fb9_4854_9d3f_f73781588619.slice. Oct 2 19:36:40.570248 kubelet[2463]: I1002 19:36:40.570224 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/46ac7768-6fb9-4854-9d3f-f73781588619-var-lib-calico\") pod \"tigera-operator-64db64cb98-nz94x\" (UID: \"46ac7768-6fb9-4854-9d3f-f73781588619\") " pod="tigera-operator/tigera-operator-64db64cb98-nz94x" Oct 2 19:36:40.570857 kubelet[2463]: I1002 19:36:40.570827 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-25p5q\" (UniqueName: \"kubernetes.io/projected/46ac7768-6fb9-4854-9d3f-f73781588619-kube-api-access-25p5q\") pod \"tigera-operator-64db64cb98-nz94x\" (UID: \"46ac7768-6fb9-4854-9d3f-f73781588619\") " pod="tigera-operator/tigera-operator-64db64cb98-nz94x" Oct 2 19:36:40.872302 env[1342]: time="2023-10-02T19:36:40.871846664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-64db64cb98-nz94x,Uid:46ac7768-6fb9-4854-9d3f-f73781588619,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:36:40.919440 env[1342]: time="2023-10-02T19:36:40.919355370Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:36:40.919440 env[1342]: time="2023-10-02T19:36:40.919393270Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:36:40.919440 env[1342]: time="2023-10-02T19:36:40.919407170Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:36:40.919705 env[1342]: time="2023-10-02T19:36:40.919580567Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a701d1411193c346b55512b5f0affbf3e846beecd944cddf6e874aaa05cd3804 pid=2570 runtime=io.containerd.runc.v2 Oct 2 19:36:40.941443 systemd[1]: Started cri-containerd-a701d1411193c346b55512b5f0affbf3e846beecd944cddf6e874aaa05cd3804.scope. Oct 2 19:36:40.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.982900 kernel: audit: type=1400 audit(1696275400.951:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.982981 kernel: audit: type=1400 audit(1696275400.951:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.983009 kernel: audit: type=1400 audit(1696275400.951:976): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.007910 kernel: audit: type=1400 audit(1696275400.951:977): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.007986 kernel: audit: type=1400 audit(1696275400.951:978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.047942 kernel: audit: type=1400 audit(1696275400.951:979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.048018 kernel: audit: type=1400 audit(1696275400.951:980): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.993000 audit: BPF prog-id=107 op=LOAD Oct 2 19:36:40.993000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.993000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2570 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:40.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137303164313431313139336333343662353535313262356630616666 Oct 2 19:36:40.993000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.993000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2570 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:40.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137303164313431313139336333343662353535313262356630616666 Oct 2 19:36:40.993000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.993000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.993000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.993000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.993000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.993000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.993000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.993000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.993000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.993000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:40.993000 audit: BPF prog-id=108 op=LOAD Oct 2 19:36:40.993000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024370 items=0 ppid=2570 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:40.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137303164313431313139336333343662353535313262356630616666 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit: BPF prog-id=109 op=LOAD Oct 2 19:36:41.020000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000243b8 items=0 ppid=2570 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137303164313431313139336333343662353535313262356630616666 Oct 2 19:36:41.020000 audit: BPF prog-id=109 op=UNLOAD Oct 2 19:36:41.020000 audit: BPF prog-id=108 op=UNLOAD Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.020000 audit: BPF prog-id=110 op=LOAD Oct 2 19:36:41.020000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000247c8 items=0 ppid=2570 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137303164313431313139336333343662353535313262356630616666 Oct 2 19:36:41.075843 env[1342]: time="2023-10-02T19:36:41.075805381Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-64db64cb98-nz94x,Uid:46ac7768-6fb9-4854-9d3f-f73781588619,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"a701d1411193c346b55512b5f0affbf3e846beecd944cddf6e874aaa05cd3804\"" Oct 2 19:36:41.077325 env[1342]: time="2023-10-02T19:36:41.077288457Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:36:41.112176 env[1342]: time="2023-10-02T19:36:41.111898090Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-b6pm7,Uid:194a7cea-7499-4e4c-93a4-d2a57c602984,Namespace:kube-system,Attempt:0,}" Oct 2 19:36:41.160198 env[1342]: time="2023-10-02T19:36:41.160069101Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:36:41.160344 env[1342]: time="2023-10-02T19:36:41.160103901Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:36:41.160344 env[1342]: time="2023-10-02T19:36:41.160118201Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:36:41.161958 env[1342]: time="2023-10-02T19:36:41.161913271Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4195fa43d7d2f890216e0f6c1d0a2c6d4f14c95b2425bc4b1188c4fbda409cad pid=2611 runtime=io.containerd.runc.v2 Oct 2 19:36:41.173729 systemd[1]: Started cri-containerd-4195fa43d7d2f890216e0f6c1d0a2c6d4f14c95b2425bc4b1188c4fbda409cad.scope. Oct 2 19:36:41.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit: BPF prog-id=111 op=LOAD Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2611 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431393566613433643764326638393032313665306636633164306132 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=2611 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431393566613433643764326638393032313665306636633164306132 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit: BPF prog-id=112 op=LOAD Oct 2 19:36:41.193000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0001d9560 items=0 ppid=2611 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431393566613433643764326638393032313665306636633164306132 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.193000 audit: BPF prog-id=113 op=LOAD Oct 2 19:36:41.193000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0001d95a8 items=0 ppid=2611 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431393566613433643764326638393032313665306636633164306132 Oct 2 19:36:41.193000 audit: BPF prog-id=113 op=UNLOAD Oct 2 19:36:41.193000 audit: BPF prog-id=112 op=UNLOAD Oct 2 19:36:41.194000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.194000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.194000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.194000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.194000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.194000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.194000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.194000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.194000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.194000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.194000 audit: BPF prog-id=114 op=LOAD Oct 2 19:36:41.194000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0001d99b8 items=0 ppid=2611 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431393566613433643764326638393032313665306636633164306132 Oct 2 19:36:41.207349 env[1342]: time="2023-10-02T19:36:41.207314028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-b6pm7,Uid:194a7cea-7499-4e4c-93a4-d2a57c602984,Namespace:kube-system,Attempt:0,} returns sandbox id \"4195fa43d7d2f890216e0f6c1d0a2c6d4f14c95b2425bc4b1188c4fbda409cad\"" Oct 2 19:36:41.211114 env[1342]: time="2023-10-02T19:36:41.211080166Z" level=info msg="CreateContainer within sandbox \"4195fa43d7d2f890216e0f6c1d0a2c6d4f14c95b2425bc4b1188c4fbda409cad\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:36:41.229650 kubelet[2463]: E1002 19:36:41.229631 2463 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:41.274007 env[1342]: time="2023-10-02T19:36:41.273966136Z" level=info msg="CreateContainer within sandbox \"4195fa43d7d2f890216e0f6c1d0a2c6d4f14c95b2425bc4b1188c4fbda409cad\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"a6e0a8b2969926e90f72e48371465de9c1faf8c008d2d6eb5f92b300db25fbfc\"" Oct 2 19:36:41.276435 env[1342]: time="2023-10-02T19:36:41.274745324Z" level=info msg="StartContainer for \"a6e0a8b2969926e90f72e48371465de9c1faf8c008d2d6eb5f92b300db25fbfc\"" Oct 2 19:36:41.291802 systemd[1]: Started cri-containerd-a6e0a8b2969926e90f72e48371465de9c1faf8c008d2d6eb5f92b300db25fbfc.scope. Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2611 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136653061386232393639393236653930663732653438333731343635 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit: BPF prog-id=115 op=LOAD Oct 2 19:36:41.308000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002e3c70 items=0 ppid=2611 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136653061386232393639393236653930663732653438333731343635 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit: BPF prog-id=116 op=LOAD Oct 2 19:36:41.308000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002e3cb8 items=0 ppid=2611 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136653061386232393639393236653930663732653438333731343635 Oct 2 19:36:41.308000 audit: BPF prog-id=116 op=UNLOAD Oct 2 19:36:41.308000 audit: BPF prog-id=115 op=UNLOAD Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:41.308000 audit: BPF prog-id=117 op=LOAD Oct 2 19:36:41.308000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002e3d48 items=0 ppid=2611 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136653061386232393639393236653930663732653438333731343635 Oct 2 19:36:41.332905 env[1342]: time="2023-10-02T19:36:41.332633676Z" level=info msg="StartContainer for \"a6e0a8b2969926e90f72e48371465de9c1faf8c008d2d6eb5f92b300db25fbfc\" returns successfully" Oct 2 19:36:41.427650 kernel: IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP) Oct 2 19:36:41.427785 kernel: IPVS: Connection hash table configured (size=4096, memory=32Kbytes) Oct 2 19:36:41.433896 kernel: IPVS: ipvs loaded. Oct 2 19:36:41.474897 kernel: IPVS: [rr] scheduler registered. Oct 2 19:36:41.485895 kernel: IPVS: [wrr] scheduler registered. Oct 2 19:36:41.493914 kernel: IPVS: [sh] scheduler registered. Oct 2 19:36:41.560000 audit[2711]: NETFILTER_CFG table=mangle:62 family=2 entries=1 op=nft_register_chain pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.560000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdead28e10 a2=0 a3=7ffdead28dfc items=0 ppid=2663 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.560000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:36:41.562000 audit[2713]: NETFILTER_CFG table=mangle:63 family=10 entries=1 op=nft_register_chain pid=2713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.562000 audit[2713]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcdcd5f590 a2=0 a3=7ffcdcd5f57c items=0 ppid=2663 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.562000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:36:41.565000 audit[2714]: NETFILTER_CFG table=nat:64 family=10 entries=1 op=nft_register_chain pid=2714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.565000 audit[2714]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd21a0f5e0 a2=0 a3=7ffd21a0f5cc items=0 ppid=2663 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:36:41.570000 audit[2715]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_chain pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.570000 audit[2715]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc99ef7c0 a2=0 a3=7ffcc99ef7ac items=0 ppid=2663 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:36:41.572000 audit[2716]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_chain pid=2716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.572000 audit[2716]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9f2590a0 a2=0 a3=7fff9f25908c items=0 ppid=2663 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:36:41.573000 audit[2717]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.573000 audit[2717]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff72b77e0 a2=0 a3=7ffff72b77cc items=0 ppid=2663 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:36:41.668000 audit[2718]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.668000 audit[2718]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe856d2d80 a2=0 a3=7ffe856d2d6c items=0 ppid=2663 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.668000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:36:41.672000 audit[2720]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.672000 audit[2720]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc28ad5b70 a2=0 a3=7ffc28ad5b5c items=0 ppid=2663 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.672000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:36:41.676000 audit[2723]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.676000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc3cc32980 a2=0 a3=7ffc3cc3296c items=0 ppid=2663 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.676000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:36:41.678000 audit[2724]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_chain pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.678000 audit[2724]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4ab47320 a2=0 a3=7ffc4ab4730c items=0 ppid=2663 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.678000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:36:41.686483 systemd[1]: run-containerd-runc-k8s.io-a701d1411193c346b55512b5f0affbf3e846beecd944cddf6e874aaa05cd3804-runc.vqmqAN.mount: Deactivated successfully. Oct 2 19:36:41.689000 audit[2726]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.689000 audit[2726]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc1509350 a2=0 a3=7ffcc150933c items=0 ppid=2663 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.689000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:36:41.691000 audit[2727]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.691000 audit[2727]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf69a9ae0 a2=0 a3=7ffcf69a9acc items=0 ppid=2663 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.691000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:36:41.694000 audit[2729]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.694000 audit[2729]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffefc41b60 a2=0 a3=7fffefc41b4c items=0 ppid=2663 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.694000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:36:41.697000 audit[2732]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.697000 audit[2732]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffef896fc50 a2=0 a3=7ffef896fc3c items=0 ppid=2663 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.697000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:36:41.698000 audit[2733]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_chain pid=2733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.698000 audit[2733]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe903c6150 a2=0 a3=7ffe903c613c items=0 ppid=2663 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.698000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:36:41.701000 audit[2735]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.701000 audit[2735]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc1cec32f0 a2=0 a3=7ffc1cec32dc items=0 ppid=2663 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.701000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:36:41.702000 audit[2736]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_chain pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.702000 audit[2736]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed4a335a0 a2=0 a3=7ffed4a3358c items=0 ppid=2663 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.702000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:36:41.705000 audit[2738]: NETFILTER_CFG table=filter:79 family=2 entries=1 op=nft_register_rule pid=2738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.705000 audit[2738]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3cf1c700 a2=0 a3=7ffd3cf1c6ec items=0 ppid=2663 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.705000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:36:41.708000 audit[2741]: NETFILTER_CFG table=filter:80 family=2 entries=1 op=nft_register_rule pid=2741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.708000 audit[2741]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2252ea80 a2=0 a3=7ffe2252ea6c items=0 ppid=2663 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.708000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:36:41.712000 audit[2744]: NETFILTER_CFG table=filter:81 family=2 entries=1 op=nft_register_rule pid=2744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.712000 audit[2744]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd00e8b740 a2=0 a3=7ffd00e8b72c items=0 ppid=2663 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.712000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:36:41.713000 audit[2745]: NETFILTER_CFG table=nat:82 family=2 entries=1 op=nft_register_chain pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.713000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd5b2c8570 a2=0 a3=7ffd5b2c855c items=0 ppid=2663 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.713000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:36:41.715000 audit[2747]: NETFILTER_CFG table=nat:83 family=2 entries=1 op=nft_register_rule pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.715000 audit[2747]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffeb89ff630 a2=0 a3=7ffeb89ff61c items=0 ppid=2663 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.715000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:36:41.719000 audit[2750]: NETFILTER_CFG table=nat:84 family=2 entries=1 op=nft_register_rule pid=2750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:36:41.719000 audit[2750]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1d2f0c20 a2=0 a3=7ffd1d2f0c0c items=0 ppid=2663 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.719000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:36:41.778000 audit[2754]: NETFILTER_CFG table=filter:85 family=2 entries=6 op=nft_register_rule pid=2754 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:36:41.778000 audit[2754]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffe26f93130 a2=0 a3=7ffe26f9311c items=0 ppid=2663 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.778000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:36:41.794000 audit[2754]: NETFILTER_CFG table=nat:86 family=2 entries=17 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:36:41.794000 audit[2754]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe26f93130 a2=0 a3=7ffe26f9311c items=0 ppid=2663 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.794000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:36:41.802000 audit[2757]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.802000 audit[2757]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcd9a8dcf0 a2=0 a3=7ffcd9a8dcdc items=0 ppid=2663 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.802000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:36:41.805000 audit[2759]: NETFILTER_CFG table=filter:88 family=10 entries=2 op=nft_register_chain pid=2759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.805000 audit[2759]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffce09e8d80 a2=0 a3=7ffce09e8d6c items=0 ppid=2663 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:36:41.808000 audit[2762]: NETFILTER_CFG table=filter:89 family=10 entries=2 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.808000 audit[2762]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc3a41c860 a2=0 a3=7ffc3a41c84c items=0 ppid=2663 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.808000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:36:41.810000 audit[2763]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.810000 audit[2763]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe94bc5150 a2=0 a3=7ffe94bc513c items=0 ppid=2663 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:36:41.812000 audit[2765]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_rule pid=2765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.812000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff23bcc090 a2=0 a3=7fff23bcc07c items=0 ppid=2663 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.812000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:36:41.814000 audit[2766]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=2766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.814000 audit[2766]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1fb54290 a2=0 a3=7ffe1fb5427c items=0 ppid=2663 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.814000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:36:41.817000 audit[2768]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=2768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.817000 audit[2768]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdec8eaaa0 a2=0 a3=7ffdec8eaa8c items=0 ppid=2663 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.817000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:36:41.821000 audit[2771]: NETFILTER_CFG table=filter:94 family=10 entries=2 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.821000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe7c9e1a10 a2=0 a3=7ffe7c9e19fc items=0 ppid=2663 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.821000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:36:41.822000 audit[2772]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.822000 audit[2772]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee4905030 a2=0 a3=7ffee490501c items=0 ppid=2663 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.822000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:36:41.825000 audit[2774]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=2774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.825000 audit[2774]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffec18740c0 a2=0 a3=7ffec18740ac items=0 ppid=2663 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.825000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:36:41.826000 audit[2775]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_chain pid=2775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.826000 audit[2775]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc14bc7ac0 a2=0 a3=7ffc14bc7aac items=0 ppid=2663 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.826000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:36:41.828000 audit[2777]: NETFILTER_CFG table=filter:98 family=10 entries=1 op=nft_register_rule pid=2777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.828000 audit[2777]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2c3c9d40 a2=0 a3=7ffc2c3c9d2c items=0 ppid=2663 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.828000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:36:41.832000 audit[2780]: NETFILTER_CFG table=filter:99 family=10 entries=1 op=nft_register_rule pid=2780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.832000 audit[2780]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd511c51d0 a2=0 a3=7ffd511c51bc items=0 ppid=2663 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.832000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:36:41.835000 audit[2783]: NETFILTER_CFG table=filter:100 family=10 entries=1 op=nft_register_rule pid=2783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.835000 audit[2783]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc636ffb20 a2=0 a3=7ffc636ffb0c items=0 ppid=2663 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.835000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:36:41.837000 audit[2784]: NETFILTER_CFG table=nat:101 family=10 entries=1 op=nft_register_chain pid=2784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.837000 audit[2784]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff578bbf90 a2=0 a3=7fff578bbf7c items=0 ppid=2663 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.837000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:36:41.839000 audit[2786]: NETFILTER_CFG table=nat:102 family=10 entries=2 op=nft_register_chain pid=2786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.839000 audit[2786]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeef880c90 a2=0 a3=7ffeef880c7c items=0 ppid=2663 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.839000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:36:41.842000 audit[2789]: NETFILTER_CFG table=nat:103 family=10 entries=2 op=nft_register_chain pid=2789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:36:41.842000 audit[2789]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff311629c0 a2=0 a3=7fff311629ac items=0 ppid=2663 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.842000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:36:41.847000 audit[2793]: NETFILTER_CFG table=filter:104 family=10 entries=3 op=nft_register_rule pid=2793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:36:41.847000 audit[2793]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd1ec15200 a2=0 a3=7ffd1ec151ec items=0 ppid=2663 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.847000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:36:41.848000 audit[2793]: NETFILTER_CFG table=nat:105 family=10 entries=10 op=nft_register_chain pid=2793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:36:41.848000 audit[2793]: SYSCALL arch=c000003e syscall=46 success=yes exit=1860 a0=3 a1=7ffd1ec15200 a2=0 a3=7ffd1ec151ec items=0 ppid=2663 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:41.848000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:36:42.518314 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1886767619.mount: Deactivated successfully. Oct 2 19:36:43.863206 env[1342]: time="2023-10-02T19:36:43.863147529Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:43.878891 env[1342]: time="2023-10-02T19:36:43.878848882Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:43.883687 env[1342]: time="2023-10-02T19:36:43.883659706Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:43.891890 env[1342]: time="2023-10-02T19:36:43.891838678Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:43.892482 env[1342]: time="2023-10-02T19:36:43.892451668Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:36:43.895678 env[1342]: time="2023-10-02T19:36:43.895650118Z" level=info msg="CreateContainer within sandbox \"a701d1411193c346b55512b5f0affbf3e846beecd944cddf6e874aaa05cd3804\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:36:43.932174 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1771290754.mount: Deactivated successfully. Oct 2 19:36:43.952841 env[1342]: time="2023-10-02T19:36:43.952801419Z" level=info msg="CreateContainer within sandbox \"a701d1411193c346b55512b5f0affbf3e846beecd944cddf6e874aaa05cd3804\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"de8c3cf46ef40f3018a0754378c960dcdaee9eca4a65f0b7c81de16c15e78283\"" Oct 2 19:36:43.955055 env[1342]: time="2023-10-02T19:36:43.953393310Z" level=info msg="StartContainer for \"de8c3cf46ef40f3018a0754378c960dcdaee9eca4a65f0b7c81de16c15e78283\"" Oct 2 19:36:43.976070 systemd[1]: Started cri-containerd-de8c3cf46ef40f3018a0754378c960dcdaee9eca4a65f0b7c81de16c15e78283.scope. Oct 2 19:36:43.993916 kernel: kauditd_printk_skb: 282 callbacks suppressed Oct 2 19:36:43.994016 kernel: audit: type=1400 audit(1696275403.988:1060): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020981 kernel: audit: type=1400 audit(1696275403.988:1061): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.034909 kernel: audit: type=1400 audit(1696275403.988:1062): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.060000 kernel: audit: type=1400 audit(1696275403.988:1063): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.060118 kernel: audit: type=1400 audit(1696275403.988:1064): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.060145 kernel: audit: type=1400 audit(1696275403.988:1065): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.076005 kernel: audit: type=1400 audit(1696275403.988:1066): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.116592 kernel: audit: type=1400 audit(1696275403.988:1067): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.116692 kernel: audit: type=1400 audit(1696275403.988:1068): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.116995 env[1342]: time="2023-10-02T19:36:44.116947573Z" level=info msg="StartContainer for \"de8c3cf46ef40f3018a0754378c960dcdaee9eca4a65f0b7c81de16c15e78283\" returns successfully" Oct 2 19:36:43.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.131907 kernel: audit: type=1400 audit(1696275403.988:1069): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.988000 audit: BPF prog-id=118 op=LOAD Oct 2 19:36:43.993000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.993000 audit[2801]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2570 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:43.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465386333636634366566343066333031386130373534333738633936 Oct 2 19:36:43.993000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.993000 audit[2801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2570 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:43.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465386333636634366566343066333031386130373534333738633936 Oct 2 19:36:43.993000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.993000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.993000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.993000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.993000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.993000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.993000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.993000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.993000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.993000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:43.993000 audit: BPF prog-id=119 op=LOAD Oct 2 19:36:43.993000 audit[2801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000328250 items=0 ppid=2570 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:43.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465386333636634366566343066333031386130373534333738633936 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit: BPF prog-id=120 op=LOAD Oct 2 19:36:44.020000 audit[2801]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000287c98 items=0 ppid=2570 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:44.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465386333636634366566343066333031386130373534333738633936 Oct 2 19:36:44.020000 audit: BPF prog-id=120 op=UNLOAD Oct 2 19:36:44.020000 audit: BPF prog-id=119 op=UNLOAD Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { perfmon } for pid=2801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit[2801]: AVC avc: denied { bpf } for pid=2801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:44.020000 audit: BPF prog-id=121 op=LOAD Oct 2 19:36:44.020000 audit[2801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002f80a8 items=0 ppid=2570 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:44.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465386333636634366566343066333031386130373534333738633936 Oct 2 19:36:44.926688 systemd[1]: run-containerd-runc-k8s.io-de8c3cf46ef40f3018a0754378c960dcdaee9eca4a65f0b7c81de16c15e78283-runc.HVUBPM.mount: Deactivated successfully. Oct 2 19:36:46.073000 audit[2857]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=2857 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:36:46.073000 audit[2857]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fffe4158ec0 a2=0 a3=7fffe4158eac items=0 ppid=2663 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:46.073000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:36:46.074000 audit[2857]: NETFILTER_CFG table=nat:107 family=2 entries=20 op=nft_register_rule pid=2857 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:36:46.074000 audit[2857]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fffe4158ec0 a2=0 a3=7fffe4158eac items=0 ppid=2663 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:46.074000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:36:46.108000 audit[2883]: NETFILTER_CFG table=filter:108 family=2 entries=14 op=nft_register_rule pid=2883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:36:46.108000 audit[2883]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffde772cbd0 a2=0 a3=7ffde772cbbc items=0 ppid=2663 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:46.108000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:36:46.109000 audit[2883]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=2883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:36:46.109000 audit[2883]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffde772cbd0 a2=0 a3=7ffde772cbbc items=0 ppid=2663 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:46.109000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:36:46.230195 kubelet[2463]: E1002 19:36:46.230156 2463 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:46.279202 kubelet[2463]: I1002 19:36:46.279170 2463 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:36:46.285340 systemd[1]: Created slice kubepods-besteffort-podcb5088eb_e8ea_4aa8_99ee_9c965ae34204.slice. Oct 2 19:36:46.291897 kubelet[2463]: W1002 19:36:46.291866 2463 reflector.go:424] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ci-3510.3.0-a-58c23d0da1" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.0-a-58c23d0da1' and this object Oct 2 19:36:46.292002 kubelet[2463]: E1002 19:36:46.291923 2463 reflector.go:140] object-"calico-system"/"tigera-ca-bundle": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ci-3510.3.0-a-58c23d0da1" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.0-a-58c23d0da1' and this object Oct 2 19:36:46.292107 kubelet[2463]: W1002 19:36:46.292089 2463 reflector.go:424] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.0-a-58c23d0da1" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.0-a-58c23d0da1' and this object Oct 2 19:36:46.292176 kubelet[2463]: E1002 19:36:46.292117 2463 reflector.go:140] object-"calico-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.0-a-58c23d0da1" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.0-a-58c23d0da1' and this object Oct 2 19:36:46.292269 kubelet[2463]: W1002 19:36:46.292254 2463 reflector.go:424] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510.3.0-a-58c23d0da1" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.0-a-58c23d0da1' and this object Oct 2 19:36:46.292341 kubelet[2463]: E1002 19:36:46.292278 2463 reflector.go:140] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510.3.0-a-58c23d0da1" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.0-a-58c23d0da1' and this object Oct 2 19:36:46.319634 kubelet[2463]: I1002 19:36:46.319603 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jjk7x\" (UniqueName: \"kubernetes.io/projected/cb5088eb-e8ea-4aa8-99ee-9c965ae34204-kube-api-access-jjk7x\") pod \"calico-typha-775d4f6d77-2bp69\" (UID: \"cb5088eb-e8ea-4aa8-99ee-9c965ae34204\") " pod="calico-system/calico-typha-775d4f6d77-2bp69" Oct 2 19:36:46.319744 kubelet[2463]: I1002 19:36:46.319667 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/cb5088eb-e8ea-4aa8-99ee-9c965ae34204-typha-certs\") pod \"calico-typha-775d4f6d77-2bp69\" (UID: \"cb5088eb-e8ea-4aa8-99ee-9c965ae34204\") " pod="calico-system/calico-typha-775d4f6d77-2bp69" Oct 2 19:36:46.319744 kubelet[2463]: I1002 19:36:46.319701 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cb5088eb-e8ea-4aa8-99ee-9c965ae34204-tigera-ca-bundle\") pod \"calico-typha-775d4f6d77-2bp69\" (UID: \"cb5088eb-e8ea-4aa8-99ee-9c965ae34204\") " pod="calico-system/calico-typha-775d4f6d77-2bp69" Oct 2 19:36:46.328864 kubelet[2463]: I1002 19:36:46.328784 2463 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:36:46.335592 systemd[1]: Created slice kubepods-besteffort-pod24a227a6_5a5a_4ce3_a951_05f0157724da.slice. Oct 2 19:36:46.420464 kubelet[2463]: I1002 19:36:46.420404 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/24a227a6-5a5a-4ce3-a951-05f0157724da-node-certs\") pod \"calico-node-l75kf\" (UID: \"24a227a6-5a5a-4ce3-a951-05f0157724da\") " pod="calico-system/calico-node-l75kf" Oct 2 19:36:46.420464 kubelet[2463]: I1002 19:36:46.420467 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/24a227a6-5a5a-4ce3-a951-05f0157724da-cni-net-dir\") pod \"calico-node-l75kf\" (UID: \"24a227a6-5a5a-4ce3-a951-05f0157724da\") " pod="calico-system/calico-node-l75kf" Oct 2 19:36:46.420863 kubelet[2463]: I1002 19:36:46.420496 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/24a227a6-5a5a-4ce3-a951-05f0157724da-lib-modules\") pod \"calico-node-l75kf\" (UID: \"24a227a6-5a5a-4ce3-a951-05f0157724da\") " pod="calico-system/calico-node-l75kf" Oct 2 19:36:46.420863 kubelet[2463]: I1002 19:36:46.420612 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/24a227a6-5a5a-4ce3-a951-05f0157724da-policysync\") pod \"calico-node-l75kf\" (UID: \"24a227a6-5a5a-4ce3-a951-05f0157724da\") " pod="calico-system/calico-node-l75kf" Oct 2 19:36:46.420863 kubelet[2463]: I1002 19:36:46.420645 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/24a227a6-5a5a-4ce3-a951-05f0157724da-tigera-ca-bundle\") pod \"calico-node-l75kf\" (UID: \"24a227a6-5a5a-4ce3-a951-05f0157724da\") " pod="calico-system/calico-node-l75kf" Oct 2 19:36:46.420863 kubelet[2463]: I1002 19:36:46.420763 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/24a227a6-5a5a-4ce3-a951-05f0157724da-var-lib-calico\") pod \"calico-node-l75kf\" (UID: \"24a227a6-5a5a-4ce3-a951-05f0157724da\") " pod="calico-system/calico-node-l75kf" Oct 2 19:36:46.420863 kubelet[2463]: I1002 19:36:46.420794 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/24a227a6-5a5a-4ce3-a951-05f0157724da-xtables-lock\") pod \"calico-node-l75kf\" (UID: \"24a227a6-5a5a-4ce3-a951-05f0157724da\") " pod="calico-system/calico-node-l75kf" Oct 2 19:36:46.421088 kubelet[2463]: I1002 19:36:46.420968 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/24a227a6-5a5a-4ce3-a951-05f0157724da-var-run-calico\") pod \"calico-node-l75kf\" (UID: \"24a227a6-5a5a-4ce3-a951-05f0157724da\") " pod="calico-system/calico-node-l75kf" Oct 2 19:36:46.421088 kubelet[2463]: I1002 19:36:46.421009 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/24a227a6-5a5a-4ce3-a951-05f0157724da-cni-bin-dir\") pod \"calico-node-l75kf\" (UID: \"24a227a6-5a5a-4ce3-a951-05f0157724da\") " pod="calico-system/calico-node-l75kf" Oct 2 19:36:46.421170 kubelet[2463]: I1002 19:36:46.421131 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/24a227a6-5a5a-4ce3-a951-05f0157724da-cni-log-dir\") pod \"calico-node-l75kf\" (UID: \"24a227a6-5a5a-4ce3-a951-05f0157724da\") " pod="calico-system/calico-node-l75kf" Oct 2 19:36:46.421276 kubelet[2463]: I1002 19:36:46.421258 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/24a227a6-5a5a-4ce3-a951-05f0157724da-flexvol-driver-host\") pod \"calico-node-l75kf\" (UID: \"24a227a6-5a5a-4ce3-a951-05f0157724da\") " pod="calico-system/calico-node-l75kf" Oct 2 19:36:46.421498 kubelet[2463]: I1002 19:36:46.421476 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wz7mr\" (UniqueName: \"kubernetes.io/projected/24a227a6-5a5a-4ce3-a951-05f0157724da-kube-api-access-wz7mr\") pod \"calico-node-l75kf\" (UID: \"24a227a6-5a5a-4ce3-a951-05f0157724da\") " pod="calico-system/calico-node-l75kf" Oct 2 19:36:46.552011 kubelet[2463]: E1002 19:36:46.551980 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.552011 kubelet[2463]: W1002 19:36:46.552005 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.552197 kubelet[2463]: E1002 19:36:46.552031 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.623411 kubelet[2463]: E1002 19:36:46.623299 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.623411 kubelet[2463]: W1002 19:36:46.623321 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.623411 kubelet[2463]: E1002 19:36:46.623346 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.623683 kubelet[2463]: E1002 19:36:46.623613 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.623683 kubelet[2463]: W1002 19:36:46.623625 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.623683 kubelet[2463]: E1002 19:36:46.623643 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.623850 kubelet[2463]: E1002 19:36:46.623838 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.623850 kubelet[2463]: W1002 19:36:46.623848 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.623973 kubelet[2463]: E1002 19:36:46.623863 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.624110 kubelet[2463]: E1002 19:36:46.624088 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.624110 kubelet[2463]: W1002 19:36:46.624103 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.624246 kubelet[2463]: E1002 19:36:46.624119 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.625277 kubelet[2463]: E1002 19:36:46.625251 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.625277 kubelet[2463]: W1002 19:36:46.625276 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.625426 kubelet[2463]: E1002 19:36:46.625296 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.726122 kubelet[2463]: E1002 19:36:46.726092 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.726122 kubelet[2463]: W1002 19:36:46.726116 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.726364 kubelet[2463]: E1002 19:36:46.726141 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.726416 kubelet[2463]: E1002 19:36:46.726392 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.726416 kubelet[2463]: W1002 19:36:46.726403 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.726531 kubelet[2463]: E1002 19:36:46.726421 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.726715 kubelet[2463]: E1002 19:36:46.726697 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.726715 kubelet[2463]: W1002 19:36:46.726713 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.726849 kubelet[2463]: E1002 19:36:46.726728 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.726954 kubelet[2463]: E1002 19:36:46.726940 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.727022 kubelet[2463]: W1002 19:36:46.726954 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.727022 kubelet[2463]: E1002 19:36:46.726970 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.727243 kubelet[2463]: E1002 19:36:46.727228 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.727243 kubelet[2463]: W1002 19:36:46.727242 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.727333 kubelet[2463]: E1002 19:36:46.727257 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.828121 kubelet[2463]: E1002 19:36:46.828094 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.828325 kubelet[2463]: W1002 19:36:46.828310 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.828405 kubelet[2463]: E1002 19:36:46.828395 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.828715 kubelet[2463]: E1002 19:36:46.828698 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.828823 kubelet[2463]: W1002 19:36:46.828812 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.828911 kubelet[2463]: E1002 19:36:46.828900 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.829212 kubelet[2463]: E1002 19:36:46.829197 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.829320 kubelet[2463]: W1002 19:36:46.829308 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.829397 kubelet[2463]: E1002 19:36:46.829388 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.829675 kubelet[2463]: E1002 19:36:46.829661 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.829769 kubelet[2463]: W1002 19:36:46.829758 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.829842 kubelet[2463]: E1002 19:36:46.829833 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.830135 kubelet[2463]: E1002 19:36:46.830121 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.830240 kubelet[2463]: W1002 19:36:46.830229 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.830316 kubelet[2463]: E1002 19:36:46.830308 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.931561 kubelet[2463]: E1002 19:36:46.931518 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.931561 kubelet[2463]: W1002 19:36:46.931540 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.931561 kubelet[2463]: E1002 19:36:46.931565 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.931810 kubelet[2463]: E1002 19:36:46.931784 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.931810 kubelet[2463]: W1002 19:36:46.931794 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.931810 kubelet[2463]: E1002 19:36:46.931808 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.932038 kubelet[2463]: E1002 19:36:46.932009 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.932038 kubelet[2463]: W1002 19:36:46.932025 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.932144 kubelet[2463]: E1002 19:36:46.932041 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.932342 kubelet[2463]: E1002 19:36:46.932322 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.932342 kubelet[2463]: W1002 19:36:46.932335 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.932490 kubelet[2463]: E1002 19:36:46.932350 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:46.932556 kubelet[2463]: E1002 19:36:46.932538 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:46.932556 kubelet[2463]: W1002 19:36:46.932554 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:46.932654 kubelet[2463]: E1002 19:36:46.932569 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.033569 kubelet[2463]: E1002 19:36:47.033542 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.033569 kubelet[2463]: W1002 19:36:47.033561 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.033809 kubelet[2463]: E1002 19:36:47.033584 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.033866 kubelet[2463]: E1002 19:36:47.033825 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.033866 kubelet[2463]: W1002 19:36:47.033836 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.033866 kubelet[2463]: E1002 19:36:47.033854 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.034101 kubelet[2463]: E1002 19:36:47.034079 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.034101 kubelet[2463]: W1002 19:36:47.034096 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.034222 kubelet[2463]: E1002 19:36:47.034113 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.034335 kubelet[2463]: E1002 19:36:47.034320 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.034335 kubelet[2463]: W1002 19:36:47.034333 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.034450 kubelet[2463]: E1002 19:36:47.034351 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.034586 kubelet[2463]: E1002 19:36:47.034567 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.034586 kubelet[2463]: W1002 19:36:47.034581 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.034691 kubelet[2463]: E1002 19:36:47.034598 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.135937 kubelet[2463]: E1002 19:36:47.135915 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.136072 kubelet[2463]: W1002 19:36:47.136047 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.136156 kubelet[2463]: E1002 19:36:47.136076 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.136306 kubelet[2463]: E1002 19:36:47.136292 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.136402 kubelet[2463]: W1002 19:36:47.136388 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.136498 kubelet[2463]: E1002 19:36:47.136488 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.136775 kubelet[2463]: E1002 19:36:47.136761 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.136870 kubelet[2463]: W1002 19:36:47.136857 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.137049 kubelet[2463]: E1002 19:36:47.137037 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.137299 kubelet[2463]: E1002 19:36:47.137287 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.137395 kubelet[2463]: W1002 19:36:47.137382 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.137492 kubelet[2463]: E1002 19:36:47.137481 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.137760 kubelet[2463]: E1002 19:36:47.137736 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.137854 kubelet[2463]: W1002 19:36:47.137841 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.137972 kubelet[2463]: E1002 19:36:47.137961 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.152000 audit[2941]: NETFILTER_CFG table=filter:110 family=2 entries=14 op=nft_register_rule pid=2941 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:36:47.152000 audit[2941]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fff030c9280 a2=0 a3=7fff030c926c items=0 ppid=2663 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:47.152000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:36:47.153000 audit[2941]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=2941 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:36:47.153000 audit[2941]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff030c9280 a2=0 a3=7fff030c926c items=0 ppid=2663 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:47.153000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:36:47.238789 kubelet[2463]: E1002 19:36:47.238703 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.238789 kubelet[2463]: W1002 19:36:47.238721 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.238789 kubelet[2463]: E1002 19:36:47.238743 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.239996 kubelet[2463]: E1002 19:36:47.239982 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.240115 kubelet[2463]: W1002 19:36:47.240102 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.240193 kubelet[2463]: E1002 19:36:47.240185 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.240449 kubelet[2463]: E1002 19:36:47.240438 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.240528 kubelet[2463]: W1002 19:36:47.240518 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.240601 kubelet[2463]: E1002 19:36:47.240593 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.240848 kubelet[2463]: E1002 19:36:47.240837 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.240963 kubelet[2463]: W1002 19:36:47.240949 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.241064 kubelet[2463]: E1002 19:36:47.241044 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.241298 kubelet[2463]: E1002 19:36:47.241280 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.241298 kubelet[2463]: W1002 19:36:47.241293 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.241396 kubelet[2463]: E1002 19:36:47.241308 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.342105 kubelet[2463]: E1002 19:36:47.342084 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.342303 kubelet[2463]: W1002 19:36:47.342283 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.342393 kubelet[2463]: E1002 19:36:47.342377 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.342716 kubelet[2463]: E1002 19:36:47.342692 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.342716 kubelet[2463]: W1002 19:36:47.342708 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.342901 kubelet[2463]: E1002 19:36:47.342727 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.343079 kubelet[2463]: E1002 19:36:47.342975 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.343079 kubelet[2463]: W1002 19:36:47.342987 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.343079 kubelet[2463]: E1002 19:36:47.343005 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.343260 kubelet[2463]: E1002 19:36:47.343217 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.343260 kubelet[2463]: W1002 19:36:47.343229 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.343260 kubelet[2463]: E1002 19:36:47.343245 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.343472 kubelet[2463]: E1002 19:36:47.343442 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.343472 kubelet[2463]: W1002 19:36:47.343459 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.343563 kubelet[2463]: E1002 19:36:47.343476 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.422112 kubelet[2463]: E1002 19:36:47.422043 2463 secret.go:192] Couldn't get secret calico-system/typha-certs: failed to sync secret cache: timed out waiting for the condition Oct 2 19:36:47.422301 kubelet[2463]: E1002 19:36:47.422239 2463 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/cb5088eb-e8ea-4aa8-99ee-9c965ae34204-typha-certs podName:cb5088eb-e8ea-4aa8-99ee-9c965ae34204 nodeName:}" failed. No retries permitted until 2023-10-02 19:36:47.922192568 +0000 UTC m=+21.960138374 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "typha-certs" (UniqueName: "kubernetes.io/secret/cb5088eb-e8ea-4aa8-99ee-9c965ae34204-typha-certs") pod "calico-typha-775d4f6d77-2bp69" (UID: "cb5088eb-e8ea-4aa8-99ee-9c965ae34204") : failed to sync secret cache: timed out waiting for the condition Oct 2 19:36:47.422449 kubelet[2463]: E1002 19:36:47.422057 2463 configmap.go:197] Couldn't get configMap calico-system/tigera-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Oct 2 19:36:47.422637 kubelet[2463]: E1002 19:36:47.422617 2463 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/cb5088eb-e8ea-4aa8-99ee-9c965ae34204-tigera-ca-bundle podName:cb5088eb-e8ea-4aa8-99ee-9c965ae34204 nodeName:}" failed. No retries permitted until 2023-10-02 19:36:47.922584462 +0000 UTC m=+21.960530168 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "tigera-ca-bundle" (UniqueName: "kubernetes.io/configmap/cb5088eb-e8ea-4aa8-99ee-9c965ae34204-tigera-ca-bundle") pod "calico-typha-775d4f6d77-2bp69" (UID: "cb5088eb-e8ea-4aa8-99ee-9c965ae34204") : failed to sync configmap cache: timed out waiting for the condition Oct 2 19:36:47.444396 kubelet[2463]: E1002 19:36:47.444375 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.444396 kubelet[2463]: W1002 19:36:47.444391 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.444648 kubelet[2463]: E1002 19:36:47.444410 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.444712 kubelet[2463]: E1002 19:36:47.444700 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.444760 kubelet[2463]: W1002 19:36:47.444717 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.444760 kubelet[2463]: E1002 19:36:47.444735 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.445007 kubelet[2463]: E1002 19:36:47.444981 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.445007 kubelet[2463]: W1002 19:36:47.444998 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.445154 kubelet[2463]: E1002 19:36:47.445016 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.445248 kubelet[2463]: E1002 19:36:47.445227 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.445248 kubelet[2463]: W1002 19:36:47.445243 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.445427 kubelet[2463]: E1002 19:36:47.445260 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.445539 kubelet[2463]: E1002 19:36:47.445524 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.445539 kubelet[2463]: W1002 19:36:47.445538 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.445684 kubelet[2463]: E1002 19:36:47.445555 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.523825 kubelet[2463]: E1002 19:36:47.523735 2463 configmap.go:197] Couldn't get configMap calico-system/tigera-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Oct 2 19:36:47.523985 kubelet[2463]: E1002 19:36:47.523968 2463 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/24a227a6-5a5a-4ce3-a951-05f0157724da-tigera-ca-bundle podName:24a227a6-5a5a-4ce3-a951-05f0157724da nodeName:}" failed. No retries permitted until 2023-10-02 19:36:48.023793589 +0000 UTC m=+22.061739295 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "tigera-ca-bundle" (UniqueName: "kubernetes.io/configmap/24a227a6-5a5a-4ce3-a951-05f0157724da-tigera-ca-bundle") pod "calico-node-l75kf" (UID: "24a227a6-5a5a-4ce3-a951-05f0157724da") : failed to sync configmap cache: timed out waiting for the condition Oct 2 19:36:47.548626 kubelet[2463]: E1002 19:36:47.547957 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.548626 kubelet[2463]: W1002 19:36:47.547975 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.548626 kubelet[2463]: E1002 19:36:47.547996 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.548626 kubelet[2463]: E1002 19:36:47.548227 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.548626 kubelet[2463]: W1002 19:36:47.548237 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.548626 kubelet[2463]: E1002 19:36:47.548252 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.548626 kubelet[2463]: E1002 19:36:47.548422 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.548626 kubelet[2463]: W1002 19:36:47.548431 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.548626 kubelet[2463]: E1002 19:36:47.548444 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.548626 kubelet[2463]: E1002 19:36:47.548618 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.549160 kubelet[2463]: W1002 19:36:47.548628 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.549160 kubelet[2463]: E1002 19:36:47.548641 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.549160 kubelet[2463]: E1002 19:36:47.548820 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.549160 kubelet[2463]: W1002 19:36:47.548829 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.549160 kubelet[2463]: E1002 19:36:47.548843 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.650230 kubelet[2463]: E1002 19:36:47.650198 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.650230 kubelet[2463]: W1002 19:36:47.650220 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.650495 kubelet[2463]: E1002 19:36:47.650250 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.650562 kubelet[2463]: E1002 19:36:47.650520 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.650562 kubelet[2463]: W1002 19:36:47.650533 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.650562 kubelet[2463]: E1002 19:36:47.650554 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.650814 kubelet[2463]: E1002 19:36:47.650796 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.650814 kubelet[2463]: W1002 19:36:47.650811 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.651002 kubelet[2463]: E1002 19:36:47.650831 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.651126 kubelet[2463]: E1002 19:36:47.651108 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.651126 kubelet[2463]: W1002 19:36:47.651123 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.651261 kubelet[2463]: E1002 19:36:47.651142 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.651383 kubelet[2463]: E1002 19:36:47.651366 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.651383 kubelet[2463]: W1002 19:36:47.651380 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.651493 kubelet[2463]: E1002 19:36:47.651399 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.752067 kubelet[2463]: E1002 19:36:47.752037 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.752067 kubelet[2463]: W1002 19:36:47.752056 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.752067 kubelet[2463]: E1002 19:36:47.752078 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.752362 kubelet[2463]: E1002 19:36:47.752311 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.752362 kubelet[2463]: W1002 19:36:47.752321 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.752362 kubelet[2463]: E1002 19:36:47.752336 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.752551 kubelet[2463]: E1002 19:36:47.752528 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.752551 kubelet[2463]: W1002 19:36:47.752537 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.752551 kubelet[2463]: E1002 19:36:47.752551 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.752767 kubelet[2463]: E1002 19:36:47.752750 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.752767 kubelet[2463]: W1002 19:36:47.752763 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.752938 kubelet[2463]: E1002 19:36:47.752778 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.753020 kubelet[2463]: E1002 19:36:47.753002 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.753020 kubelet[2463]: W1002 19:36:47.753017 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.753094 kubelet[2463]: E1002 19:36:47.753033 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.854637 kubelet[2463]: E1002 19:36:47.854521 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.854637 kubelet[2463]: W1002 19:36:47.854544 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.854637 kubelet[2463]: E1002 19:36:47.854571 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.855003 kubelet[2463]: E1002 19:36:47.854849 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.855003 kubelet[2463]: W1002 19:36:47.854863 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.855003 kubelet[2463]: E1002 19:36:47.854911 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.855188 kubelet[2463]: E1002 19:36:47.855162 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.855188 kubelet[2463]: W1002 19:36:47.855174 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.855319 kubelet[2463]: E1002 19:36:47.855192 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.855786 kubelet[2463]: E1002 19:36:47.855416 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.855786 kubelet[2463]: W1002 19:36:47.855435 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.855786 kubelet[2463]: E1002 19:36:47.855453 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.855786 kubelet[2463]: E1002 19:36:47.855686 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.855786 kubelet[2463]: W1002 19:36:47.855697 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.855786 kubelet[2463]: E1002 19:36:47.855716 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.954669 kubelet[2463]: E1002 19:36:47.954646 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.954825 kubelet[2463]: W1002 19:36:47.954811 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.954950 kubelet[2463]: E1002 19:36:47.954938 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.956442 kubelet[2463]: E1002 19:36:47.956420 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.956561 kubelet[2463]: W1002 19:36:47.956546 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.956668 kubelet[2463]: E1002 19:36:47.956649 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.961049 kubelet[2463]: E1002 19:36:47.957544 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.961049 kubelet[2463]: W1002 19:36:47.957560 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.961049 kubelet[2463]: E1002 19:36:47.957578 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.961049 kubelet[2463]: E1002 19:36:47.957784 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.961049 kubelet[2463]: W1002 19:36:47.957795 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.961049 kubelet[2463]: E1002 19:36:47.957811 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.961049 kubelet[2463]: E1002 19:36:47.958063 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.961049 kubelet[2463]: W1002 19:36:47.958075 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.961049 kubelet[2463]: E1002 19:36:47.958092 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.961049 kubelet[2463]: E1002 19:36:47.958297 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.961516 kubelet[2463]: W1002 19:36:47.958307 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.961516 kubelet[2463]: E1002 19:36:47.958324 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.961516 kubelet[2463]: E1002 19:36:47.958478 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.961516 kubelet[2463]: W1002 19:36:47.958486 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.961516 kubelet[2463]: E1002 19:36:47.958499 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.961516 kubelet[2463]: E1002 19:36:47.958642 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.961516 kubelet[2463]: W1002 19:36:47.958653 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.961516 kubelet[2463]: E1002 19:36:47.958668 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.961516 kubelet[2463]: E1002 19:36:47.958858 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.961516 kubelet[2463]: W1002 19:36:47.958867 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.961976 kubelet[2463]: E1002 19:36:47.958896 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.961976 kubelet[2463]: E1002 19:36:47.959748 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.961976 kubelet[2463]: W1002 19:36:47.959759 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.961976 kubelet[2463]: E1002 19:36:47.959775 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.961976 kubelet[2463]: E1002 19:36:47.959969 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.961976 kubelet[2463]: W1002 19:36:47.959977 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.961976 kubelet[2463]: E1002 19:36:47.959991 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.961976 kubelet[2463]: E1002 19:36:47.960141 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.961976 kubelet[2463]: W1002 19:36:47.960148 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.961976 kubelet[2463]: E1002 19:36:47.960160 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.962410 kubelet[2463]: E1002 19:36:47.960300 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.962410 kubelet[2463]: W1002 19:36:47.960307 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.962410 kubelet[2463]: E1002 19:36:47.960320 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.962410 kubelet[2463]: E1002 19:36:47.960476 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.962410 kubelet[2463]: W1002 19:36:47.960484 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.962410 kubelet[2463]: E1002 19:36:47.960496 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:47.964372 kubelet[2463]: E1002 19:36:47.964274 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:47.964372 kubelet[2463]: W1002 19:36:47.964289 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:47.964372 kubelet[2463]: E1002 19:36:47.964307 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:48.059141 kubelet[2463]: E1002 19:36:48.059115 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:48.059141 kubelet[2463]: W1002 19:36:48.059134 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:48.059339 kubelet[2463]: E1002 19:36:48.059155 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:48.059430 kubelet[2463]: E1002 19:36:48.059409 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:48.059430 kubelet[2463]: W1002 19:36:48.059426 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:48.059543 kubelet[2463]: E1002 19:36:48.059446 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:48.059722 kubelet[2463]: E1002 19:36:48.059700 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:48.059722 kubelet[2463]: W1002 19:36:48.059715 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:48.059923 kubelet[2463]: E1002 19:36:48.059734 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:48.059997 kubelet[2463]: E1002 19:36:48.059969 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:48.059997 kubelet[2463]: W1002 19:36:48.059982 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:48.060124 kubelet[2463]: E1002 19:36:48.059999 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:48.060212 kubelet[2463]: E1002 19:36:48.060191 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:48.060212 kubelet[2463]: W1002 19:36:48.060208 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:48.060352 kubelet[2463]: E1002 19:36:48.060226 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:48.060466 kubelet[2463]: E1002 19:36:48.060445 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:48.060466 kubelet[2463]: W1002 19:36:48.060460 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:48.060592 kubelet[2463]: E1002 19:36:48.060478 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:48.061356 kubelet[2463]: E1002 19:36:48.061334 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:48.061356 kubelet[2463]: W1002 19:36:48.061350 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:48.061476 kubelet[2463]: E1002 19:36:48.061368 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:48.142919 env[1342]: time="2023-10-02T19:36:48.140591254Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-l75kf,Uid:24a227a6-5a5a-4ce3-a951-05f0157724da,Namespace:calico-system,Attempt:0,}" Oct 2 19:36:48.158900 kubelet[2463]: E1002 19:36:48.158295 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:36:48.158900 kubelet[2463]: W1002 19:36:48.158314 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:36:48.158900 kubelet[2463]: E1002 19:36:48.158334 2463 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:36:48.200773 env[1342]: time="2023-10-02T19:36:48.200477599Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:36:48.200773 env[1342]: time="2023-10-02T19:36:48.200533498Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:36:48.200773 env[1342]: time="2023-10-02T19:36:48.200543498Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:36:48.201206 env[1342]: time="2023-10-02T19:36:48.201131590Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8fec4a9be9a41aa619cbd59ff02f699a716d294d88e507322e83d425242d9428 pid=3011 runtime=io.containerd.runc.v2 Oct 2 19:36:48.218670 systemd[1]: Started cri-containerd-8fec4a9be9a41aa619cbd59ff02f699a716d294d88e507322e83d425242d9428.scope. Oct 2 19:36:48.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit: BPF prog-id=122 op=LOAD Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3011 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:48.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866656334613962653961343161613631396362643539666630326636 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3011 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:48.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866656334613962653961343161613631396362643539666630326636 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit: BPF prog-id=123 op=LOAD Oct 2 19:36:48.230000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003c2720 items=0 ppid=3011 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:48.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866656334613962653961343161613631396362643539666630326636 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.230000 audit: BPF prog-id=124 op=LOAD Oct 2 19:36:48.230000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003c2768 items=0 ppid=3011 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:48.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866656334613962653961343161613631396362643539666630326636 Oct 2 19:36:48.231000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:36:48.231000 audit: BPF prog-id=123 op=UNLOAD Oct 2 19:36:48.231000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.231000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.231000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.231000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.231000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.231000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.231000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.231000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.231000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.231000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.231000 audit: BPF prog-id=125 op=LOAD Oct 2 19:36:48.231000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003c2b78 items=0 ppid=3011 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:48.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866656334613962653961343161613631396362643539666630326636 Oct 2 19:36:48.243250 env[1342]: time="2023-10-02T19:36:48.243211889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-l75kf,Uid:24a227a6-5a5a-4ce3-a951-05f0157724da,Namespace:calico-system,Attempt:0,} returns sandbox id \"8fec4a9be9a41aa619cbd59ff02f699a716d294d88e507322e83d425242d9428\"" Oct 2 19:36:48.244755 env[1342]: time="2023-10-02T19:36:48.244727267Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:36:48.391179 env[1342]: time="2023-10-02T19:36:48.391134477Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-775d4f6d77-2bp69,Uid:cb5088eb-e8ea-4aa8-99ee-9c965ae34204,Namespace:calico-system,Attempt:0,}" Oct 2 19:36:48.450060 env[1342]: time="2023-10-02T19:36:48.449995637Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:36:48.450060 env[1342]: time="2023-10-02T19:36:48.450031136Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:36:48.450269 env[1342]: time="2023-10-02T19:36:48.450045036Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:36:48.450546 env[1342]: time="2023-10-02T19:36:48.450445130Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cecc988da725cdb686b227c90c21da9a7f0cf181bdf84f31cadf01faa42e8322 pid=3054 runtime=io.containerd.runc.v2 Oct 2 19:36:48.463130 systemd[1]: Started cri-containerd-cecc988da725cdb686b227c90c21da9a7f0cf181bdf84f31cadf01faa42e8322.scope. Oct 2 19:36:48.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.474000 audit: BPF prog-id=126 op=LOAD Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3054 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:48.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365636339383864613732356364623638366232323763393063323164 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=3054 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:48.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365636339383864613732356364623638366232323763393063323164 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit: BPF prog-id=127 op=LOAD Oct 2 19:36:48.475000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0003ce6f0 items=0 ppid=3054 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:48.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365636339383864613732356364623638366232323763393063323164 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit: BPF prog-id=128 op=LOAD Oct 2 19:36:48.475000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0003ce738 items=0 ppid=3054 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:48.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365636339383864613732356364623638366232323763393063323164 Oct 2 19:36:48.475000 audit: BPF prog-id=128 op=UNLOAD Oct 2 19:36:48.475000 audit: BPF prog-id=127 op=UNLOAD Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { perfmon } for pid=3063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit[3063]: AVC avc: denied { bpf } for pid=3063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:48.475000 audit: BPF prog-id=129 op=LOAD Oct 2 19:36:48.475000 audit[3063]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003ceb48 items=0 ppid=3054 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:48.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365636339383864613732356364623638366232323763393063323164 Oct 2 19:36:48.505185 env[1342]: time="2023-10-02T19:36:48.505150449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-775d4f6d77-2bp69,Uid:cb5088eb-e8ea-4aa8-99ee-9c965ae34204,Namespace:calico-system,Attempt:0,} returns sandbox id \"cecc988da725cdb686b227c90c21da9a7f0cf181bdf84f31cadf01faa42e8322\"" Oct 2 19:36:50.252784 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2966118320.mount: Deactivated successfully. Oct 2 19:36:51.231484 kubelet[2463]: E1002 19:36:51.231452 2463 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:52.183266 env[1342]: time="2023-10-02T19:36:52.183216368Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:52.190581 env[1342]: time="2023-10-02T19:36:52.190536771Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:52.199305 env[1342]: time="2023-10-02T19:36:52.199262055Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:52.204518 env[1342]: time="2023-10-02T19:36:52.204418687Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:52.205462 env[1342]: time="2023-10-02T19:36:52.205428973Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:36:52.206852 env[1342]: time="2023-10-02T19:36:52.206826555Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 19:36:52.208378 env[1342]: time="2023-10-02T19:36:52.208346735Z" level=info msg="CreateContainer within sandbox \"8fec4a9be9a41aa619cbd59ff02f699a716d294d88e507322e83d425242d9428\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:36:52.248474 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1598060753.mount: Deactivated successfully. Oct 2 19:36:52.254861 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2768507085.mount: Deactivated successfully. Oct 2 19:36:52.277819 env[1342]: time="2023-10-02T19:36:52.277757614Z" level=info msg="CreateContainer within sandbox \"8fec4a9be9a41aa619cbd59ff02f699a716d294d88e507322e83d425242d9428\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f41cf169e8bdfc24af978110a35abf41dc7eef43fb344930df858ebb4ff59f50\"" Oct 2 19:36:52.278523 env[1342]: time="2023-10-02T19:36:52.278488204Z" level=info msg="StartContainer for \"f41cf169e8bdfc24af978110a35abf41dc7eef43fb344930df858ebb4ff59f50\"" Oct 2 19:36:52.299971 systemd[1]: Started cri-containerd-f41cf169e8bdfc24af978110a35abf41dc7eef43fb344930df858ebb4ff59f50.scope. Oct 2 19:36:52.327918 kernel: kauditd_printk_skb: 179 callbacks suppressed Oct 2 19:36:52.328020 kernel: audit: type=1400 audit(1696275412.320:1120): avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.320000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.320000 audit[3095]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3011 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:52.381555 kernel: audit: type=1300 audit(1696275412.320:1120): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3011 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:52.381690 kernel: audit: type=1327 audit(1696275412.320:1120): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634316366313639653862646663323461663937383131306133356162 Oct 2 19:36:52.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634316366313639653862646663323461663937383131306133356162 Oct 2 19:36:52.326000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.397172 kernel: audit: type=1400 audit(1696275412.326:1121): avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.397260 kernel: audit: type=1400 audit(1696275412.326:1121): avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.326000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.397336 env[1342]: time="2023-10-02T19:36:52.395952845Z" level=info msg="StartContainer for \"f41cf169e8bdfc24af978110a35abf41dc7eef43fb344930df858ebb4ff59f50\" returns successfully" Oct 2 19:36:52.326000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.410082 systemd[1]: cri-containerd-f41cf169e8bdfc24af978110a35abf41dc7eef43fb344930df858ebb4ff59f50.scope: Deactivated successfully. Oct 2 19:36:52.422544 kernel: audit: type=1400 audit(1696275412.326:1121): avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.422711 kernel: audit: type=1400 audit(1696275412.326:1121): avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.326000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.326000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.326000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.465385 kernel: audit: type=1400 audit(1696275412.326:1121): avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.465481 kernel: audit: type=1400 audit(1696275412.326:1121): avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.465524 kernel: audit: type=1400 audit(1696275412.326:1121): avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.326000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.326000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.326000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.326000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.326000 audit: BPF prog-id=130 op=LOAD Oct 2 19:36:52.326000 audit[3095]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000332120 items=0 ppid=3011 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:52.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634316366313639653862646663323461663937383131306133356162 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit: BPF prog-id=131 op=LOAD Oct 2 19:36:52.339000 audit[3095]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0003885f8 items=0 ppid=3011 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:52.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634316366313639653862646663323461663937383131306133356162 Oct 2 19:36:52.339000 audit: BPF prog-id=131 op=UNLOAD Oct 2 19:36:52.339000 audit: BPF prog-id=130 op=UNLOAD Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:52.339000 audit: BPF prog-id=132 op=LOAD Oct 2 19:36:52.339000 audit[3095]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000388688 items=0 ppid=3011 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:52.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634316366313639653862646663323461663937383131306133356162 Oct 2 19:36:52.437000 audit: BPF prog-id=132 op=UNLOAD Oct 2 19:36:53.207534 env[1342]: time="2023-10-02T19:36:53.207471022Z" level=info msg="shim disconnected" id=f41cf169e8bdfc24af978110a35abf41dc7eef43fb344930df858ebb4ff59f50 Oct 2 19:36:53.207534 env[1342]: time="2023-10-02T19:36:53.207534921Z" level=warning msg="cleaning up after shim disconnected" id=f41cf169e8bdfc24af978110a35abf41dc7eef43fb344930df858ebb4ff59f50 namespace=k8s.io Oct 2 19:36:53.208261 env[1342]: time="2023-10-02T19:36:53.207548421Z" level=info msg="cleaning up dead shim" Oct 2 19:36:53.221405 env[1342]: time="2023-10-02T19:36:53.221359241Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:36:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3135 runtime=io.containerd.runc.v2\n" Oct 2 19:36:53.245829 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f41cf169e8bdfc24af978110a35abf41dc7eef43fb344930df858ebb4ff59f50-rootfs.mount: Deactivated successfully. Oct 2 19:36:54.755178 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2443137441.mount: Deactivated successfully. Oct 2 19:36:56.232504 kubelet[2463]: E1002 19:36:56.232463 2463 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:36:57.097565 env[1342]: time="2023-10-02T19:36:57.097511400Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:57.108285 env[1342]: time="2023-10-02T19:36:57.108237269Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:57.114176 env[1342]: time="2023-10-02T19:36:57.114061498Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:57.118521 env[1342]: time="2023-10-02T19:36:57.118487644Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:36:57.119216 env[1342]: time="2023-10-02T19:36:57.119184336Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\"" Oct 2 19:36:57.121113 env[1342]: time="2023-10-02T19:36:57.120540819Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:36:57.121318 env[1342]: time="2023-10-02T19:36:57.121287510Z" level=info msg="CreateContainer within sandbox \"cecc988da725cdb686b227c90c21da9a7f0cf181bdf84f31cadf01faa42e8322\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 19:36:57.171912 env[1342]: time="2023-10-02T19:36:57.171158502Z" level=info msg="CreateContainer within sandbox \"cecc988da725cdb686b227c90c21da9a7f0cf181bdf84f31cadf01faa42e8322\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"1cb875b4a6c798d2f9a3e37b3c5459fbc0f7ada023365105e703d3f3780ca655\"" Oct 2 19:36:57.172379 env[1342]: time="2023-10-02T19:36:57.172347288Z" level=info msg="StartContainer for \"1cb875b4a6c798d2f9a3e37b3c5459fbc0f7ada023365105e703d3f3780ca655\"" Oct 2 19:36:57.202532 systemd[1]: Started cri-containerd-1cb875b4a6c798d2f9a3e37b3c5459fbc0f7ada023365105e703d3f3780ca655.scope. Oct 2 19:36:57.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.213000 audit: BPF prog-id=133 op=LOAD Oct 2 19:36:57.213000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.213000 audit[3163]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3054 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:57.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163623837356234613663373938643266396133653337623363353435 Oct 2 19:36:57.213000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.213000 audit[3163]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3054 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:57.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163623837356234613663373938643266396133653337623363353435 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit: BPF prog-id=134 op=LOAD Oct 2 19:36:57.214000 audit[3163]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039a7e0 items=0 ppid=3054 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:57.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163623837356234613663373938643266396133653337623363353435 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit: BPF prog-id=135 op=LOAD Oct 2 19:36:57.214000 audit[3163]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039a828 items=0 ppid=3054 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:57.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163623837356234613663373938643266396133653337623363353435 Oct 2 19:36:57.214000 audit: BPF prog-id=135 op=UNLOAD Oct 2 19:36:57.214000 audit: BPF prog-id=134 op=UNLOAD Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { perfmon } for pid=3163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit[3163]: AVC avc: denied { bpf } for pid=3163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:36:57.214000 audit: BPF prog-id=136 op=LOAD Oct 2 19:36:57.214000 audit[3163]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039ac38 items=0 ppid=3054 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:57.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163623837356234613663373938643266396133653337623363353435 Oct 2 19:36:57.235755 env[1342]: time="2023-10-02T19:36:57.235693216Z" level=info msg="StartContainer for \"1cb875b4a6c798d2f9a3e37b3c5459fbc0f7ada023365105e703d3f3780ca655\" returns successfully" Oct 2 19:36:58.299000 audit[3220]: NETFILTER_CFG table=filter:112 family=2 entries=13 op=nft_register_rule pid=3220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:36:58.305084 kernel: kauditd_printk_skb: 91 callbacks suppressed Oct 2 19:36:58.305210 kernel: audit: type=1325 audit(1696275418.299:1145): table=filter:112 family=2 entries=13 op=nft_register_rule pid=3220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:36:58.334942 kernel: audit: type=1300 audit(1696275418.299:1145): arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fff7c20a190 a2=0 a3=7fff7c20a17c items=0 ppid=2663 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:58.299000 audit[3220]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fff7c20a190 a2=0 a3=7fff7c20a17c items=0 ppid=2663 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:58.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:36:58.300000 audit[3220]: NETFILTER_CFG table=nat:113 family=2 entries=27 op=nft_register_chain pid=3220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:36:58.358757 kernel: audit: type=1327 audit(1696275418.299:1145): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:36:58.358836 kernel: audit: type=1325 audit(1696275418.300:1146): table=nat:113 family=2 entries=27 op=nft_register_chain pid=3220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:36:58.358865 kernel: audit: type=1300 audit(1696275418.300:1146): arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fff7c20a190 a2=0 a3=7fff7c20a17c items=0 ppid=2663 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:58.300000 audit[3220]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fff7c20a190 a2=0 a3=7fff7c20a17c items=0 ppid=2663 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:36:58.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:36:58.389194 kernel: audit: type=1327 audit(1696275418.300:1146): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:36:59.180745 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount868460380.mount: Deactivated successfully. Oct 2 19:37:01.233386 kubelet[2463]: E1002 19:37:01.233350 2463 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 19:37:03.856142 env[1342]: time="2023-10-02T19:37:03.856091451Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:37:03.864191 env[1342]: time="2023-10-02T19:37:03.864100862Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:37:03.868367 env[1342]: time="2023-10-02T19:37:03.868335715Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:37:03.872753 env[1342]: time="2023-10-02T19:37:03.872719167Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:37:03.873369 env[1342]: time="2023-10-02T19:37:03.873340160Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:37:03.876098 env[1342]: time="2023-10-02T19:37:03.876065930Z" level=info msg="CreateContainer within sandbox \"8fec4a9be9a41aa619cbd59ff02f699a716d294d88e507322e83d425242d9428\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:37:03.904153 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1934398349.mount: Deactivated successfully. Oct 2 19:37:03.923757 env[1342]: time="2023-10-02T19:37:03.923719602Z" level=info msg="CreateContainer within sandbox \"8fec4a9be9a41aa619cbd59ff02f699a716d294d88e507322e83d425242d9428\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"bc71fdedd546ddd8886040991b4987c3606ceaf1778176f4fe1c59c024b0468a\"" Oct 2 19:37:03.924454 env[1342]: time="2023-10-02T19:37:03.924432194Z" level=info msg="StartContainer for \"bc71fdedd546ddd8886040991b4987c3606ceaf1778176f4fe1c59c024b0468a\"" Oct 2 19:37:03.950710 systemd[1]: Started cri-containerd-bc71fdedd546ddd8886040991b4987c3606ceaf1778176f4fe1c59c024b0468a.scope. Oct 2 19:37:03.965000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.965000 audit[3229]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3011 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:03.999820 kernel: audit: type=1400 audit(1696275423.965:1147): avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.999905 kernel: audit: type=1300 audit(1696275423.965:1147): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3011 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:03.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373166646564643534366464643838383630343039393162343938 Oct 2 19:37:04.020017 kernel: audit: type=1327 audit(1696275423.965:1147): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373166646564643534366464643838383630343039393162343938 Oct 2 19:37:03.965000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:04.039903 kernel: audit: type=1400 audit(1696275423.965:1148): avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:04.039970 kernel: audit: type=1400 audit(1696275423.965:1148): avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.965000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.965000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:04.071004 kernel: audit: type=1400 audit(1696275423.965:1148): avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.965000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.965000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:04.099469 kernel: audit: type=1400 audit(1696275423.965:1148): avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:04.099552 kernel: audit: type=1400 audit(1696275423.965:1148): avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:04.100409 kernel: audit: type=1400 audit(1696275423.965:1148): avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.965000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:04.102096 env[1342]: time="2023-10-02T19:37:04.102057241Z" level=info msg="StartContainer for \"bc71fdedd546ddd8886040991b4987c3606ceaf1778176f4fe1c59c024b0468a\" returns successfully" Oct 2 19:37:03.965000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:04.137549 kernel: audit: type=1400 audit(1696275423.965:1148): avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.965000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.965000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.965000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.965000 audit: BPF prog-id=137 op=LOAD Oct 2 19:37:03.965000 audit[3229]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00038a090 items=0 ppid=3011 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:03.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373166646564643534366464643838383630343039393162343938 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit: BPF prog-id=138 op=LOAD Oct 2 19:37:03.979000 audit[3229]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00038a0d8 items=0 ppid=3011 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:03.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373166646564643534366464643838383630343039393162343938 Oct 2 19:37:03.979000 audit: BPF prog-id=138 op=UNLOAD Oct 2 19:37:03.979000 audit: BPF prog-id=137 op=UNLOAD Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { perfmon } for pid=3229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit[3229]: AVC avc: denied { bpf } for pid=3229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:03.979000 audit: BPF prog-id=139 op=LOAD Oct 2 19:37:03.979000 audit[3229]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00038a168 items=0 ppid=3011 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:03.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373166646564643534366464643838383630343039393162343938 Oct 2 19:37:05.701272 env[1342]: time="2023-10-02T19:37:05.701194589Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:37:05.704006 systemd[1]: cri-containerd-bc71fdedd546ddd8886040991b4987c3606ceaf1778176f4fe1c59c024b0468a.scope: Deactivated successfully. Oct 2 19:37:05.706000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:37:05.725479 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bc71fdedd546ddd8886040991b4987c3606ceaf1778176f4fe1c59c024b0468a-rootfs.mount: Deactivated successfully. Oct 2 19:37:07.206289 kubelet[2463]: I1002 19:37:07.206253 2463 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:37:07.213822 systemd[1]: Created slice kubepods-burstable-pode8797047_13b2_4cb1_9fe8_f7ffa806f655.slice. Oct 2 19:37:07.219702 kubelet[2463]: I1002 19:37:07.219674 2463 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:37:07.222183 kubelet[2463]: I1002 19:37:07.222162 2463 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:37:07.226140 systemd[1]: Created slice kubepods-burstable-podc47b71eb_2e5d_4cf6_97a5_bac15992fb6a.slice. Oct 2 19:37:07.233717 systemd[1]: Created slice kubepods-besteffort-pod3aa51857_ba96_47a6_83c9_b6d7571f0d6e.slice. Oct 2 19:37:07.243420 kubelet[2463]: I1002 19:37:07.243396 2463 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:37:07.249437 systemd[1]: Created slice kubepods-besteffort-poda5d62a24_4dd0_4595_85ba_03387a0bd553.slice. Oct 2 19:37:07.269169 kubelet[2463]: I1002 19:37:07.269141 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xlc4s\" (UniqueName: \"kubernetes.io/projected/a5d62a24-4dd0-4595-85ba-03387a0bd553-kube-api-access-xlc4s\") pod \"csi-node-driver-rsg2v\" (UID: \"a5d62a24-4dd0-4595-85ba-03387a0bd553\") " pod="calico-system/csi-node-driver-rsg2v" Oct 2 19:37:07.269296 kubelet[2463]: I1002 19:37:07.269206 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l46gw\" (UniqueName: \"kubernetes.io/projected/e8797047-13b2-4cb1-9fe8-f7ffa806f655-kube-api-access-l46gw\") pod \"coredns-565d847f94-d946n\" (UID: \"e8797047-13b2-4cb1-9fe8-f7ffa806f655\") " pod="kube-system/coredns-565d847f94-d946n" Oct 2 19:37:07.269296 kubelet[2463]: I1002 19:37:07.269243 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4wx49\" (UniqueName: \"kubernetes.io/projected/3aa51857-ba96-47a6-83c9-b6d7571f0d6e-kube-api-access-4wx49\") pod \"calico-kube-controllers-69d9c784fb-qm27v\" (UID: \"3aa51857-ba96-47a6-83c9-b6d7571f0d6e\") " pod="calico-system/calico-kube-controllers-69d9c784fb-qm27v" Oct 2 19:37:07.269296 kubelet[2463]: I1002 19:37:07.269285 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/a5d62a24-4dd0-4595-85ba-03387a0bd553-etccalico\") pod \"csi-node-driver-rsg2v\" (UID: \"a5d62a24-4dd0-4595-85ba-03387a0bd553\") " pod="calico-system/csi-node-driver-rsg2v" Oct 2 19:37:07.269437 kubelet[2463]: I1002 19:37:07.269318 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a5d62a24-4dd0-4595-85ba-03387a0bd553-socket-dir\") pod \"csi-node-driver-rsg2v\" (UID: \"a5d62a24-4dd0-4595-85ba-03387a0bd553\") " pod="calico-system/csi-node-driver-rsg2v" Oct 2 19:37:07.269437 kubelet[2463]: I1002 19:37:07.269366 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6xrr8\" (UniqueName: \"kubernetes.io/projected/c47b71eb-2e5d-4cf6-97a5-bac15992fb6a-kube-api-access-6xrr8\") pod \"coredns-565d847f94-6m6vk\" (UID: \"c47b71eb-2e5d-4cf6-97a5-bac15992fb6a\") " pod="kube-system/coredns-565d847f94-6m6vk" Oct 2 19:37:07.269437 kubelet[2463]: I1002 19:37:07.269398 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a5d62a24-4dd0-4595-85ba-03387a0bd553-varrun\") pod \"csi-node-driver-rsg2v\" (UID: \"a5d62a24-4dd0-4595-85ba-03387a0bd553\") " pod="calico-system/csi-node-driver-rsg2v" Oct 2 19:37:07.269594 kubelet[2463]: I1002 19:37:07.269441 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c47b71eb-2e5d-4cf6-97a5-bac15992fb6a-config-volume\") pod \"coredns-565d847f94-6m6vk\" (UID: \"c47b71eb-2e5d-4cf6-97a5-bac15992fb6a\") " pod="kube-system/coredns-565d847f94-6m6vk" Oct 2 19:37:07.269594 kubelet[2463]: I1002 19:37:07.269477 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a5d62a24-4dd0-4595-85ba-03387a0bd553-registration-dir\") pod \"csi-node-driver-rsg2v\" (UID: \"a5d62a24-4dd0-4595-85ba-03387a0bd553\") " pod="calico-system/csi-node-driver-rsg2v" Oct 2 19:37:07.269594 kubelet[2463]: I1002 19:37:07.269522 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e8797047-13b2-4cb1-9fe8-f7ffa806f655-config-volume\") pod \"coredns-565d847f94-d946n\" (UID: \"e8797047-13b2-4cb1-9fe8-f7ffa806f655\") " pod="kube-system/coredns-565d847f94-d946n" Oct 2 19:37:07.269594 kubelet[2463]: I1002 19:37:07.269557 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a5d62a24-4dd0-4595-85ba-03387a0bd553-kubelet-dir\") pod \"csi-node-driver-rsg2v\" (UID: \"a5d62a24-4dd0-4595-85ba-03387a0bd553\") " pod="calico-system/csi-node-driver-rsg2v" Oct 2 19:37:07.518380 env[1342]: time="2023-10-02T19:37:07.518266444Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-d946n,Uid:e8797047-13b2-4cb1-9fe8-f7ffa806f655,Namespace:kube-system,Attempt:0,}" Oct 2 19:37:07.553200 env[1342]: time="2023-10-02T19:37:07.553147379Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rsg2v,Uid:a5d62a24-4dd0-4595-85ba-03387a0bd553,Namespace:calico-system,Attempt:0,}" Oct 2 19:37:07.830903 env[1342]: time="2023-10-02T19:37:07.830749876Z" level=info msg="shim disconnected" id=bc71fdedd546ddd8886040991b4987c3606ceaf1778176f4fe1c59c024b0468a Oct 2 19:37:07.830903 env[1342]: time="2023-10-02T19:37:07.830803975Z" level=warning msg="cleaning up after shim disconnected" id=bc71fdedd546ddd8886040991b4987c3606ceaf1778176f4fe1c59c024b0468a namespace=k8s.io Oct 2 19:37:07.830903 env[1342]: time="2023-10-02T19:37:07.830816575Z" level=info msg="cleaning up dead shim" Oct 2 19:37:07.831893 env[1342]: time="2023-10-02T19:37:07.831837864Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-6m6vk,Uid:c47b71eb-2e5d-4cf6-97a5-bac15992fb6a,Namespace:kube-system,Attempt:0,}" Oct 2 19:37:07.839812 env[1342]: time="2023-10-02T19:37:07.839771781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69d9c784fb-qm27v,Uid:3aa51857-ba96-47a6-83c9-b6d7571f0d6e,Namespace:calico-system,Attempt:0,}" Oct 2 19:37:07.840836 env[1342]: time="2023-10-02T19:37:07.840803170Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:37:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3281 runtime=io.containerd.runc.v2\n" Oct 2 19:37:07.944260 env[1342]: time="2023-10-02T19:37:07.944185689Z" level=error msg="Failed to destroy network for sandbox \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:07.944590 env[1342]: time="2023-10-02T19:37:07.944547085Z" level=error msg="encountered an error cleaning up failed sandbox \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:07.944688 env[1342]: time="2023-10-02T19:37:07.944615385Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rsg2v,Uid:a5d62a24-4dd0-4595-85ba-03387a0bd553,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:07.946370 kubelet[2463]: E1002 19:37:07.944902 2463 remote_runtime.go:222] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:07.946370 kubelet[2463]: E1002 19:37:07.944986 2463 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rsg2v" Oct 2 19:37:07.946370 kubelet[2463]: E1002 19:37:07.945025 2463 kuberuntime_manager.go:772] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rsg2v" Oct 2 19:37:07.946589 kubelet[2463]: E1002 19:37:07.945104 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-rsg2v_calico-system(a5d62a24-4dd0-4595-85ba-03387a0bd553)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-rsg2v_calico-system(a5d62a24-4dd0-4595-85ba-03387a0bd553)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:37:08.030901 env[1342]: time="2023-10-02T19:37:08.030826287Z" level=error msg="Failed to destroy network for sandbox \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.031706 env[1342]: time="2023-10-02T19:37:08.031647379Z" level=error msg="encountered an error cleaning up failed sandbox \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.032037 env[1342]: time="2023-10-02T19:37:08.031996075Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-d946n,Uid:e8797047-13b2-4cb1-9fe8-f7ffa806f655,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.032437 kubelet[2463]: E1002 19:37:08.032406 2463 remote_runtime.go:222] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.032561 kubelet[2463]: E1002 19:37:08.032473 2463 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-565d847f94-d946n" Oct 2 19:37:08.032561 kubelet[2463]: E1002 19:37:08.032501 2463 kuberuntime_manager.go:772] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-565d847f94-d946n" Oct 2 19:37:08.032659 kubelet[2463]: E1002 19:37:08.032560 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-565d847f94-d946n_kube-system(e8797047-13b2-4cb1-9fe8-f7ffa806f655)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-565d847f94-d946n_kube-system(e8797047-13b2-4cb1-9fe8-f7ffa806f655)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-565d847f94-d946n" podUID=e8797047-13b2-4cb1-9fe8-f7ffa806f655 Oct 2 19:37:08.067499 env[1342]: time="2023-10-02T19:37:08.067430210Z" level=error msg="Failed to destroy network for sandbox \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.067884 env[1342]: time="2023-10-02T19:37:08.067830306Z" level=error msg="encountered an error cleaning up failed sandbox \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.067987 env[1342]: time="2023-10-02T19:37:08.067924205Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69d9c784fb-qm27v,Uid:3aa51857-ba96-47a6-83c9-b6d7571f0d6e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.068304 kubelet[2463]: E1002 19:37:08.068156 2463 remote_runtime.go:222] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.068304 kubelet[2463]: E1002 19:37:08.068220 2463 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69d9c784fb-qm27v" Oct 2 19:37:08.068304 kubelet[2463]: E1002 19:37:08.068259 2463 kuberuntime_manager.go:772] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69d9c784fb-qm27v" Oct 2 19:37:08.068483 kubelet[2463]: E1002 19:37:08.068321 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-69d9c784fb-qm27v_calico-system(3aa51857-ba96-47a6-83c9-b6d7571f0d6e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-69d9c784fb-qm27v_calico-system(3aa51857-ba96-47a6-83c9-b6d7571f0d6e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69d9c784fb-qm27v" podUID=3aa51857-ba96-47a6-83c9-b6d7571f0d6e Oct 2 19:37:08.070269 kubelet[2463]: E1002 19:37:08.069747 2463 remote_runtime.go:222] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.070269 kubelet[2463]: E1002 19:37:08.069813 2463 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-565d847f94-6m6vk" Oct 2 19:37:08.070269 kubelet[2463]: E1002 19:37:08.069855 2463 kuberuntime_manager.go:772] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-565d847f94-6m6vk" Oct 2 19:37:08.070389 env[1342]: time="2023-10-02T19:37:08.069081693Z" level=error msg="Failed to destroy network for sandbox \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.070389 env[1342]: time="2023-10-02T19:37:08.069461889Z" level=error msg="encountered an error cleaning up failed sandbox \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.070389 env[1342]: time="2023-10-02T19:37:08.069543688Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-6m6vk,Uid:c47b71eb-2e5d-4cf6-97a5-bac15992fb6a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.070475 kubelet[2463]: E1002 19:37:08.069938 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-565d847f94-6m6vk_kube-system(c47b71eb-2e5d-4cf6-97a5-bac15992fb6a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-565d847f94-6m6vk_kube-system(c47b71eb-2e5d-4cf6-97a5-bac15992fb6a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-565d847f94-6m6vk" podUID=c47b71eb-2e5d-4cf6-97a5-bac15992fb6a Oct 2 19:37:08.246699 kubelet[2463]: I1002 19:37:08.246071 2463 pod_container_deletor.go:79] "Container not found in pod's containers" containerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Oct 2 19:37:08.249286 env[1342]: time="2023-10-02T19:37:08.247282654Z" level=info msg="StopPodSandbox for \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\"" Oct 2 19:37:08.250703 kubelet[2463]: I1002 19:37:08.250675 2463 pod_container_deletor.go:79] "Container not found in pod's containers" containerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Oct 2 19:37:08.252168 env[1342]: time="2023-10-02T19:37:08.252128304Z" level=info msg="StopPodSandbox for \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\"" Oct 2 19:37:08.254276 kubelet[2463]: I1002 19:37:08.254256 2463 pod_container_deletor.go:79] "Container not found in pod's containers" containerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Oct 2 19:37:08.255289 env[1342]: time="2023-10-02T19:37:08.255258272Z" level=info msg="StopPodSandbox for \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\"" Oct 2 19:37:08.272141 env[1342]: time="2023-10-02T19:37:08.272106198Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:37:08.274337 kubelet[2463]: I1002 19:37:08.273171 2463 pod_container_deletor.go:79] "Container not found in pod's containers" containerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Oct 2 19:37:08.276442 env[1342]: time="2023-10-02T19:37:08.276412754Z" level=info msg="StopPodSandbox for \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\"" Oct 2 19:37:08.317755 env[1342]: time="2023-10-02T19:37:08.317676628Z" level=error msg="StopPodSandbox for \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\" failed" error="failed to destroy network for sandbox \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.318116 kubelet[2463]: E1002 19:37:08.318080 2463 remote_runtime.go:269] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Oct 2 19:37:08.318241 kubelet[2463]: E1002 19:37:08.318156 2463 kuberuntime_manager.go:954] "Failed to stop sandbox" podSandboxID={Type:containerd ID:2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64} Oct 2 19:37:08.318241 kubelet[2463]: E1002 19:37:08.318214 2463 kuberuntime_manager.go:695] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c47b71eb-2e5d-4cf6-97a5-bac15992fb6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:37:08.318384 kubelet[2463]: E1002 19:37:08.318273 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c47b71eb-2e5d-4cf6-97a5-bac15992fb6a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-565d847f94-6m6vk" podUID=c47b71eb-2e5d-4cf6-97a5-bac15992fb6a Oct 2 19:37:08.350699 env[1342]: time="2023-10-02T19:37:08.350643788Z" level=error msg="StopPodSandbox for \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\" failed" error="failed to destroy network for sandbox \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.351352 kubelet[2463]: E1002 19:37:08.351110 2463 remote_runtime.go:269] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Oct 2 19:37:08.351352 kubelet[2463]: E1002 19:37:08.351159 2463 kuberuntime_manager.go:954] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7} Oct 2 19:37:08.351352 kubelet[2463]: E1002 19:37:08.351232 2463 kuberuntime_manager.go:695] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e8797047-13b2-4cb1-9fe8-f7ffa806f655\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:37:08.351352 kubelet[2463]: E1002 19:37:08.351287 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e8797047-13b2-4cb1-9fe8-f7ffa806f655\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-565d847f94-d946n" podUID=e8797047-13b2-4cb1-9fe8-f7ffa806f655 Oct 2 19:37:08.356688 env[1342]: time="2023-10-02T19:37:08.356640326Z" level=error msg="StopPodSandbox for \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\" failed" error="failed to destroy network for sandbox \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.356900 kubelet[2463]: E1002 19:37:08.356863 2463 remote_runtime.go:269] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Oct 2 19:37:08.357004 kubelet[2463]: E1002 19:37:08.356916 2463 kuberuntime_manager.go:954] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e} Oct 2 19:37:08.357004 kubelet[2463]: E1002 19:37:08.356958 2463 kuberuntime_manager.go:695] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3aa51857-ba96-47a6-83c9-b6d7571f0d6e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:37:08.357004 kubelet[2463]: E1002 19:37:08.356993 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3aa51857-ba96-47a6-83c9-b6d7571f0d6e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69d9c784fb-qm27v" podUID=3aa51857-ba96-47a6-83c9-b6d7571f0d6e Oct 2 19:37:08.366726 env[1342]: time="2023-10-02T19:37:08.366685923Z" level=error msg="StopPodSandbox for \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\" failed" error="failed to destroy network for sandbox \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:37:08.366953 kubelet[2463]: E1002 19:37:08.366934 2463 remote_runtime.go:269] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Oct 2 19:37:08.367048 kubelet[2463]: E1002 19:37:08.366969 2463 kuberuntime_manager.go:954] "Failed to stop sandbox" podSandboxID={Type:containerd ID:ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1} Oct 2 19:37:08.367048 kubelet[2463]: E1002 19:37:08.367009 2463 kuberuntime_manager.go:695] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a5d62a24-4dd0-4595-85ba-03387a0bd553\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:37:08.367048 kubelet[2463]: E1002 19:37:08.367044 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a5d62a24-4dd0-4595-85ba-03387a0bd553\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:37:08.383329 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1-shm.mount: Deactivated successfully. Oct 2 19:37:15.118448 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2004899489.mount: Deactivated successfully. Oct 2 19:37:15.218977 env[1342]: time="2023-10-02T19:37:15.218930315Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:37:15.227313 env[1342]: time="2023-10-02T19:37:15.227276536Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:37:15.231220 env[1342]: time="2023-10-02T19:37:15.231189599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:37:15.235562 env[1342]: time="2023-10-02T19:37:15.235531658Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:37:15.235990 env[1342]: time="2023-10-02T19:37:15.235956854Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:37:15.238757 env[1342]: time="2023-10-02T19:37:15.238445331Z" level=info msg="CreateContainer within sandbox \"8fec4a9be9a41aa619cbd59ff02f699a716d294d88e507322e83d425242d9428\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:37:15.297978 env[1342]: time="2023-10-02T19:37:15.297929470Z" level=info msg="CreateContainer within sandbox \"8fec4a9be9a41aa619cbd59ff02f699a716d294d88e507322e83d425242d9428\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"df8120feab5aecc942b7d4c641a3faf7fdbecb9effdf7a5b94f513f1d4dd06cb\"" Oct 2 19:37:15.298421 env[1342]: time="2023-10-02T19:37:15.298391266Z" level=info msg="StartContainer for \"df8120feab5aecc942b7d4c641a3faf7fdbecb9effdf7a5b94f513f1d4dd06cb\"" Oct 2 19:37:15.326211 systemd[1]: Started cri-containerd-df8120feab5aecc942b7d4c641a3faf7fdbecb9effdf7a5b94f513f1d4dd06cb.scope. Oct 2 19:37:15.351245 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:37:15.351355 kernel: audit: type=1400 audit(1696275435.341:1154): avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3011 pid=3517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:15.386724 kernel: audit: type=1300 audit(1696275435.341:1154): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3011 pid=3517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:15.386836 kernel: audit: type=1327 audit(1696275435.341:1154): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383132306665616235616563633934326237643463363431613366 Oct 2 19:37:15.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383132306665616235616563633934326237643463363431613366 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.420948 kernel: audit: type=1400 audit(1696275435.341:1155): avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.421034 kernel: audit: type=1400 audit(1696275435.341:1155): avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.421287 env[1342]: time="2023-10-02T19:37:15.421247608Z" level=info msg="StartContainer for \"df8120feab5aecc942b7d4c641a3faf7fdbecb9effdf7a5b94f513f1d4dd06cb\" returns successfully" Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.443451 kernel: audit: type=1400 audit(1696275435.341:1155): avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.456422 kernel: audit: type=1400 audit(1696275435.341:1155): avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.456494 kernel: audit: type=1400 audit(1696275435.341:1155): avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.482022 kernel: audit: type=1400 audit(1696275435.341:1155): avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.482103 kernel: audit: type=1400 audit(1696275435.341:1155): avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit: BPF prog-id=140 op=LOAD Oct 2 19:37:15.341000 audit[3517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000298b10 items=0 ppid=3011 pid=3517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:15.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383132306665616235616563633934326237643463363431613366 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit[3517]: AVC avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.341000 audit: BPF prog-id=141 op=LOAD Oct 2 19:37:15.341000 audit[3517]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000298b58 items=0 ppid=3011 pid=3517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:15.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383132306665616235616563633934326237643463363431613366 Oct 2 19:37:15.342000 audit: BPF prog-id=141 op=UNLOAD Oct 2 19:37:15.342000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:37:15.342000 audit[3517]: AVC avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.342000 audit[3517]: AVC avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.342000 audit[3517]: AVC avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.342000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.342000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.342000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.342000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.342000 audit[3517]: AVC avc: denied { perfmon } for pid=3517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.342000 audit[3517]: AVC avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.342000 audit[3517]: AVC avc: denied { bpf } for pid=3517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:15.342000 audit: BPF prog-id=142 op=LOAD Oct 2 19:37:15.342000 audit[3517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000298be8 items=0 ppid=3011 pid=3517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:15.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383132306665616235616563633934326237643463363431613366 Oct 2 19:37:15.831646 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:37:15.831799 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:37:16.119130 systemd[1]: run-containerd-runc-k8s.io-df8120feab5aecc942b7d4c641a3faf7fdbecb9effdf7a5b94f513f1d4dd06cb-runc.cWhFsP.mount: Deactivated successfully. Oct 2 19:37:16.317045 systemd[1]: run-containerd-runc-k8s.io-df8120feab5aecc942b7d4c641a3faf7fdbecb9effdf7a5b94f513f1d4dd06cb-runc.2inVdF.mount: Deactivated successfully. Oct 2 19:37:17.154000 audit[3641]: AVC avc: denied { write } for pid=3641 comm="tee" name="fd" dev="proc" ino=27230 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:37:17.155000 audit[3654]: AVC avc: denied { write } for pid=3654 comm="tee" name="fd" dev="proc" ino=27233 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:37:17.154000 audit[3641]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc35a6975 a2=241 a3=1b6 items=1 ppid=3613 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.154000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:37:17.154000 audit: PATH item=0 name="/dev/fd/63" inode=27914 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:37:17.154000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:37:17.156000 audit[3649]: AVC avc: denied { write } for pid=3649 comm="tee" name="fd" dev="proc" ino=27237 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:37:17.155000 audit[3654]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcccbef975 a2=241 a3=1b6 items=1 ppid=3610 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.155000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:37:17.155000 audit: PATH item=0 name="/dev/fd/63" inode=27922 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:37:17.155000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:37:17.156000 audit[3649]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe21d44966 a2=241 a3=1b6 items=1 ppid=3606 pid=3649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.156000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:37:17.156000 audit: PATH item=0 name="/dev/fd/63" inode=27919 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:37:17.156000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:37:17.183000 audit[3658]: AVC avc: denied { write } for pid=3658 comm="tee" name="fd" dev="proc" ino=27940 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:37:17.183000 audit[3658]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcad1ab975 a2=241 a3=1b6 items=1 ppid=3611 pid=3658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.183000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:37:17.183000 audit: PATH item=0 name="/dev/fd/63" inode=27215 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:37:17.183000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:37:17.193000 audit[3676]: AVC avc: denied { write } for pid=3676 comm="tee" name="fd" dev="proc" ino=27944 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:37:17.193000 audit[3676]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe2165b976 a2=241 a3=1b6 items=1 ppid=3618 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.193000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:37:17.193000 audit: PATH item=0 name="/dev/fd/63" inode=27240 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:37:17.193000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:37:17.199000 audit[3679]: AVC avc: denied { write } for pid=3679 comm="tee" name="fd" dev="proc" ino=27948 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:37:17.199000 audit[3679]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2189e965 a2=241 a3=1b6 items=1 ppid=3623 pid=3679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.199000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:37:17.199000 audit: PATH item=0 name="/dev/fd/63" inode=27934 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:37:17.199000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:37:17.206000 audit[3681]: AVC avc: denied { write } for pid=3681 comm="tee" name="fd" dev="proc" ino=27246 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:37:17.206000 audit[3681]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb2012977 a2=241 a3=1b6 items=1 ppid=3616 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.206000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:37:17.206000 audit: PATH item=0 name="/dev/fd/63" inode=27937 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:37:17.206000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:37:17.338814 systemd[1]: run-containerd-runc-k8s.io-df8120feab5aecc942b7d4c641a3faf7fdbecb9effdf7a5b94f513f1d4dd06cb-runc.By1tML.mount: Deactivated successfully. Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit: BPF prog-id=143 op=LOAD Oct 2 19:37:17.655000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffedda60af0 a2=70 a3=7fd4bdd71000 items=0 ppid=3612 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:37:17.655000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit: BPF prog-id=144 op=LOAD Oct 2 19:37:17.655000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffedda60af0 a2=70 a3=6e items=0 ppid=3612 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:37:17.655000 audit: BPF prog-id=144 op=UNLOAD Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffedda60aa0 a2=70 a3=7ffedda60af0 items=0 ppid=3612 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit: BPF prog-id=145 op=LOAD Oct 2 19:37:17.655000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffedda60a80 a2=70 a3=7ffedda60af0 items=0 ppid=3612 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:37:17.655000 audit: BPF prog-id=145 op=UNLOAD Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffedda60b60 a2=70 a3=0 items=0 ppid=3612 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffedda60b50 a2=70 a3=0 items=0 ppid=3612 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:37:17.655000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.655000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffedda60b90 a2=70 a3=0 items=0 ppid=3612 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.655000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:37:17.656000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.656000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.656000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.656000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.656000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.656000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.656000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.656000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.656000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.656000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.656000 audit: BPF prog-id=146 op=LOAD Oct 2 19:37:17.656000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffedda60ab0 a2=70 a3=ffffffff items=0 ppid=3612 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:37:17.667000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.667000 audit[3774]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc99ba5100 a2=70 a3=fff80800 items=0 ppid=3612 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.667000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:37:17.667000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:17.667000 audit[3774]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc99ba4fd0 a2=70 a3=3 items=0 ppid=3612 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.667000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:37:17.672000 audit: BPF prog-id=146 op=UNLOAD Oct 2 19:37:17.765000 audit[3795]: NETFILTER_CFG table=mangle:114 family=2 entries=19 op=nft_register_chain pid=3795 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:37:17.765000 audit[3795]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fffd3032eb0 a2=0 a3=7fffd3032e9c items=0 ppid=3612 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.765000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:37:17.767000 audit[3794]: NETFILTER_CFG table=raw:115 family=2 entries=19 op=nft_register_chain pid=3794 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:37:17.767000 audit[3794]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffca7b61cc0 a2=0 a3=56375c7a3000 items=0 ppid=3612 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.767000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:37:17.771000 audit[3798]: NETFILTER_CFG table=nat:116 family=2 entries=16 op=nft_register_chain pid=3798 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:37:17.771000 audit[3798]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffc18463be0 a2=0 a3=560ccd7df000 items=0 ppid=3612 pid=3798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.771000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:37:17.795000 audit[3796]: NETFILTER_CFG table=filter:117 family=2 entries=39 op=nft_register_chain pid=3796 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:37:17.795000 audit[3796]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffdc3a72ac0 a2=0 a3=55dfcf0e3000 items=0 ppid=3612 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:17.795000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:37:18.593434 systemd-networkd[1472]: vxlan.calico: Link UP Oct 2 19:37:18.593445 systemd-networkd[1472]: vxlan.calico: Gained carrier Oct 2 19:37:19.137094 env[1342]: time="2023-10-02T19:37:19.137045699Z" level=info msg="StopPodSandbox for \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\"" Oct 2 19:37:19.214732 env[1342]: 2023-10-02 19:37:19.185 [INFO][3854] k8s.go 576: Cleaning up netns ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Oct 2 19:37:19.214732 env[1342]: 2023-10-02 19:37:19.185 [INFO][3854] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" iface="eth0" netns="/var/run/netns/cni-852da231-8ff9-3422-8a71-53e035b395fe" Oct 2 19:37:19.214732 env[1342]: 2023-10-02 19:37:19.185 [INFO][3854] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" iface="eth0" netns="/var/run/netns/cni-852da231-8ff9-3422-8a71-53e035b395fe" Oct 2 19:37:19.214732 env[1342]: 2023-10-02 19:37:19.185 [INFO][3854] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" iface="eth0" netns="/var/run/netns/cni-852da231-8ff9-3422-8a71-53e035b395fe" Oct 2 19:37:19.214732 env[1342]: 2023-10-02 19:37:19.185 [INFO][3854] k8s.go 583: Releasing IP address(es) ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Oct 2 19:37:19.214732 env[1342]: 2023-10-02 19:37:19.185 [INFO][3854] utils.go 196: Calico CNI releasing IP address ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Oct 2 19:37:19.214732 env[1342]: 2023-10-02 19:37:19.205 [INFO][3860] ipam_plugin.go 416: Releasing address using handleID ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" HandleID="k8s-pod-network.a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:19.214732 env[1342]: time="2023-10-02T19:37:19Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:19.214732 env[1342]: time="2023-10-02T19:37:19Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:19.214732 env[1342]: 2023-10-02 19:37:19.211 [WARNING][3860] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" HandleID="k8s-pod-network.a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:19.214732 env[1342]: 2023-10-02 19:37:19.211 [INFO][3860] ipam_plugin.go 444: Releasing address using workloadID ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" HandleID="k8s-pod-network.a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:19.214732 env[1342]: time="2023-10-02T19:37:19Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:19.214732 env[1342]: 2023-10-02 19:37:19.213 [INFO][3854] k8s.go 589: Teardown processing complete. ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Oct 2 19:37:19.217096 systemd[1]: run-netns-cni\x2d852da231\x2d8ff9\x2d3422\x2d8a71\x2d53e035b395fe.mount: Deactivated successfully. Oct 2 19:37:19.218239 env[1342]: time="2023-10-02T19:37:19.218087870Z" level=info msg="TearDown network for sandbox \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\" successfully" Oct 2 19:37:19.218239 env[1342]: time="2023-10-02T19:37:19.218132969Z" level=info msg="StopPodSandbox for \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\" returns successfully" Oct 2 19:37:19.219027 env[1342]: time="2023-10-02T19:37:19.218997862Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-d946n,Uid:e8797047-13b2-4cb1-9fe8-f7ffa806f655,Namespace:kube-system,Attempt:1,}" Oct 2 19:37:19.384426 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:37:19.384575 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4e49bebdc8b: link becomes ready Oct 2 19:37:19.391177 systemd-networkd[1472]: cali4e49bebdc8b: Link UP Oct 2 19:37:19.391190 systemd-networkd[1472]: cali4e49bebdc8b: Gained carrier Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.314 [INFO][3866] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0 coredns-565d847f94- kube-system e8797047-13b2-4cb1-9fe8-f7ffa806f655 691 0 2023-10-02 19:36:40 +0000 UTC map[k8s-app:kube-dns pod-template-hash:565d847f94 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-58c23d0da1 coredns-565d847f94-d946n eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4e49bebdc8b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" Namespace="kube-system" Pod="coredns-565d847f94-d946n" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-" Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.315 [INFO][3866] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" Namespace="kube-system" Pod="coredns-565d847f94-d946n" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.340 [INFO][3878] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" HandleID="k8s-pod-network.6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.349 [INFO][3878] ipam_plugin.go 269: Auto assigning IP ContainerID="6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" HandleID="k8s-pod-network.6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00050d5d0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-58c23d0da1", "pod":"coredns-565d847f94-d946n", "timestamp":"2023-10-02 19:37:19.34036157 +0000 UTC"}, Hostname:"ci-3510.3.0-a-58c23d0da1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:37:19.409121 env[1342]: time="2023-10-02T19:37:19Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:19.409121 env[1342]: time="2023-10-02T19:37:19Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.350 [INFO][3878] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-58c23d0da1' Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.352 [INFO][3878] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.355 [INFO][3878] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.358 [INFO][3878] ipam.go 489: Trying affinity for 192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.359 [INFO][3878] ipam.go 155: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.361 [INFO][3878] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.361 [INFO][3878] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.362 [INFO][3878] ipam.go 1682: Creating new handle: k8s-pod-network.6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.365 [INFO][3878] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.371 [INFO][3878] ipam.go 1216: Successfully claimed IPs: [192.168.34.193/26] block=192.168.34.192/26 handle="k8s-pod-network.6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.371 [INFO][3878] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.193/26] handle="k8s-pod-network.6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:19.409121 env[1342]: time="2023-10-02T19:37:19Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:19.409121 env[1342]: 2023-10-02 19:37:19.371 [INFO][3878] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.34.193/26] IPv6=[] ContainerID="6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" HandleID="k8s-pod-network.6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:19.410073 env[1342]: 2023-10-02 19:37:19.373 [INFO][3866] k8s.go 383: Populated endpoint ContainerID="6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" Namespace="kube-system" Pod="coredns-565d847f94-d946n" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"e8797047-13b2-4cb1-9fe8-f7ffa806f655", ResourceVersion:"691", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 36, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"", Pod:"coredns-565d847f94-d946n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4e49bebdc8b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:19.410073 env[1342]: 2023-10-02 19:37:19.373 [INFO][3866] k8s.go 384: Calico CNI using IPs: [192.168.34.193/32] ContainerID="6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" Namespace="kube-system" Pod="coredns-565d847f94-d946n" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:19.410073 env[1342]: 2023-10-02 19:37:19.373 [INFO][3866] dataplane_linux.go 68: Setting the host side veth name to cali4e49bebdc8b ContainerID="6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" Namespace="kube-system" Pod="coredns-565d847f94-d946n" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:19.410073 env[1342]: 2023-10-02 19:37:19.384 [INFO][3866] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" Namespace="kube-system" Pod="coredns-565d847f94-d946n" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:19.410073 env[1342]: 2023-10-02 19:37:19.392 [INFO][3866] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" Namespace="kube-system" Pod="coredns-565d847f94-d946n" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"e8797047-13b2-4cb1-9fe8-f7ffa806f655", ResourceVersion:"691", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 36, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a", Pod:"coredns-565d847f94-d946n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4e49bebdc8b", MAC:"06:55:ee:93:26:54", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:19.410073 env[1342]: 2023-10-02 19:37:19.403 [INFO][3866] k8s.go 489: Wrote updated endpoint to datastore ContainerID="6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a" Namespace="kube-system" Pod="coredns-565d847f94-d946n" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:19.433350 env[1342]: time="2023-10-02T19:37:19.433157734Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:37:19.433350 env[1342]: time="2023-10-02T19:37:19.433200334Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:37:19.433350 env[1342]: time="2023-10-02T19:37:19.433215834Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:37:19.433664 env[1342]: time="2023-10-02T19:37:19.433358933Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a pid=3907 runtime=io.containerd.runc.v2 Oct 2 19:37:19.453862 systemd[1]: Started cri-containerd-6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a.scope. Oct 2 19:37:19.469000 audit[3926]: NETFILTER_CFG table=filter:118 family=2 entries=36 op=nft_register_chain pid=3926 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:37:19.469000 audit[3926]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fffdc9ce0f0 a2=0 a3=7fffdc9ce0dc items=0 ppid=3612 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:19.469000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:37:19.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.471000 audit: BPF prog-id=147 op=LOAD Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3907 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:19.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666383634363434643538636438313530623065333463646330373261 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3907 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:19.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666383634363434643538636438313530623065333463646330373261 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit: BPF prog-id=148 op=LOAD Oct 2 19:37:19.472000 audit[3916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003dc8b0 items=0 ppid=3907 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:19.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666383634363434643538636438313530623065333463646330373261 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit: BPF prog-id=149 op=LOAD Oct 2 19:37:19.472000 audit[3916]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003dc8f8 items=0 ppid=3907 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:19.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666383634363434643538636438313530623065333463646330373261 Oct 2 19:37:19.472000 audit: BPF prog-id=149 op=UNLOAD Oct 2 19:37:19.472000 audit: BPF prog-id=148 op=UNLOAD Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { perfmon } for pid=3916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit[3916]: AVC avc: denied { bpf } for pid=3916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.472000 audit: BPF prog-id=150 op=LOAD Oct 2 19:37:19.472000 audit[3916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003dcd08 items=0 ppid=3907 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:19.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666383634363434643538636438313530623065333463646330373261 Oct 2 19:37:19.502337 env[1342]: time="2023-10-02T19:37:19.502298112Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-d946n,Uid:e8797047-13b2-4cb1-9fe8-f7ffa806f655,Namespace:kube-system,Attempt:1,} returns sandbox id \"6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a\"" Oct 2 19:37:19.506241 env[1342]: time="2023-10-02T19:37:19.506199877Z" level=info msg="CreateContainer within sandbox \"6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:37:19.561416 env[1342]: time="2023-10-02T19:37:19.561367481Z" level=info msg="CreateContainer within sandbox \"6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0aba0afd2ab87807d2e8f7f4e5afe9a67e72472f4249091789fcadc6c0b95797\"" Oct 2 19:37:19.562050 env[1342]: time="2023-10-02T19:37:19.562013275Z" level=info msg="StartContainer for \"0aba0afd2ab87807d2e8f7f4e5afe9a67e72472f4249091789fcadc6c0b95797\"" Oct 2 19:37:19.577932 systemd[1]: Started cri-containerd-0aba0afd2ab87807d2e8f7f4e5afe9a67e72472f4249091789fcadc6c0b95797.scope. Oct 2 19:37:19.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.592000 audit: BPF prog-id=151 op=LOAD Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3907 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:19.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061626130616664326162383738303764326538663766346535616665 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3907 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:19.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061626130616664326162383738303764326538663766346535616665 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit: BPF prog-id=152 op=LOAD Oct 2 19:37:19.593000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00037c0d0 items=0 ppid=3907 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:19.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061626130616664326162383738303764326538663766346535616665 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit: BPF prog-id=153 op=LOAD Oct 2 19:37:19.593000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00037c118 items=0 ppid=3907 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:19.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061626130616664326162383738303764326538663766346535616665 Oct 2 19:37:19.593000 audit: BPF prog-id=153 op=UNLOAD Oct 2 19:37:19.593000 audit: BPF prog-id=152 op=UNLOAD Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:19.593000 audit: BPF prog-id=154 op=LOAD Oct 2 19:37:19.593000 audit[3948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00037c528 items=0 ppid=3907 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:19.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061626130616664326162383738303764326538663766346535616665 Oct 2 19:37:19.616568 env[1342]: time="2023-10-02T19:37:19.616532084Z" level=info msg="StartContainer for \"0aba0afd2ab87807d2e8f7f4e5afe9a67e72472f4249091789fcadc6c0b95797\" returns successfully" Oct 2 19:37:20.138205 env[1342]: time="2023-10-02T19:37:20.138165703Z" level=info msg="StopPodSandbox for \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\"" Oct 2 19:37:20.213011 env[1342]: 2023-10-02 19:37:20.182 [INFO][3997] k8s.go 576: Cleaning up netns ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Oct 2 19:37:20.213011 env[1342]: 2023-10-02 19:37:20.182 [INFO][3997] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" iface="eth0" netns="/var/run/netns/cni-b12f5b9d-4b85-8af6-580b-b33c2c030d59" Oct 2 19:37:20.213011 env[1342]: 2023-10-02 19:37:20.182 [INFO][3997] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" iface="eth0" netns="/var/run/netns/cni-b12f5b9d-4b85-8af6-580b-b33c2c030d59" Oct 2 19:37:20.213011 env[1342]: 2023-10-02 19:37:20.183 [INFO][3997] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" iface="eth0" netns="/var/run/netns/cni-b12f5b9d-4b85-8af6-580b-b33c2c030d59" Oct 2 19:37:20.213011 env[1342]: 2023-10-02 19:37:20.183 [INFO][3997] k8s.go 583: Releasing IP address(es) ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Oct 2 19:37:20.213011 env[1342]: 2023-10-02 19:37:20.183 [INFO][3997] utils.go 196: Calico CNI releasing IP address ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Oct 2 19:37:20.213011 env[1342]: 2023-10-02 19:37:20.204 [INFO][4004] ipam_plugin.go 416: Releasing address using handleID ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" HandleID="k8s-pod-network.2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:20.213011 env[1342]: time="2023-10-02T19:37:20Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:20.213011 env[1342]: time="2023-10-02T19:37:20Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:20.213011 env[1342]: 2023-10-02 19:37:20.209 [WARNING][4004] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" HandleID="k8s-pod-network.2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:20.213011 env[1342]: 2023-10-02 19:37:20.209 [INFO][4004] ipam_plugin.go 444: Releasing address using workloadID ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" HandleID="k8s-pod-network.2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:20.213011 env[1342]: time="2023-10-02T19:37:20Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:20.213011 env[1342]: 2023-10-02 19:37:20.212 [INFO][3997] k8s.go 589: Teardown processing complete. ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Oct 2 19:37:20.213654 env[1342]: time="2023-10-02T19:37:20.213623032Z" level=info msg="TearDown network for sandbox \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\" successfully" Oct 2 19:37:20.213732 env[1342]: time="2023-10-02T19:37:20.213718931Z" level=info msg="StopPodSandbox for \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\" returns successfully" Oct 2 19:37:20.214411 env[1342]: time="2023-10-02T19:37:20.214382825Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-6m6vk,Uid:c47b71eb-2e5d-4cf6-97a5-bac15992fb6a,Namespace:kube-system,Attempt:1,}" Oct 2 19:37:20.219012 systemd[1]: run-netns-cni\x2db12f5b9d\x2d4b85\x2d8af6\x2d580b\x2db33c2c030d59.mount: Deactivated successfully. Oct 2 19:37:20.332394 systemd-networkd[1472]: vxlan.calico: Gained IPv6LL Oct 2 19:37:20.411913 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:37:20.412042 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1cee2fa8087: link becomes ready Oct 2 19:37:20.417000 audit[4055]: NETFILTER_CFG table=filter:119 family=2 entries=12 op=nft_register_rule pid=4055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:20.422148 kernel: kauditd_printk_skb: 268 callbacks suppressed Oct 2 19:37:20.422221 kernel: audit: type=1325 audit(1696275440.417:1222): table=filter:119 family=2 entries=12 op=nft_register_rule pid=4055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:20.417000 audit[4055]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffdb94111a0 a2=0 a3=7ffdb941118c items=0 ppid=2663 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.463098 kernel: audit: type=1300 audit(1696275440.417:1222): arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffdb94111a0 a2=0 a3=7ffdb941118c items=0 ppid=2663 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.463161 kernel: audit: type=1327 audit(1696275440.417:1222): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:20.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:20.463508 systemd-networkd[1472]: cali1cee2fa8087: Link UP Oct 2 19:37:20.452000 audit[4055]: NETFILTER_CFG table=nat:120 family=2 entries=30 op=nft_register_rule pid=4055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:20.463517 systemd-networkd[1472]: cali1cee2fa8087: Gained carrier Oct 2 19:37:20.477907 kernel: audit: type=1325 audit(1696275440.452:1223): table=nat:120 family=2 entries=30 op=nft_register_rule pid=4055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:20.452000 audit[4055]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffdb94111a0 a2=0 a3=7ffdb941118c items=0 ppid=2663 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.305 [INFO][4011] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0 coredns-565d847f94- kube-system c47b71eb-2e5d-4cf6-97a5-bac15992fb6a 701 0 2023-10-02 19:36:40 +0000 UTC map[k8s-app:kube-dns pod-template-hash:565d847f94 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-58c23d0da1 coredns-565d847f94-6m6vk eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali1cee2fa8087 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" Namespace="kube-system" Pod="coredns-565d847f94-6m6vk" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-" Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.306 [INFO][4011] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" Namespace="kube-system" Pod="coredns-565d847f94-6m6vk" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.358 [INFO][4023] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" HandleID="k8s-pod-network.01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.369 [INFO][4023] ipam_plugin.go 269: Auto assigning IP ContainerID="01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" HandleID="k8s-pod-network.01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001ba380), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-58c23d0da1", "pod":"coredns-565d847f94-6m6vk", "timestamp":"2023-10-02 19:37:20.358095746 +0000 UTC"}, Hostname:"ci-3510.3.0-a-58c23d0da1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:37:20.502859 env[1342]: time="2023-10-02T19:37:20Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:20.502859 env[1342]: time="2023-10-02T19:37:20Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.370 [INFO][4023] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-58c23d0da1' Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.371 [INFO][4023] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.375 [INFO][4023] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.379 [INFO][4023] ipam.go 489: Trying affinity for 192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.381 [INFO][4023] ipam.go 155: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.383 [INFO][4023] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.383 [INFO][4023] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.384 [INFO][4023] ipam.go 1682: Creating new handle: k8s-pod-network.01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118 Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.396 [INFO][4023] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.403 [INFO][4023] ipam.go 1216: Successfully claimed IPs: [192.168.34.194/26] block=192.168.34.192/26 handle="k8s-pod-network.01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.403 [INFO][4023] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.194/26] handle="k8s-pod-network.01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:20.502859 env[1342]: time="2023-10-02T19:37:20Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:20.502859 env[1342]: 2023-10-02 19:37:20.403 [INFO][4023] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.34.194/26] IPv6=[] ContainerID="01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" HandleID="k8s-pod-network.01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:20.503548 kernel: audit: type=1300 audit(1696275440.452:1223): arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffdb94111a0 a2=0 a3=7ffdb941118c items=0 ppid=2663 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.503577 env[1342]: 2023-10-02 19:37:20.405 [INFO][4011] k8s.go 383: Populated endpoint ContainerID="01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" Namespace="kube-system" Pod="coredns-565d847f94-6m6vk" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"c47b71eb-2e5d-4cf6-97a5-bac15992fb6a", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 36, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"", Pod:"coredns-565d847f94-6m6vk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1cee2fa8087", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:20.503577 env[1342]: 2023-10-02 19:37:20.405 [INFO][4011] k8s.go 384: Calico CNI using IPs: [192.168.34.194/32] ContainerID="01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" Namespace="kube-system" Pod="coredns-565d847f94-6m6vk" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:20.503577 env[1342]: 2023-10-02 19:37:20.405 [INFO][4011] dataplane_linux.go 68: Setting the host side veth name to cali1cee2fa8087 ContainerID="01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" Namespace="kube-system" Pod="coredns-565d847f94-6m6vk" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:20.503577 env[1342]: 2023-10-02 19:37:20.417 [INFO][4011] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" Namespace="kube-system" Pod="coredns-565d847f94-6m6vk" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:20.503577 env[1342]: 2023-10-02 19:37:20.464 [INFO][4011] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" Namespace="kube-system" Pod="coredns-565d847f94-6m6vk" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"c47b71eb-2e5d-4cf6-97a5-bac15992fb6a", ResourceVersion:"701", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 36, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118", Pod:"coredns-565d847f94-6m6vk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1cee2fa8087", MAC:"5e:24:68:8d:28:60", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:20.503577 env[1342]: 2023-10-02 19:37:20.480 [INFO][4011] k8s.go 489: Wrote updated endpoint to datastore ContainerID="01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118" Namespace="kube-system" Pod="coredns-565d847f94-6m6vk" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:20.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:20.524049 kernel: audit: type=1327 audit(1696275440.452:1223): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:20.537246 env[1342]: time="2023-10-02T19:37:20.537144352Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:37:20.537417 env[1342]: time="2023-10-02T19:37:20.537224951Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:37:20.537417 env[1342]: time="2023-10-02T19:37:20.537249151Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:37:20.537551 env[1342]: time="2023-10-02T19:37:20.537409050Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118 pid=4079 runtime=io.containerd.runc.v2 Oct 2 19:37:20.569413 systemd[1]: Started cri-containerd-01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118.scope. Oct 2 19:37:20.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614984 kernel: audit: type=1400 audit(1696275440.599:1224): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.632242 kernel: audit: type=1400 audit(1696275440.599:1225): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.651894 kernel: audit: type=1400 audit(1696275440.599:1226): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.672232 kernel: audit: type=1400 audit(1696275440.599:1227): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit: BPF prog-id=155 op=LOAD Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4079 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031633335633062383131613236393265396532393132326335373365 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4079 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031633335633062383131613236393265396532393132326335373365 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit: BPF prog-id=156 op=LOAD Oct 2 19:37:20.614000 audit[4095]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003da6f0 items=0 ppid=4079 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031633335633062383131613236393265396532393132326335373365 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.614000 audit: BPF prog-id=157 op=LOAD Oct 2 19:37:20.614000 audit[4095]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003da738 items=0 ppid=4079 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031633335633062383131613236393265396532393132326335373365 Oct 2 19:37:20.614000 audit: BPF prog-id=157 op=UNLOAD Oct 2 19:37:20.615000 audit: BPF prog-id=156 op=UNLOAD Oct 2 19:37:20.615000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.615000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.615000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.615000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.615000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.615000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.615000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.615000 audit[4095]: AVC avc: denied { perfmon } for pid=4095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.615000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.615000 audit[4095]: AVC avc: denied { bpf } for pid=4095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.615000 audit: BPF prog-id=158 op=LOAD Oct 2 19:37:20.615000 audit[4095]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003dab48 items=0 ppid=4079 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031633335633062383131613236393265396532393132326335373365 Oct 2 19:37:20.689000 audit[4123]: NETFILTER_CFG table=filter:121 family=2 entries=30 op=nft_register_chain pid=4123 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:37:20.689000 audit[4123]: SYSCALL arch=c000003e syscall=46 success=yes exit=16712 a0=3 a1=7ffcd850e490 a2=0 a3=7ffcd850e47c items=0 ppid=3612 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.689000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:37:20.692192 env[1342]: time="2023-10-02T19:37:20.692152472Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-6m6vk,Uid:c47b71eb-2e5d-4cf6-97a5-bac15992fb6a,Namespace:kube-system,Attempt:1,} returns sandbox id \"01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118\"" Oct 2 19:37:20.696074 env[1342]: time="2023-10-02T19:37:20.696042138Z" level=info msg="CreateContainer within sandbox \"01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:37:20.720000 audit[4138]: NETFILTER_CFG table=filter:122 family=2 entries=9 op=nft_register_rule pid=4138 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:20.720000 audit[4138]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffebe338b30 a2=0 a3=7ffebe338b1c items=0 ppid=2663 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.720000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:20.722000 audit[4138]: NETFILTER_CFG table=nat:123 family=2 entries=51 op=nft_register_chain pid=4138 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:20.722000 audit[4138]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffebe338b30 a2=0 a3=7ffebe338b1c items=0 ppid=2663 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.722000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:20.744604 env[1342]: time="2023-10-02T19:37:20.744551206Z" level=info msg="CreateContainer within sandbox \"01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d3e3fd3c79dfb61c662f7567aab6156172724fecde0af6dea673a2e3cc4f9257\"" Oct 2 19:37:20.745300 env[1342]: time="2023-10-02T19:37:20.745275200Z" level=info msg="StartContainer for \"d3e3fd3c79dfb61c662f7567aab6156172724fecde0af6dea673a2e3cc4f9257\"" Oct 2 19:37:20.768808 systemd[1]: Started cri-containerd-d3e3fd3c79dfb61c662f7567aab6156172724fecde0af6dea673a2e3cc4f9257.scope. Oct 2 19:37:20.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.787000 audit: BPF prog-id=159 op=LOAD Oct 2 19:37:20.788000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.788000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4079 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433653366643363373964666236316336363266373536376161623631 Oct 2 19:37:20.788000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.788000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=4079 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433653366643363373964666236316336363266373536376161623631 Oct 2 19:37:20.789000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.789000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.789000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.789000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.789000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.789000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.789000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.789000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.789000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.789000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.789000 audit: BPF prog-id=160 op=LOAD Oct 2 19:37:20.789000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0003240c0 items=0 ppid=4079 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433653366643363373964666236316336363266373536376161623631 Oct 2 19:37:20.790000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.790000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.790000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.790000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.790000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.790000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.790000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.790000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.790000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.790000 audit: BPF prog-id=161 op=LOAD Oct 2 19:37:20.790000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000324108 items=0 ppid=4079 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433653366643363373964666236316336363266373536376161623631 Oct 2 19:37:20.791000 audit: BPF prog-id=161 op=UNLOAD Oct 2 19:37:20.791000 audit: BPF prog-id=160 op=UNLOAD Oct 2 19:37:20.791000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.791000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.791000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.791000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.791000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.791000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.791000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.791000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.791000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.791000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:20.791000 audit: BPF prog-id=162 op=LOAD Oct 2 19:37:20.791000 audit[4148]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000324518 items=0 ppid=4079 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:20.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433653366643363373964666236316336363266373536376161623631 Oct 2 19:37:20.819429 env[1342]: time="2023-10-02T19:37:20.819387240Z" level=info msg="StartContainer for \"d3e3fd3c79dfb61c662f7567aab6156172724fecde0af6dea673a2e3cc4f9257\" returns successfully" Oct 2 19:37:21.137450 env[1342]: time="2023-10-02T19:37:21.137321123Z" level=info msg="StopPodSandbox for \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\"" Oct 2 19:37:21.164075 systemd-networkd[1472]: cali4e49bebdc8b: Gained IPv6LL Oct 2 19:37:21.214762 env[1342]: 2023-10-02 19:37:21.185 [INFO][4192] k8s.go 576: Cleaning up netns ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Oct 2 19:37:21.214762 env[1342]: 2023-10-02 19:37:21.185 [INFO][4192] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" iface="eth0" netns="/var/run/netns/cni-464ccea1-8933-dfbd-f495-2884b3c88022" Oct 2 19:37:21.214762 env[1342]: 2023-10-02 19:37:21.185 [INFO][4192] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" iface="eth0" netns="/var/run/netns/cni-464ccea1-8933-dfbd-f495-2884b3c88022" Oct 2 19:37:21.214762 env[1342]: 2023-10-02 19:37:21.185 [INFO][4192] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" iface="eth0" netns="/var/run/netns/cni-464ccea1-8933-dfbd-f495-2884b3c88022" Oct 2 19:37:21.214762 env[1342]: 2023-10-02 19:37:21.185 [INFO][4192] k8s.go 583: Releasing IP address(es) ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Oct 2 19:37:21.214762 env[1342]: 2023-10-02 19:37:21.185 [INFO][4192] utils.go 196: Calico CNI releasing IP address ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Oct 2 19:37:21.214762 env[1342]: 2023-10-02 19:37:21.206 [INFO][4198] ipam_plugin.go 416: Releasing address using handleID ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" HandleID="k8s-pod-network.ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Workload="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:21.214762 env[1342]: time="2023-10-02T19:37:21Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:21.214762 env[1342]: time="2023-10-02T19:37:21Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:21.214762 env[1342]: 2023-10-02 19:37:21.211 [WARNING][4198] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" HandleID="k8s-pod-network.ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Workload="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:21.214762 env[1342]: 2023-10-02 19:37:21.211 [INFO][4198] ipam_plugin.go 444: Releasing address using workloadID ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" HandleID="k8s-pod-network.ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Workload="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:21.214762 env[1342]: time="2023-10-02T19:37:21Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:21.214762 env[1342]: 2023-10-02 19:37:21.213 [INFO][4192] k8s.go 589: Teardown processing complete. ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Oct 2 19:37:21.219817 env[1342]: time="2023-10-02T19:37:21.214885040Z" level=info msg="TearDown network for sandbox \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\" successfully" Oct 2 19:37:21.219817 env[1342]: time="2023-10-02T19:37:21.214936739Z" level=info msg="StopPodSandbox for \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\" returns successfully" Oct 2 19:37:21.219320 systemd[1]: run-containerd-runc-k8s.io-01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118-runc.iOf58z.mount: Deactivated successfully. Oct 2 19:37:21.219426 systemd[1]: run-netns-cni\x2d464ccea1\x2d8933\x2ddfbd\x2df495\x2d2884b3c88022.mount: Deactivated successfully. Oct 2 19:37:21.220496 env[1342]: time="2023-10-02T19:37:21.220462191Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rsg2v,Uid:a5d62a24-4dd0-4595-85ba-03387a0bd553,Namespace:calico-system,Attempt:1,}" Oct 2 19:37:21.421513 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:37:21.421663 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali29a8ef0627c: link becomes ready Oct 2 19:37:21.423000 audit[4248]: NETFILTER_CFG table=filter:124 family=2 entries=6 op=nft_register_rule pid=4248 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:21.423000 audit[4248]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd10a8d530 a2=0 a3=7ffd10a8d51c items=0 ppid=2663 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:21.423000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:21.427157 systemd-networkd[1472]: cali29a8ef0627c: Link UP Oct 2 19:37:21.427165 systemd-networkd[1472]: cali29a8ef0627c: Gained carrier Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.300 [INFO][4204] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0 csi-node-driver- calico-system a5d62a24-4dd0-4595-85ba-03387a0bd553 719 0 2023-10-02 19:37:07 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:fd56fb8dc k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.0-a-58c23d0da1 csi-node-driver-rsg2v eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali29a8ef0627c [] []}} ContainerID="2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" Namespace="calico-system" Pod="csi-node-driver-rsg2v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-" Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.301 [INFO][4204] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" Namespace="calico-system" Pod="csi-node-driver-rsg2v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.358 [INFO][4217] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" HandleID="k8s-pod-network.2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" Workload="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.377 [INFO][4217] ipam_plugin.go 269: Auto assigning IP ContainerID="2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" HandleID="k8s-pod-network.2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" Workload="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a3d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-58c23d0da1", "pod":"csi-node-driver-rsg2v", "timestamp":"2023-10-02 19:37:21.358724973 +0000 UTC"}, Hostname:"ci-3510.3.0-a-58c23d0da1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:37:21.442939 env[1342]: time="2023-10-02T19:37:21Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:21.442939 env[1342]: time="2023-10-02T19:37:21Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.377 [INFO][4217] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-58c23d0da1' Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.383 [INFO][4217] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.387 [INFO][4217] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.391 [INFO][4217] ipam.go 489: Trying affinity for 192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.393 [INFO][4217] ipam.go 155: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.396 [INFO][4217] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.396 [INFO][4217] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.397 [INFO][4217] ipam.go 1682: Creating new handle: k8s-pod-network.2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434 Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.401 [INFO][4217] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.407 [INFO][4217] ipam.go 1216: Successfully claimed IPs: [192.168.34.195/26] block=192.168.34.192/26 handle="k8s-pod-network.2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.407 [INFO][4217] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.195/26] handle="k8s-pod-network.2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:21.442939 env[1342]: time="2023-10-02T19:37:21Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:21.442939 env[1342]: 2023-10-02 19:37:21.407 [INFO][4217] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.34.195/26] IPv6=[] ContainerID="2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" HandleID="k8s-pod-network.2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" Workload="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:21.443973 env[1342]: 2023-10-02 19:37:21.409 [INFO][4204] k8s.go 383: Populated endpoint ContainerID="2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" Namespace="calico-system" Pod="csi-node-driver-rsg2v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a5d62a24-4dd0-4595-85ba-03387a0bd553", ResourceVersion:"719", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"", Pod:"csi-node-driver-rsg2v", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali29a8ef0627c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:21.443973 env[1342]: 2023-10-02 19:37:21.409 [INFO][4204] k8s.go 384: Calico CNI using IPs: [192.168.34.195/32] ContainerID="2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" Namespace="calico-system" Pod="csi-node-driver-rsg2v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:21.443973 env[1342]: 2023-10-02 19:37:21.409 [INFO][4204] dataplane_linux.go 68: Setting the host side veth name to cali29a8ef0627c ContainerID="2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" Namespace="calico-system" Pod="csi-node-driver-rsg2v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:21.443973 env[1342]: 2023-10-02 19:37:21.422 [INFO][4204] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" Namespace="calico-system" Pod="csi-node-driver-rsg2v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:21.443973 env[1342]: 2023-10-02 19:37:21.427 [INFO][4204] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" Namespace="calico-system" Pod="csi-node-driver-rsg2v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a5d62a24-4dd0-4595-85ba-03387a0bd553", ResourceVersion:"719", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434", Pod:"csi-node-driver-rsg2v", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali29a8ef0627c", MAC:"6e:06:8a:8d:c8:4e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:21.443973 env[1342]: 2023-10-02 19:37:21.441 [INFO][4204] k8s.go 489: Wrote updated endpoint to datastore ContainerID="2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434" Namespace="calico-system" Pod="csi-node-driver-rsg2v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:21.445000 audit[4248]: NETFILTER_CFG table=nat:125 family=2 entries=60 op=nft_register_rule pid=4248 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:21.445000 audit[4248]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffd10a8d530 a2=0 a3=7ffd10a8d51c items=0 ppid=2663 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:21.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:21.470859 env[1342]: time="2023-10-02T19:37:21.470753687Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:37:21.471003 env[1342]: time="2023-10-02T19:37:21.470893285Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:37:21.471003 env[1342]: time="2023-10-02T19:37:21.470927785Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:37:21.471341 env[1342]: time="2023-10-02T19:37:21.471280382Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434 pid=4269 runtime=io.containerd.runc.v2 Oct 2 19:37:21.494000 audit[4287]: NETFILTER_CFG table=filter:126 family=2 entries=44 op=nft_register_chain pid=4287 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:37:21.494000 audit[4287]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7fffb044ecc0 a2=0 a3=7fffb044ecac items=0 ppid=3612 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:21.494000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:37:21.503927 systemd[1]: run-containerd-runc-k8s.io-2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434-runc.S4iOlT.mount: Deactivated successfully. Oct 2 19:37:21.509130 systemd[1]: Started cri-containerd-2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434.scope. Oct 2 19:37:21.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit: BPF prog-id=163 op=LOAD Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4269 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:21.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263353337646265313537363733363236383762323137383838313564 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4269 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:21.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263353337646265313537363733363236383762323137383838313564 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit: BPF prog-id=164 op=LOAD Oct 2 19:37:21.525000 audit[4280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e5560 items=0 ppid=4269 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:21.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263353337646265313537363733363236383762323137383838313564 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit: BPF prog-id=165 op=LOAD Oct 2 19:37:21.525000 audit[4280]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e55a8 items=0 ppid=4269 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:21.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263353337646265313537363733363236383762323137383838313564 Oct 2 19:37:21.525000 audit: BPF prog-id=165 op=UNLOAD Oct 2 19:37:21.525000 audit: BPF prog-id=164 op=UNLOAD Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { perfmon } for pid=4280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit[4280]: AVC avc: denied { bpf } for pid=4280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:21.525000 audit: BPF prog-id=166 op=LOAD Oct 2 19:37:21.525000 audit[4280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e59b8 items=0 ppid=4269 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:21.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263353337646265313537363733363236383762323137383838313564 Oct 2 19:37:21.539971 env[1342]: time="2023-10-02T19:37:21.539927378Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rsg2v,Uid:a5d62a24-4dd0-4595-85ba-03387a0bd553,Namespace:calico-system,Attempt:1,} returns sandbox id \"2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434\"" Oct 2 19:37:21.543191 env[1342]: time="2023-10-02T19:37:21.541757362Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:37:21.616000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:21.616000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c000cac960 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:37:21.616000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:37:21.616000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:21.616000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=10 a1=c001043c60 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:37:21.616000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:37:21.858112 env[1342]: time="2023-10-02T19:37:21.857948777Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:37:21.861970 env[1342]: time="2023-10-02T19:37:21.861893643Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:37:21.862429 kubelet[2463]: E1002 19:37:21.862401 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:37:21.862947 kubelet[2463]: E1002 19:37:21.862475 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:37:21.863048 kubelet[2463]: E1002 19:37:21.862679 2463 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-xlc4s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-rsg2v_calico-system(a5d62a24-4dd0-4595-85ba-03387a0bd553): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:37:21.864167 env[1342]: time="2023-10-02T19:37:21.864124523Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:37:22.170386 env[1342]: time="2023-10-02T19:37:22.170266243Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:37:22.173534 env[1342]: time="2023-10-02T19:37:22.173475515Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:37:22.173707 kubelet[2463]: E1002 19:37:22.173685 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:37:22.173809 kubelet[2463]: E1002 19:37:22.173730 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:37:22.173863 kubelet[2463]: E1002 19:37:22.173829 2463 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-xlc4s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-rsg2v_calico-system(a5d62a24-4dd0-4595-85ba-03387a0bd553): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:37:22.174010 kubelet[2463]: E1002 19:37:22.173914 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:37:22.311193 kubelet[2463]: E1002 19:37:22.311159 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:37:22.444195 systemd-networkd[1472]: cali1cee2fa8087: Gained IPv6LL Oct 2 19:37:22.483000 audit[4338]: NETFILTER_CFG table=filter:127 family=2 entries=6 op=nft_register_rule pid=4338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:22.483000 audit[4338]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcb6b17760 a2=0 a3=7ffcb6b1774c items=0 ppid=2663 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:22.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:22.510000 audit[4338]: NETFILTER_CFG table=nat:128 family=2 entries=72 op=nft_register_chain pid=4338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:22.510000 audit[4338]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffcb6b17760 a2=0 a3=7ffcb6b1774c items=0 ppid=2663 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:22.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:22.584000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:22.584000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:22.584000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c001b0f840 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:37:22.584000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:37:22.584000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00d1b42d0 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:37:22.584000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:37:22.593000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7137 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:22.593000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00d006330 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:37:22.593000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:37:22.607000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:22.607000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00d1b4300 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:37:22.607000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:37:22.701000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:22.701000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c001917160 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:37:22.701000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:37:22.702000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:22.702000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00d1b4810 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:37:22.702000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:37:22.892173 systemd-networkd[1472]: cali29a8ef0627c: Gained IPv6LL Oct 2 19:37:23.137428 env[1342]: time="2023-10-02T19:37:23.137302029Z" level=info msg="StopPodSandbox for \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\"" Oct 2 19:37:23.209212 env[1342]: 2023-10-02 19:37:23.177 [INFO][4355] k8s.go 576: Cleaning up netns ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Oct 2 19:37:23.209212 env[1342]: 2023-10-02 19:37:23.178 [INFO][4355] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" iface="eth0" netns="/var/run/netns/cni-9f0c8b34-a501-2940-3685-99c940666eca" Oct 2 19:37:23.209212 env[1342]: 2023-10-02 19:37:23.178 [INFO][4355] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" iface="eth0" netns="/var/run/netns/cni-9f0c8b34-a501-2940-3685-99c940666eca" Oct 2 19:37:23.209212 env[1342]: 2023-10-02 19:37:23.178 [INFO][4355] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" iface="eth0" netns="/var/run/netns/cni-9f0c8b34-a501-2940-3685-99c940666eca" Oct 2 19:37:23.209212 env[1342]: 2023-10-02 19:37:23.178 [INFO][4355] k8s.go 583: Releasing IP address(es) ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Oct 2 19:37:23.209212 env[1342]: 2023-10-02 19:37:23.178 [INFO][4355] utils.go 196: Calico CNI releasing IP address ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Oct 2 19:37:23.209212 env[1342]: 2023-10-02 19:37:23.200 [INFO][4361] ipam_plugin.go 416: Releasing address using handleID ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" HandleID="k8s-pod-network.d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:23.209212 env[1342]: time="2023-10-02T19:37:23Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:23.209212 env[1342]: time="2023-10-02T19:37:23Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:23.209212 env[1342]: 2023-10-02 19:37:23.206 [WARNING][4361] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" HandleID="k8s-pod-network.d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:23.209212 env[1342]: 2023-10-02 19:37:23.206 [INFO][4361] ipam_plugin.go 444: Releasing address using workloadID ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" HandleID="k8s-pod-network.d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:23.209212 env[1342]: time="2023-10-02T19:37:23Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:23.209212 env[1342]: 2023-10-02 19:37:23.208 [INFO][4355] k8s.go 589: Teardown processing complete. ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Oct 2 19:37:23.213091 env[1342]: time="2023-10-02T19:37:23.212581480Z" level=info msg="TearDown network for sandbox \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\" successfully" Oct 2 19:37:23.213091 env[1342]: time="2023-10-02T19:37:23.212632280Z" level=info msg="StopPodSandbox for \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\" returns successfully" Oct 2 19:37:23.211732 systemd[1]: run-netns-cni\x2d9f0c8b34\x2da501\x2d2940\x2d3685\x2d99c940666eca.mount: Deactivated successfully. Oct 2 19:37:23.213473 env[1342]: time="2023-10-02T19:37:23.213445873Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69d9c784fb-qm27v,Uid:3aa51857-ba96-47a6-83c9-b6d7571f0d6e,Namespace:calico-system,Attempt:1,}" Oct 2 19:37:23.313687 kubelet[2463]: E1002 19:37:23.313657 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:37:23.400230 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:37:23.400471 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5d049745216: link becomes ready Oct 2 19:37:23.407670 systemd-networkd[1472]: cali5d049745216: Link UP Oct 2 19:37:23.407679 systemd-networkd[1472]: cali5d049745216: Gained carrier Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.304 [INFO][4367] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0 calico-kube-controllers-69d9c784fb- calico-system 3aa51857-ba96-47a6-83c9-b6d7571f0d6e 746 0 2023-10-02 19:36:46 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:69d9c784fb projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.0-a-58c23d0da1 calico-kube-controllers-69d9c784fb-qm27v eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali5d049745216 [] []}} ContainerID="c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-qm27v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-" Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.304 [INFO][4367] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-qm27v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.355 [INFO][4380] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" HandleID="k8s-pod-network.c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.363 [INFO][4380] ipam_plugin.go 269: Auto assigning IP ContainerID="c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" HandleID="k8s-pod-network.c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001310e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-58c23d0da1", "pod":"calico-kube-controllers-69d9c784fb-qm27v", "timestamp":"2023-10-02 19:37:23.355571447 +0000 UTC"}, Hostname:"ci-3510.3.0-a-58c23d0da1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:37:23.425039 env[1342]: time="2023-10-02T19:37:23Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:23.425039 env[1342]: time="2023-10-02T19:37:23Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.363 [INFO][4380] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-58c23d0da1' Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.365 [INFO][4380] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.368 [INFO][4380] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.371 [INFO][4380] ipam.go 489: Trying affinity for 192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.373 [INFO][4380] ipam.go 155: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.375 [INFO][4380] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.375 [INFO][4380] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.376 [INFO][4380] ipam.go 1682: Creating new handle: k8s-pod-network.c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.379 [INFO][4380] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.387 [INFO][4380] ipam.go 1216: Successfully claimed IPs: [192.168.34.196/26] block=192.168.34.192/26 handle="k8s-pod-network.c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.387 [INFO][4380] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.196/26] handle="k8s-pod-network.c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:23.425039 env[1342]: time="2023-10-02T19:37:23Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:23.425039 env[1342]: 2023-10-02 19:37:23.387 [INFO][4380] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.34.196/26] IPv6=[] ContainerID="c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" HandleID="k8s-pod-network.c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:23.425792 env[1342]: 2023-10-02 19:37:23.389 [INFO][4367] k8s.go 383: Populated endpoint ContainerID="c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-qm27v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0", GenerateName:"calico-kube-controllers-69d9c784fb-", Namespace:"calico-system", SelfLink:"", UID:"3aa51857-ba96-47a6-83c9-b6d7571f0d6e", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 36, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69d9c784fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"", Pod:"calico-kube-controllers-69d9c784fb-qm27v", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5d049745216", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:23.425792 env[1342]: 2023-10-02 19:37:23.389 [INFO][4367] k8s.go 384: Calico CNI using IPs: [192.168.34.196/32] ContainerID="c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-qm27v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:23.425792 env[1342]: 2023-10-02 19:37:23.389 [INFO][4367] dataplane_linux.go 68: Setting the host side veth name to cali5d049745216 ContainerID="c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-qm27v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:23.425792 env[1342]: 2023-10-02 19:37:23.400 [INFO][4367] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-qm27v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:23.425792 env[1342]: 2023-10-02 19:37:23.409 [INFO][4367] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-qm27v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0", GenerateName:"calico-kube-controllers-69d9c784fb-", Namespace:"calico-system", SelfLink:"", UID:"3aa51857-ba96-47a6-83c9-b6d7571f0d6e", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 36, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69d9c784fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a", Pod:"calico-kube-controllers-69d9c784fb-qm27v", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5d049745216", MAC:"96:16:f6:36:9b:db", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:23.425792 env[1342]: 2023-10-02 19:37:23.422 [INFO][4367] k8s.go 489: Wrote updated endpoint to datastore ContainerID="c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-qm27v" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:23.458230 env[1342]: time="2023-10-02T19:37:23.458148563Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:37:23.458434 env[1342]: time="2023-10-02T19:37:23.458239462Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:37:23.458434 env[1342]: time="2023-10-02T19:37:23.458267062Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:37:23.458434 env[1342]: time="2023-10-02T19:37:23.458415260Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a pid=4406 runtime=io.containerd.runc.v2 Oct 2 19:37:23.471000 audit[4418]: NETFILTER_CFG table=filter:129 family=2 entries=42 op=nft_register_chain pid=4418 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:37:23.471000 audit[4418]: SYSCALL arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7ffd86897a60 a2=0 a3=7ffd86897a4c items=0 ppid=3612 pid=4418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:23.471000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:37:23.488088 systemd[1]: Started cri-containerd-c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a.scope. Oct 2 19:37:23.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit: BPF prog-id=167 op=LOAD Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4406 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:23.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338343064323139653563633732656230363231316266303839643734 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4406 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:23.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338343064323139653563633732656230363231316266303839643734 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit: BPF prog-id=168 op=LOAD Oct 2 19:37:23.499000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000282620 items=0 ppid=4406 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:23.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338343064323139653563633732656230363231316266303839643734 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.499000 audit: BPF prog-id=169 op=LOAD Oct 2 19:37:23.499000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000282668 items=0 ppid=4406 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:23.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338343064323139653563633732656230363231316266303839643734 Oct 2 19:37:23.499000 audit: BPF prog-id=169 op=UNLOAD Oct 2 19:37:23.499000 audit: BPF prog-id=168 op=UNLOAD Oct 2 19:37:23.500000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.500000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.500000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.500000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.500000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.500000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.500000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.500000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.500000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.500000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:23.500000 audit: BPF prog-id=170 op=LOAD Oct 2 19:37:23.500000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000282a78 items=0 ppid=4406 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:23.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338343064323139653563633732656230363231316266303839643734 Oct 2 19:37:23.532824 env[1342]: time="2023-10-02T19:37:23.532779219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69d9c784fb-qm27v,Uid:3aa51857-ba96-47a6-83c9-b6d7571f0d6e,Namespace:calico-system,Attempt:1,} returns sandbox id \"c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a\"" Oct 2 19:37:23.534930 env[1342]: time="2023-10-02T19:37:23.534902901Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:37:24.749115 systemd-networkd[1472]: cali5d049745216: Gained IPv6LL Oct 2 19:37:26.097455 env[1342]: time="2023-10-02T19:37:26.097400185Z" level=info msg="StopPodSandbox for \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\"" Oct 2 19:37:26.175765 env[1342]: 2023-10-02 19:37:26.138 [WARNING][4465] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0", GenerateName:"calico-kube-controllers-69d9c784fb-", Namespace:"calico-system", SelfLink:"", UID:"3aa51857-ba96-47a6-83c9-b6d7571f0d6e", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 36, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69d9c784fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a", Pod:"calico-kube-controllers-69d9c784fb-qm27v", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5d049745216", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:26.175765 env[1342]: 2023-10-02 19:37:26.138 [INFO][4465] k8s.go 576: Cleaning up netns ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Oct 2 19:37:26.175765 env[1342]: 2023-10-02 19:37:26.138 [INFO][4465] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" iface="eth0" netns="" Oct 2 19:37:26.175765 env[1342]: 2023-10-02 19:37:26.138 [INFO][4465] k8s.go 583: Releasing IP address(es) ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Oct 2 19:37:26.175765 env[1342]: 2023-10-02 19:37:26.138 [INFO][4465] utils.go 196: Calico CNI releasing IP address ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Oct 2 19:37:26.175765 env[1342]: 2023-10-02 19:37:26.160 [INFO][4473] ipam_plugin.go 416: Releasing address using handleID ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" HandleID="k8s-pod-network.d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:26.175765 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:26.175765 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:26.175765 env[1342]: 2023-10-02 19:37:26.167 [WARNING][4473] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" HandleID="k8s-pod-network.d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:26.175765 env[1342]: 2023-10-02 19:37:26.167 [INFO][4473] ipam_plugin.go 444: Releasing address using workloadID ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" HandleID="k8s-pod-network.d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:26.175765 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:26.175765 env[1342]: 2023-10-02 19:37:26.171 [INFO][4465] k8s.go 589: Teardown processing complete. ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Oct 2 19:37:26.176845 env[1342]: time="2023-10-02T19:37:26.176753820Z" level=info msg="TearDown network for sandbox \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\" successfully" Oct 2 19:37:26.177827 env[1342]: time="2023-10-02T19:37:26.177801211Z" level=info msg="StopPodSandbox for \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\" returns successfully" Oct 2 19:37:26.178455 env[1342]: time="2023-10-02T19:37:26.178428406Z" level=info msg="RemovePodSandbox for \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\"" Oct 2 19:37:26.178662 env[1342]: time="2023-10-02T19:37:26.178566605Z" level=info msg="Forcibly stopping sandbox \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\"" Oct 2 19:37:26.281185 env[1342]: 2023-10-02 19:37:26.236 [WARNING][4494] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0", GenerateName:"calico-kube-controllers-69d9c784fb-", Namespace:"calico-system", SelfLink:"", UID:"3aa51857-ba96-47a6-83c9-b6d7571f0d6e", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 36, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69d9c784fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a", Pod:"calico-kube-controllers-69d9c784fb-qm27v", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5d049745216", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:26.281185 env[1342]: 2023-10-02 19:37:26.236 [INFO][4494] k8s.go 576: Cleaning up netns ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Oct 2 19:37:26.281185 env[1342]: 2023-10-02 19:37:26.236 [INFO][4494] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" iface="eth0" netns="" Oct 2 19:37:26.281185 env[1342]: 2023-10-02 19:37:26.236 [INFO][4494] k8s.go 583: Releasing IP address(es) ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Oct 2 19:37:26.281185 env[1342]: 2023-10-02 19:37:26.236 [INFO][4494] utils.go 196: Calico CNI releasing IP address ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Oct 2 19:37:26.281185 env[1342]: 2023-10-02 19:37:26.270 [INFO][4500] ipam_plugin.go 416: Releasing address using handleID ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" HandleID="k8s-pod-network.d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:26.281185 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:26.281185 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:26.281185 env[1342]: 2023-10-02 19:37:26.277 [WARNING][4500] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" HandleID="k8s-pod-network.d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:26.281185 env[1342]: 2023-10-02 19:37:26.277 [INFO][4500] ipam_plugin.go 444: Releasing address using workloadID ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" HandleID="k8s-pod-network.d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--kube--controllers--69d9c784fb--qm27v-eth0" Oct 2 19:37:26.281185 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:26.281185 env[1342]: 2023-10-02 19:37:26.279 [INFO][4494] k8s.go 589: Teardown processing complete. ContainerID="d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e" Oct 2 19:37:26.281924 env[1342]: time="2023-10-02T19:37:26.281217646Z" level=info msg="TearDown network for sandbox \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\" successfully" Oct 2 19:37:26.308032 env[1342]: time="2023-10-02T19:37:26.307923422Z" level=info msg="RemovePodSandbox \"d212bf553a32ac69720c2fae8b901720a9b46f8730378d8bd5b389f79f18416e\" returns successfully" Oct 2 19:37:26.308930 env[1342]: time="2023-10-02T19:37:26.308890914Z" level=info msg="StopPodSandbox for \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\"" Oct 2 19:37:26.421806 env[1342]: 2023-10-02 19:37:26.386 [WARNING][4518] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a5d62a24-4dd0-4595-85ba-03387a0bd553", ResourceVersion:"750", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434", Pod:"csi-node-driver-rsg2v", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali29a8ef0627c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:26.421806 env[1342]: 2023-10-02 19:37:26.387 [INFO][4518] k8s.go 576: Cleaning up netns ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Oct 2 19:37:26.421806 env[1342]: 2023-10-02 19:37:26.387 [INFO][4518] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" iface="eth0" netns="" Oct 2 19:37:26.421806 env[1342]: 2023-10-02 19:37:26.387 [INFO][4518] k8s.go 583: Releasing IP address(es) ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Oct 2 19:37:26.421806 env[1342]: 2023-10-02 19:37:26.387 [INFO][4518] utils.go 196: Calico CNI releasing IP address ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Oct 2 19:37:26.421806 env[1342]: 2023-10-02 19:37:26.410 [INFO][4524] ipam_plugin.go 416: Releasing address using handleID ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" HandleID="k8s-pod-network.ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Workload="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:26.421806 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:26.421806 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:26.421806 env[1342]: 2023-10-02 19:37:26.416 [WARNING][4524] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" HandleID="k8s-pod-network.ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Workload="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:26.421806 env[1342]: 2023-10-02 19:37:26.416 [INFO][4524] ipam_plugin.go 444: Releasing address using workloadID ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" HandleID="k8s-pod-network.ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Workload="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:26.421806 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:26.421806 env[1342]: 2023-10-02 19:37:26.419 [INFO][4518] k8s.go 589: Teardown processing complete. ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Oct 2 19:37:26.421806 env[1342]: time="2023-10-02T19:37:26.420538979Z" level=info msg="TearDown network for sandbox \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\" successfully" Oct 2 19:37:26.421806 env[1342]: time="2023-10-02T19:37:26.420572279Z" level=info msg="StopPodSandbox for \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\" returns successfully" Oct 2 19:37:26.421806 env[1342]: time="2023-10-02T19:37:26.421032475Z" level=info msg="RemovePodSandbox for \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\"" Oct 2 19:37:26.421806 env[1342]: time="2023-10-02T19:37:26.421066575Z" level=info msg="Forcibly stopping sandbox \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\"" Oct 2 19:37:26.489172 env[1342]: 2023-10-02 19:37:26.453 [WARNING][4543] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a5d62a24-4dd0-4595-85ba-03387a0bd553", ResourceVersion:"750", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"2c537dbe15767362687b21788815de6bda4eace0f9604ad47b2f9a10dc778434", Pod:"csi-node-driver-rsg2v", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali29a8ef0627c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:26.489172 env[1342]: 2023-10-02 19:37:26.453 [INFO][4543] k8s.go 576: Cleaning up netns ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Oct 2 19:37:26.489172 env[1342]: 2023-10-02 19:37:26.453 [INFO][4543] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" iface="eth0" netns="" Oct 2 19:37:26.489172 env[1342]: 2023-10-02 19:37:26.453 [INFO][4543] k8s.go 583: Releasing IP address(es) ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Oct 2 19:37:26.489172 env[1342]: 2023-10-02 19:37:26.453 [INFO][4543] utils.go 196: Calico CNI releasing IP address ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Oct 2 19:37:26.489172 env[1342]: 2023-10-02 19:37:26.477 [INFO][4549] ipam_plugin.go 416: Releasing address using handleID ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" HandleID="k8s-pod-network.ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Workload="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:26.489172 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:26.489172 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:26.489172 env[1342]: 2023-10-02 19:37:26.482 [WARNING][4549] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" HandleID="k8s-pod-network.ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Workload="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:26.489172 env[1342]: 2023-10-02 19:37:26.485 [INFO][4549] ipam_plugin.go 444: Releasing address using workloadID ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" HandleID="k8s-pod-network.ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Workload="ci--3510.3.0--a--58c23d0da1-k8s-csi--node--driver--rsg2v-eth0" Oct 2 19:37:26.489172 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:26.489172 env[1342]: 2023-10-02 19:37:26.488 [INFO][4543] k8s.go 589: Teardown processing complete. ContainerID="ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1" Oct 2 19:37:26.489886 env[1342]: time="2023-10-02T19:37:26.489218104Z" level=info msg="TearDown network for sandbox \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\" successfully" Oct 2 19:37:26.543962 env[1342]: time="2023-10-02T19:37:26.543918147Z" level=info msg="RemovePodSandbox \"ef0ece19a504a9a8c3bfbef69aefc6062af450195de080b4e851299162f779c1\" returns successfully" Oct 2 19:37:26.544449 env[1342]: time="2023-10-02T19:37:26.544419942Z" level=info msg="StopPodSandbox for \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\"" Oct 2 19:37:26.624338 env[1342]: 2023-10-02 19:37:26.594 [WARNING][4567] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"e8797047-13b2-4cb1-9fe8-f7ffa806f655", ResourceVersion:"705", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 36, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a", Pod:"coredns-565d847f94-d946n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4e49bebdc8b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:26.624338 env[1342]: 2023-10-02 19:37:26.595 [INFO][4567] k8s.go 576: Cleaning up netns ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Oct 2 19:37:26.624338 env[1342]: 2023-10-02 19:37:26.595 [INFO][4567] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" iface="eth0" netns="" Oct 2 19:37:26.624338 env[1342]: 2023-10-02 19:37:26.595 [INFO][4567] k8s.go 583: Releasing IP address(es) ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Oct 2 19:37:26.624338 env[1342]: 2023-10-02 19:37:26.595 [INFO][4567] utils.go 196: Calico CNI releasing IP address ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Oct 2 19:37:26.624338 env[1342]: 2023-10-02 19:37:26.615 [INFO][4573] ipam_plugin.go 416: Releasing address using handleID ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" HandleID="k8s-pod-network.a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:26.624338 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:26.624338 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:26.624338 env[1342]: 2023-10-02 19:37:26.621 [WARNING][4573] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" HandleID="k8s-pod-network.a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:26.624338 env[1342]: 2023-10-02 19:37:26.621 [INFO][4573] ipam_plugin.go 444: Releasing address using workloadID ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" HandleID="k8s-pod-network.a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:26.624338 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:26.624338 env[1342]: 2023-10-02 19:37:26.623 [INFO][4567] k8s.go 589: Teardown processing complete. ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Oct 2 19:37:26.624900 env[1342]: time="2023-10-02T19:37:26.624360173Z" level=info msg="TearDown network for sandbox \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\" successfully" Oct 2 19:37:26.624900 env[1342]: time="2023-10-02T19:37:26.624392373Z" level=info msg="StopPodSandbox for \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\" returns successfully" Oct 2 19:37:26.625423 env[1342]: time="2023-10-02T19:37:26.625382765Z" level=info msg="RemovePodSandbox for \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\"" Oct 2 19:37:26.625537 env[1342]: time="2023-10-02T19:37:26.625426764Z" level=info msg="Forcibly stopping sandbox \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\"" Oct 2 19:37:26.695547 env[1342]: 2023-10-02 19:37:26.659 [WARNING][4591] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"e8797047-13b2-4cb1-9fe8-f7ffa806f655", ResourceVersion:"705", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 36, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"6f864644d58cd8150b0e34cdc072a610549046974506f8a8cbfa33cd5867134a", Pod:"coredns-565d847f94-d946n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4e49bebdc8b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:26.695547 env[1342]: 2023-10-02 19:37:26.659 [INFO][4591] k8s.go 576: Cleaning up netns ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Oct 2 19:37:26.695547 env[1342]: 2023-10-02 19:37:26.659 [INFO][4591] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" iface="eth0" netns="" Oct 2 19:37:26.695547 env[1342]: 2023-10-02 19:37:26.660 [INFO][4591] k8s.go 583: Releasing IP address(es) ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Oct 2 19:37:26.695547 env[1342]: 2023-10-02 19:37:26.660 [INFO][4591] utils.go 196: Calico CNI releasing IP address ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Oct 2 19:37:26.695547 env[1342]: 2023-10-02 19:37:26.683 [INFO][4597] ipam_plugin.go 416: Releasing address using handleID ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" HandleID="k8s-pod-network.a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:26.695547 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:26.695547 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:26.695547 env[1342]: 2023-10-02 19:37:26.690 [WARNING][4597] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" HandleID="k8s-pod-network.a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:26.695547 env[1342]: 2023-10-02 19:37:26.690 [INFO][4597] ipam_plugin.go 444: Releasing address using workloadID ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" HandleID="k8s-pod-network.a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--d946n-eth0" Oct 2 19:37:26.695547 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:26.695547 env[1342]: 2023-10-02 19:37:26.694 [INFO][4591] k8s.go 589: Teardown processing complete. ContainerID="a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7" Oct 2 19:37:26.696328 env[1342]: time="2023-10-02T19:37:26.695576377Z" level=info msg="TearDown network for sandbox \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\" successfully" Oct 2 19:37:26.706713 env[1342]: time="2023-10-02T19:37:26.706675584Z" level=info msg="RemovePodSandbox \"a795447c18fabbdd0031a17f237c2d7c3589451d585de3c2abefec0e0924d9d7\" returns successfully" Oct 2 19:37:26.707484 env[1342]: time="2023-10-02T19:37:26.707448978Z" level=info msg="StopPodSandbox for \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\"" Oct 2 19:37:26.783793 env[1342]: 2023-10-02 19:37:26.743 [WARNING][4615] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"c47b71eb-2e5d-4cf6-97a5-bac15992fb6a", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 36, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118", Pod:"coredns-565d847f94-6m6vk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1cee2fa8087", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:26.783793 env[1342]: 2023-10-02 19:37:26.743 [INFO][4615] k8s.go 576: Cleaning up netns ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Oct 2 19:37:26.783793 env[1342]: 2023-10-02 19:37:26.743 [INFO][4615] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" iface="eth0" netns="" Oct 2 19:37:26.783793 env[1342]: 2023-10-02 19:37:26.743 [INFO][4615] k8s.go 583: Releasing IP address(es) ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Oct 2 19:37:26.783793 env[1342]: 2023-10-02 19:37:26.743 [INFO][4615] utils.go 196: Calico CNI releasing IP address ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Oct 2 19:37:26.783793 env[1342]: 2023-10-02 19:37:26.773 [INFO][4621] ipam_plugin.go 416: Releasing address using handleID ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" HandleID="k8s-pod-network.2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:26.783793 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:26.783793 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:26.783793 env[1342]: 2023-10-02 19:37:26.779 [WARNING][4621] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" HandleID="k8s-pod-network.2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:26.783793 env[1342]: 2023-10-02 19:37:26.779 [INFO][4621] ipam_plugin.go 444: Releasing address using workloadID ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" HandleID="k8s-pod-network.2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:26.783793 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:26.783793 env[1342]: 2023-10-02 19:37:26.782 [INFO][4615] k8s.go 589: Teardown processing complete. ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Oct 2 19:37:26.784497 env[1342]: time="2023-10-02T19:37:26.783817838Z" level=info msg="TearDown network for sandbox \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\" successfully" Oct 2 19:37:26.784497 env[1342]: time="2023-10-02T19:37:26.783852738Z" level=info msg="StopPodSandbox for \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\" returns successfully" Oct 2 19:37:26.785032 env[1342]: time="2023-10-02T19:37:26.785002828Z" level=info msg="RemovePodSandbox for \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\"" Oct 2 19:37:26.785216 env[1342]: time="2023-10-02T19:37:26.785167727Z" level=info msg="Forcibly stopping sandbox \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\"" Oct 2 19:37:26.868076 env[1342]: 2023-10-02 19:37:26.828 [WARNING][4639] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"c47b71eb-2e5d-4cf6-97a5-bac15992fb6a", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 36, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"01c35c0b811a2692e9e29122c573efdf06fb7581f0f4d3e1306f5dfd6badd118", Pod:"coredns-565d847f94-6m6vk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1cee2fa8087", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:26.868076 env[1342]: 2023-10-02 19:37:26.829 [INFO][4639] k8s.go 576: Cleaning up netns ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Oct 2 19:37:26.868076 env[1342]: 2023-10-02 19:37:26.829 [INFO][4639] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" iface="eth0" netns="" Oct 2 19:37:26.868076 env[1342]: 2023-10-02 19:37:26.829 [INFO][4639] k8s.go 583: Releasing IP address(es) ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Oct 2 19:37:26.868076 env[1342]: 2023-10-02 19:37:26.829 [INFO][4639] utils.go 196: Calico CNI releasing IP address ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Oct 2 19:37:26.868076 env[1342]: 2023-10-02 19:37:26.856 [INFO][4645] ipam_plugin.go 416: Releasing address using handleID ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" HandleID="k8s-pod-network.2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:26.868076 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:26.868076 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:26.868076 env[1342]: 2023-10-02 19:37:26.862 [WARNING][4645] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" HandleID="k8s-pod-network.2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:26.868076 env[1342]: 2023-10-02 19:37:26.862 [INFO][4645] ipam_plugin.go 444: Releasing address using workloadID ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" HandleID="k8s-pod-network.2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Workload="ci--3510.3.0--a--58c23d0da1-k8s-coredns--565d847f94--6m6vk-eth0" Oct 2 19:37:26.868076 env[1342]: time="2023-10-02T19:37:26Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:26.868076 env[1342]: 2023-10-02 19:37:26.867 [INFO][4639] k8s.go 589: Teardown processing complete. ContainerID="2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64" Oct 2 19:37:26.868782 env[1342]: time="2023-10-02T19:37:26.868107733Z" level=info msg="TearDown network for sandbox \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\" successfully" Oct 2 19:37:26.877611 env[1342]: time="2023-10-02T19:37:26.877569353Z" level=info msg="RemovePodSandbox \"2d7d817fdf00dd944fc73f4cbcc829f69fc2ed26bf213bd22ed5c1dd724cdf64\" returns successfully" Oct 2 19:37:27.931000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:27.937987 kernel: kauditd_printk_skb: 275 callbacks suppressed Oct 2 19:37:27.938082 kernel: audit: type=1400 audit(1696275447.931:1313): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:27.954000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:27.954000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=12 a1=c000e18d00 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:37:28.001171 kernel: audit: type=1400 audit(1696275447.954:1314): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:28.001313 kernel: audit: type=1300 audit(1696275447.954:1314): arch=c000003e syscall=254 success=no exit=-13 a0=12 a1=c000e18d00 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:37:27.954000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:37:28.021897 kernel: audit: type=1327 audit(1696275447.954:1314): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:37:27.954000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:28.040897 kernel: audit: type=1400 audit(1696275447.954:1315): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:28.040984 kernel: audit: type=1300 audit(1696275447.954:1315): arch=c000003e syscall=254 success=no exit=-13 a0=12 a1=c000e18d40 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:37:27.954000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=12 a1=c000e18d40 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:37:27.954000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:37:28.085658 kernel: audit: type=1327 audit(1696275447.954:1315): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:37:27.931000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c000ba4b60 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:37:27.931000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:37:28.125653 kernel: audit: type=1300 audit(1696275447.931:1313): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c000ba4b60 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:37:28.125749 kernel: audit: type=1327 audit(1696275447.931:1313): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:37:28.125772 kernel: audit: type=1400 audit(1696275447.955:1316): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:27.955000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:37:27.955000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c000ba4ca0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:37:27.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:37:28.239507 env[1342]: time="2023-10-02T19:37:28.239394869Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:37:28.251147 env[1342]: time="2023-10-02T19:37:28.251106572Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:37:28.256060 env[1342]: time="2023-10-02T19:37:28.256028132Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:37:28.263981 env[1342]: time="2023-10-02T19:37:28.263942967Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:37:28.264721 env[1342]: time="2023-10-02T19:37:28.264688761Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 19:37:28.266821 env[1342]: time="2023-10-02T19:37:28.266789944Z" level=info msg="CreateContainer within sandbox \"c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:37:28.293123 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1067497513.mount: Deactivated successfully. Oct 2 19:37:28.311410 env[1342]: time="2023-10-02T19:37:28.311364777Z" level=info msg="CreateContainer within sandbox \"c840d219e5cc72eb06211bf089d7439d69a8b1056fe7b1b359c8b4d4210b530a\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63\"" Oct 2 19:37:28.314207 env[1342]: time="2023-10-02T19:37:28.312099571Z" level=info msg="StartContainer for \"b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63\"" Oct 2 19:37:28.337611 systemd[1]: Started cri-containerd-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63.scope. Oct 2 19:37:28.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.348000 audit: BPF prog-id=171 op=LOAD Oct 2 19:37:28.349000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.349000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4406 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:28.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653632396136343364643137323662353235346532353536366434 Oct 2 19:37:28.349000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.349000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4406 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:28.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653632396136343364643137323662353235346532353536366434 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit: BPF prog-id=172 op=LOAD Oct 2 19:37:28.350000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025160 items=0 ppid=4406 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:28.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653632396136343364643137323662353235346532353536366434 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.350000 audit: BPF prog-id=173 op=LOAD Oct 2 19:37:28.350000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000251a8 items=0 ppid=4406 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:28.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653632396136343364643137323662353235346532353536366434 Oct 2 19:37:28.351000 audit: BPF prog-id=173 op=UNLOAD Oct 2 19:37:28.351000 audit: BPF prog-id=172 op=UNLOAD Oct 2 19:37:28.351000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.351000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.351000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.351000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.351000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.351000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.351000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.351000 audit[4680]: AVC avc: denied { perfmon } for pid=4680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.351000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.351000 audit[4680]: AVC avc: denied { bpf } for pid=4680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:28.351000 audit: BPF prog-id=174 op=LOAD Oct 2 19:37:28.351000 audit[4680]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000255b8 items=0 ppid=4406 pid=4680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:28.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239653632396136343364643137323662353235346532353536366434 Oct 2 19:37:28.371219 env[1342]: time="2023-10-02T19:37:28.371163486Z" level=info msg="StartContainer for \"b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63\" returns successfully" Oct 2 19:37:29.378474 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.e5HvQX.mount: Deactivated successfully. Oct 2 19:37:30.690452 kubelet[2463]: I1002 19:37:30.689796 2463 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:37:30.696701 systemd[1]: Created slice kubepods-besteffort-pod4f76841c_7b97_4f9f_9233_1d054c0cf197.slice. Oct 2 19:37:30.716579 kubelet[2463]: I1002 19:37:30.716552 2463 topology_manager.go:205] "Topology Admit Handler" Oct 2 19:37:30.722643 systemd[1]: Created slice kubepods-besteffort-pod9db93d66_a5b1_4650_8909_6c7dd8f8180f.slice. Oct 2 19:37:30.738222 kubelet[2463]: I1002 19:37:30.738199 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t8xsv\" (UniqueName: \"kubernetes.io/projected/4f76841c-7b97-4f9f-9233-1d054c0cf197-kube-api-access-t8xsv\") pod \"calico-apiserver-6954bc65f6-kvgmt\" (UID: \"4f76841c-7b97-4f9f-9233-1d054c0cf197\") " pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" Oct 2 19:37:30.738492 kubelet[2463]: I1002 19:37:30.738432 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wn5cl\" (UniqueName: \"kubernetes.io/projected/9db93d66-a5b1-4650-8909-6c7dd8f8180f-kube-api-access-wn5cl\") pod \"calico-apiserver-6954bc65f6-zkktv\" (UID: \"9db93d66-a5b1-4650-8909-6c7dd8f8180f\") " pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" Oct 2 19:37:30.738678 kubelet[2463]: I1002 19:37:30.738656 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4f76841c-7b97-4f9f-9233-1d054c0cf197-calico-apiserver-certs\") pod \"calico-apiserver-6954bc65f6-kvgmt\" (UID: \"4f76841c-7b97-4f9f-9233-1d054c0cf197\") " pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" Oct 2 19:37:30.738886 kubelet[2463]: I1002 19:37:30.738862 2463 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9db93d66-a5b1-4650-8909-6c7dd8f8180f-calico-apiserver-certs\") pod \"calico-apiserver-6954bc65f6-zkktv\" (UID: \"9db93d66-a5b1-4650-8909-6c7dd8f8180f\") " pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" Oct 2 19:37:30.807000 audit[4753]: NETFILTER_CFG table=filter:130 family=2 entries=7 op=nft_register_rule pid=4753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:30.807000 audit[4753]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff3820bc70 a2=0 a3=7fff3820bc5c items=0 ppid=2663 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:30.807000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:30.811000 audit[4753]: NETFILTER_CFG table=nat:131 family=2 entries=78 op=nft_register_rule pid=4753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:30.811000 audit[4753]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff3820bc70 a2=0 a3=7fff3820bc5c items=0 ppid=2663 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:30.811000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:30.839547 kubelet[2463]: E1002 19:37:30.839517 2463 secret.go:192] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Oct 2 19:37:30.839823 kubelet[2463]: E1002 19:37:30.839807 2463 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/4f76841c-7b97-4f9f-9233-1d054c0cf197-calico-apiserver-certs podName:4f76841c-7b97-4f9f-9233-1d054c0cf197 nodeName:}" failed. No retries permitted until 2023-10-02 19:37:31.339766999 +0000 UTC m=+65.377712705 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/4f76841c-7b97-4f9f-9233-1d054c0cf197-calico-apiserver-certs") pod "calico-apiserver-6954bc65f6-kvgmt" (UID: "4f76841c-7b97-4f9f-9233-1d054c0cf197") : secret "calico-apiserver-certs" not found Oct 2 19:37:30.840364 kubelet[2463]: E1002 19:37:30.840344 2463 secret.go:192] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Oct 2 19:37:30.840517 kubelet[2463]: E1002 19:37:30.840508 2463 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/9db93d66-a5b1-4650-8909-6c7dd8f8180f-calico-apiserver-certs podName:9db93d66-a5b1-4650-8909-6c7dd8f8180f nodeName:}" failed. No retries permitted until 2023-10-02 19:37:31.340492093 +0000 UTC m=+65.378437799 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/9db93d66-a5b1-4650-8909-6c7dd8f8180f-calico-apiserver-certs") pod "calico-apiserver-6954bc65f6-zkktv" (UID: "9db93d66-a5b1-4650-8909-6c7dd8f8180f") : secret "calico-apiserver-certs" not found Oct 2 19:37:30.882000 audit[4781]: NETFILTER_CFG table=filter:132 family=2 entries=8 op=nft_register_rule pid=4781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:30.882000 audit[4781]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffc3ffdd7e0 a2=0 a3=7ffc3ffdd7cc items=0 ppid=2663 pid=4781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:30.882000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:30.884000 audit[4781]: NETFILTER_CFG table=nat:133 family=2 entries=78 op=nft_register_rule pid=4781 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:30.884000 audit[4781]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc3ffdd7e0 a2=0 a3=7ffc3ffdd7cc items=0 ppid=2663 pid=4781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:30.884000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:31.600404 env[1342]: time="2023-10-02T19:37:31.600353102Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6954bc65f6-kvgmt,Uid:4f76841c-7b97-4f9f-9233-1d054c0cf197,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:37:31.625590 env[1342]: time="2023-10-02T19:37:31.625548300Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6954bc65f6-zkktv,Uid:9db93d66-a5b1-4650-8909-6c7dd8f8180f,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:37:31.795166 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:37:31.802908 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicb775543961: link becomes ready Oct 2 19:37:31.823184 systemd-networkd[1472]: calicb775543961: Link UP Oct 2 19:37:31.823192 systemd-networkd[1472]: calicb775543961: Gained carrier Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.705 [INFO][4786] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--kvgmt-eth0 calico-apiserver-6954bc65f6- calico-apiserver 4f76841c-7b97-4f9f-9233-1d054c0cf197 825 0 2023-10-02 19:37:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6954bc65f6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-58c23d0da1 calico-apiserver-6954bc65f6-kvgmt eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calicb775543961 [] []}} ContainerID="bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-kvgmt" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--kvgmt-" Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.705 [INFO][4786] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-kvgmt" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--kvgmt-eth0" Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.746 [INFO][4812] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" HandleID="k8s-pod-network.bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--kvgmt-eth0" Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.756 [INFO][4812] ipam_plugin.go 269: Auto assigning IP ContainerID="bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" HandleID="k8s-pod-network.bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--kvgmt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a3e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-58c23d0da1", "pod":"calico-apiserver-6954bc65f6-kvgmt", "timestamp":"2023-10-02 19:37:31.74677733 +0000 UTC"}, Hostname:"ci-3510.3.0-a-58c23d0da1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:37:31.836200 env[1342]: time="2023-10-02T19:37:31Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:31.836200 env[1342]: time="2023-10-02T19:37:31Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.757 [INFO][4812] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-58c23d0da1' Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.758 [INFO][4812] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.762 [INFO][4812] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.766 [INFO][4812] ipam.go 489: Trying affinity for 192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.768 [INFO][4812] ipam.go 155: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.771 [INFO][4812] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.771 [INFO][4812] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.773 [INFO][4812] ipam.go 1682: Creating new handle: k8s-pod-network.bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831 Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.777 [INFO][4812] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.786 [INFO][4812] ipam.go 1216: Successfully claimed IPs: [192.168.34.197/26] block=192.168.34.192/26 handle="k8s-pod-network.bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.786 [INFO][4812] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.197/26] handle="k8s-pod-network.bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.836200 env[1342]: time="2023-10-02T19:37:31Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:31.836200 env[1342]: 2023-10-02 19:37:31.786 [INFO][4812] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.34.197/26] IPv6=[] ContainerID="bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" HandleID="k8s-pod-network.bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--kvgmt-eth0" Oct 2 19:37:31.837014 env[1342]: 2023-10-02 19:37:31.787 [INFO][4786] k8s.go 383: Populated endpoint ContainerID="bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-kvgmt" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--kvgmt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--kvgmt-eth0", GenerateName:"calico-apiserver-6954bc65f6-", Namespace:"calico-apiserver", SelfLink:"", UID:"4f76841c-7b97-4f9f-9233-1d054c0cf197", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 37, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6954bc65f6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"", Pod:"calico-apiserver-6954bc65f6-kvgmt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicb775543961", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:31.837014 env[1342]: 2023-10-02 19:37:31.787 [INFO][4786] k8s.go 384: Calico CNI using IPs: [192.168.34.197/32] ContainerID="bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-kvgmt" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--kvgmt-eth0" Oct 2 19:37:31.837014 env[1342]: 2023-10-02 19:37:31.787 [INFO][4786] dataplane_linux.go 68: Setting the host side veth name to calicb775543961 ContainerID="bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-kvgmt" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--kvgmt-eth0" Oct 2 19:37:31.837014 env[1342]: 2023-10-02 19:37:31.803 [INFO][4786] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-kvgmt" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--kvgmt-eth0" Oct 2 19:37:31.837014 env[1342]: 2023-10-02 19:37:31.822 [INFO][4786] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-kvgmt" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--kvgmt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--kvgmt-eth0", GenerateName:"calico-apiserver-6954bc65f6-", Namespace:"calico-apiserver", SelfLink:"", UID:"4f76841c-7b97-4f9f-9233-1d054c0cf197", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 37, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6954bc65f6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831", Pod:"calico-apiserver-6954bc65f6-kvgmt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicb775543961", MAC:"9e:7c:b0:47:07:f1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:31.837014 env[1342]: 2023-10-02 19:37:31.835 [INFO][4786] k8s.go 489: Wrote updated endpoint to datastore ContainerID="bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-kvgmt" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--kvgmt-eth0" Oct 2 19:37:31.870921 env[1342]: time="2023-10-02T19:37:31.869196451Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:37:31.882008 env[1342]: time="2023-10-02T19:37:31.881909649Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:37:31.882008 env[1342]: time="2023-10-02T19:37:31.881938349Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:37:31.883555 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib677d5db3fa: link becomes ready Oct 2 19:37:31.884699 env[1342]: time="2023-10-02T19:37:31.884628827Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831 pid=4846 runtime=io.containerd.runc.v2 Oct 2 19:37:31.892033 systemd-networkd[1472]: calib677d5db3fa: Link UP Oct 2 19:37:31.892041 systemd-networkd[1472]: calib677d5db3fa: Gained carrier Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.735 [INFO][4798] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--zkktv-eth0 calico-apiserver-6954bc65f6- calico-apiserver 9db93d66-a5b1-4650-8909-6c7dd8f8180f 830 0 2023-10-02 19:37:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6954bc65f6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-58c23d0da1 calico-apiserver-6954bc65f6-zkktv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib677d5db3fa [] []}} ContainerID="fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-zkktv" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--zkktv-" Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.736 [INFO][4798] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-zkktv" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--zkktv-eth0" Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.802 [INFO][4818] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" HandleID="k8s-pod-network.fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--zkktv-eth0" Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.824 [INFO][4818] ipam_plugin.go 269: Auto assigning IP ContainerID="fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" HandleID="k8s-pod-network.fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--zkktv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00010a3e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-58c23d0da1", "pod":"calico-apiserver-6954bc65f6-zkktv", "timestamp":"2023-10-02 19:37:31.796469533 +0000 UTC"}, Hostname:"ci-3510.3.0-a-58c23d0da1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:37:31.912390 env[1342]: time="2023-10-02T19:37:31Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:37:31.912390 env[1342]: time="2023-10-02T19:37:31Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.824 [INFO][4818] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-58c23d0da1' Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.826 [INFO][4818] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.831 [INFO][4818] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.844 [INFO][4818] ipam.go 489: Trying affinity for 192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.847 [INFO][4818] ipam.go 155: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.850 [INFO][4818] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.851 [INFO][4818] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.852 [INFO][4818] ipam.go 1682: Creating new handle: k8s-pod-network.fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555 Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.859 [INFO][4818] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.871 [INFO][4818] ipam.go 1216: Successfully claimed IPs: [192.168.34.198/26] block=192.168.34.192/26 handle="k8s-pod-network.fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.871 [INFO][4818] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.198/26] handle="k8s-pod-network.fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" host="ci-3510.3.0-a-58c23d0da1" Oct 2 19:37:31.912390 env[1342]: time="2023-10-02T19:37:31Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:37:31.912390 env[1342]: 2023-10-02 19:37:31.871 [INFO][4818] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.34.198/26] IPv6=[] ContainerID="fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" HandleID="k8s-pod-network.fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" Workload="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--zkktv-eth0" Oct 2 19:37:31.913870 env[1342]: 2023-10-02 19:37:31.875 [INFO][4798] k8s.go 383: Populated endpoint ContainerID="fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-zkktv" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--zkktv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--zkktv-eth0", GenerateName:"calico-apiserver-6954bc65f6-", Namespace:"calico-apiserver", SelfLink:"", UID:"9db93d66-a5b1-4650-8909-6c7dd8f8180f", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 37, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6954bc65f6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"", Pod:"calico-apiserver-6954bc65f6-zkktv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib677d5db3fa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:31.913870 env[1342]: 2023-10-02 19:37:31.875 [INFO][4798] k8s.go 384: Calico CNI using IPs: [192.168.34.198/32] ContainerID="fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-zkktv" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--zkktv-eth0" Oct 2 19:37:31.913870 env[1342]: 2023-10-02 19:37:31.875 [INFO][4798] dataplane_linux.go 68: Setting the host side veth name to calib677d5db3fa ContainerID="fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-zkktv" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--zkktv-eth0" Oct 2 19:37:31.913870 env[1342]: 2023-10-02 19:37:31.882 [INFO][4798] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-zkktv" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--zkktv-eth0" Oct 2 19:37:31.913870 env[1342]: 2023-10-02 19:37:31.892 [INFO][4798] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-zkktv" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--zkktv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--zkktv-eth0", GenerateName:"calico-apiserver-6954bc65f6-", Namespace:"calico-apiserver", SelfLink:"", UID:"9db93d66-a5b1-4650-8909-6c7dd8f8180f", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 37, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6954bc65f6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-58c23d0da1", ContainerID:"fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555", Pod:"calico-apiserver-6954bc65f6-zkktv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib677d5db3fa", MAC:"6a:1a:a0:22:ec:73", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:37:31.913870 env[1342]: 2023-10-02 19:37:31.905 [INFO][4798] k8s.go 489: Wrote updated endpoint to datastore ContainerID="fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555" Namespace="calico-apiserver" Pod="calico-apiserver-6954bc65f6-zkktv" WorkloadEndpoint="ci--3510.3.0--a--58c23d0da1-k8s-calico--apiserver--6954bc65f6--zkktv-eth0" Oct 2 19:37:31.946921 systemd[1]: run-containerd-runc-k8s.io-bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831-runc.FH27Ag.mount: Deactivated successfully. Oct 2 19:37:31.951286 systemd[1]: Started cri-containerd-bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831.scope. Oct 2 19:37:31.961396 env[1342]: time="2023-10-02T19:37:31.961319914Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:37:31.961536 env[1342]: time="2023-10-02T19:37:31.961409113Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:37:31.961536 env[1342]: time="2023-10-02T19:37:31.961437413Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:37:31.961638 env[1342]: time="2023-10-02T19:37:31.961588512Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555 pid=4889 runtime=io.containerd.runc.v2 Oct 2 19:37:31.965000 audit[4885]: NETFILTER_CFG table=filter:134 family=2 entries=59 op=nft_register_chain pid=4885 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:37:31.965000 audit[4885]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffc99633f50 a2=0 a3=7ffc99633f3c items=0 ppid=3612 pid=4885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:31.965000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:37:31.976831 systemd[1]: Started cri-containerd-fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555.scope. Oct 2 19:37:31.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit: BPF prog-id=175 op=LOAD Oct 2 19:37:31.999000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[4859]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4846 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:31.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264326564373363386166353237396236666431393764343035353739 Oct 2 19:37:31.999000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[4859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4846 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:31.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264326564373363386166353237396236666431393764343035353739 Oct 2 19:37:31.999000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:31.999000 audit: BPF prog-id=176 op=LOAD Oct 2 19:37:31.999000 audit[4859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000308d40 items=0 ppid=4846 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:31.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264326564373363386166353237396236666431393764343035353739 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit: BPF prog-id=177 op=LOAD Oct 2 19:37:32.000000 audit[4859]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000308d88 items=0 ppid=4846 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:32.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264326564373363386166353237396236666431393764343035353739 Oct 2 19:37:32.000000 audit: BPF prog-id=177 op=UNLOAD Oct 2 19:37:32.000000 audit: BPF prog-id=176 op=UNLOAD Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.000000 audit: BPF prog-id=178 op=LOAD Oct 2 19:37:32.000000 audit[4859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000309198 items=0 ppid=4846 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:32.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264326564373363386166353237396236666431393764343035353739 Oct 2 19:37:32.017000 audit[4922]: NETFILTER_CFG table=filter:135 family=2 entries=50 op=nft_register_chain pid=4922 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:37:32.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.019000 audit: BPF prog-id=179 op=LOAD Oct 2 19:37:32.020000 audit[4898]: AVC avc: denied { bpf } for pid=4898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.020000 audit[4898]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4889 pid=4898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:32.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665316565303934646430616362303630643163306334396661643237 Oct 2 19:37:32.020000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.020000 audit[4898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4889 pid=4898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:32.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665316565303934646430616362303630643163306334396661643237 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { bpf } for pid=4898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { bpf } for pid=4898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { bpf } for pid=4898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { bpf } for pid=4898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { bpf } for pid=4898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit: BPF prog-id=180 op=LOAD Oct 2 19:37:32.021000 audit[4898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000216340 items=0 ppid=4889 pid=4898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:32.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665316565303934646430616362303630643163306334396661643237 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { bpf } for pid=4898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { bpf } for pid=4898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { bpf } for pid=4898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit[4898]: AVC avc: denied { bpf } for pid=4898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.021000 audit: BPF prog-id=181 op=LOAD Oct 2 19:37:32.021000 audit[4898]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000216388 items=0 ppid=4889 pid=4898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:32.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665316565303934646430616362303630643163306334396661643237 Oct 2 19:37:32.022000 audit: BPF prog-id=181 op=UNLOAD Oct 2 19:37:32.022000 audit: BPF prog-id=180 op=UNLOAD Oct 2 19:37:32.022000 audit[4898]: AVC avc: denied { bpf } for pid=4898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.022000 audit[4898]: AVC avc: denied { bpf } for pid=4898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.022000 audit[4898]: AVC avc: denied { bpf } for pid=4898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.022000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.022000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.022000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.022000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.022000 audit[4898]: AVC avc: denied { perfmon } for pid=4898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.022000 audit[4898]: AVC avc: denied { bpf } for pid=4898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.017000 audit[4922]: SYSCALL arch=c000003e syscall=46 success=yes exit=24496 a0=3 a1=7fff02d3fb50 a2=0 a3=7fff02d3fb3c items=0 ppid=3612 pid=4922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:32.017000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:37:32.022000 audit[4898]: AVC avc: denied { bpf } for pid=4898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:37:32.022000 audit: BPF prog-id=182 op=LOAD Oct 2 19:37:32.022000 audit[4898]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000216798 items=0 ppid=4889 pid=4898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:32.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665316565303934646430616362303630643163306334396661643237 Oct 2 19:37:32.043834 env[1342]: time="2023-10-02T19:37:32.043792657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6954bc65f6-kvgmt,Uid:4f76841c-7b97-4f9f-9233-1d054c0cf197,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"bd2ed73c8af5279b6fd197d40557997d6cf97973ff108fc51fd947c6141b4831\"" Oct 2 19:37:32.045601 env[1342]: time="2023-10-02T19:37:32.045572242Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:37:32.075312 env[1342]: time="2023-10-02T19:37:32.075275907Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6954bc65f6-zkktv,Uid:9db93d66-a5b1-4650-8909-6c7dd8f8180f,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"fe1ee094dd0acb060d1c0c49fad2752100579bbef235da1651f53d12db591555\"" Oct 2 19:37:32.364247 env[1342]: time="2023-10-02T19:37:32.364192615Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:37:32.367842 env[1342]: time="2023-10-02T19:37:32.367781986Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:37:32.368132 kubelet[2463]: E1002 19:37:32.368107 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:37:32.368540 kubelet[2463]: E1002 19:37:32.368156 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:37:32.368540 kubelet[2463]: E1002 19:37:32.368404 2463 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-t8xsv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6954bc65f6-kvgmt_calico-apiserver(4f76841c-7b97-4f9f-9233-1d054c0cf197): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:37:32.368540 kubelet[2463]: E1002 19:37:32.368455 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" podUID=4f76841c-7b97-4f9f-9233-1d054c0cf197 Oct 2 19:37:32.369723 env[1342]: time="2023-10-02T19:37:32.369684971Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:37:32.671173 env[1342]: time="2023-10-02T19:37:32.671036780Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:37:32.674055 env[1342]: time="2023-10-02T19:37:32.674001257Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:37:32.674242 kubelet[2463]: E1002 19:37:32.674220 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:37:32.674332 kubelet[2463]: E1002 19:37:32.674263 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:37:32.674431 kubelet[2463]: E1002 19:37:32.674412 2463 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wn5cl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6954bc65f6-zkktv_calico-apiserver(9db93d66-a5b1-4650-8909-6c7dd8f8180f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:37:32.674591 kubelet[2463]: E1002 19:37:32.674465 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" podUID=9db93d66-a5b1-4650-8909-6c7dd8f8180f Oct 2 19:37:33.004215 systemd-networkd[1472]: calib677d5db3fa: Gained IPv6LL Oct 2 19:37:33.260033 systemd-networkd[1472]: calicb775543961: Gained IPv6LL Oct 2 19:37:33.365429 kubelet[2463]: E1002 19:37:33.365398 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" podUID=9db93d66-a5b1-4650-8909-6c7dd8f8180f Oct 2 19:37:33.366043 kubelet[2463]: E1002 19:37:33.365774 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" podUID=4f76841c-7b97-4f9f-9233-1d054c0cf197 Oct 2 19:37:33.426000 audit[4963]: NETFILTER_CFG table=filter:136 family=2 entries=8 op=nft_register_rule pid=4963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:33.433648 kernel: kauditd_printk_skb: 191 callbacks suppressed Oct 2 19:37:33.433746 kernel: audit: type=1325 audit(1696275453.426:1377): table=filter:136 family=2 entries=8 op=nft_register_rule pid=4963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:33.426000 audit[4963]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd04687920 a2=0 a3=7ffd0468790c items=0 ppid=2663 pid=4963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:33.466027 kernel: audit: type=1300 audit(1696275453.426:1377): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd04687920 a2=0 a3=7ffd0468790c items=0 ppid=2663 pid=4963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:33.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:33.477480 kernel: audit: type=1327 audit(1696275453.426:1377): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:33.477582 kernel: audit: type=1325 audit(1696275453.428:1378): table=nat:137 family=2 entries=78 op=nft_register_rule pid=4963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:33.428000 audit[4963]: NETFILTER_CFG table=nat:137 family=2 entries=78 op=nft_register_rule pid=4963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:33.428000 audit[4963]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd04687920 a2=0 a3=7ffd0468790c items=0 ppid=2663 pid=4963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:33.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:33.519381 kernel: audit: type=1300 audit(1696275453.428:1378): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd04687920 a2=0 a3=7ffd0468790c items=0 ppid=2663 pid=4963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:33.519453 kernel: audit: type=1327 audit(1696275453.428:1378): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:33.520906 kernel: audit: type=1325 audit(1696275453.486:1379): table=filter:138 family=2 entries=8 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:33.486000 audit[4989]: NETFILTER_CFG table=filter:138 family=2 entries=8 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:33.486000 audit[4989]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffda3c7aab0 a2=0 a3=7ffda3c7aa9c items=0 ppid=2663 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:33.550375 kernel: audit: type=1300 audit(1696275453.486:1379): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffda3c7aab0 a2=0 a3=7ffda3c7aa9c items=0 ppid=2663 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:33.486000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:33.560721 kernel: audit: type=1327 audit(1696275453.486:1379): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:33.561499 kernel: audit: type=1325 audit(1696275453.490:1380): table=nat:139 family=2 entries=78 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:33.490000 audit[4989]: NETFILTER_CFG table=nat:139 family=2 entries=78 op=nft_register_rule pid=4989 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:37:33.490000 audit[4989]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffda3c7aab0 a2=0 a3=7ffda3c7aa9c items=0 ppid=2663 pid=4989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:37:33.490000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:37:36.139866 env[1342]: time="2023-10-02T19:37:36.139014381Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:37:36.461841 env[1342]: time="2023-10-02T19:37:36.461768101Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:37:36.465705 env[1342]: time="2023-10-02T19:37:36.465648071Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:37:36.466002 kubelet[2463]: E1002 19:37:36.465976 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:37:36.466432 kubelet[2463]: E1002 19:37:36.466028 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:37:36.466432 kubelet[2463]: E1002 19:37:36.466165 2463 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-xlc4s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-rsg2v_calico-system(a5d62a24-4dd0-4595-85ba-03387a0bd553): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:37:36.468217 env[1342]: time="2023-10-02T19:37:36.468152452Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:37:36.780924 env[1342]: time="2023-10-02T19:37:36.778412667Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:37:36.782391 env[1342]: time="2023-10-02T19:37:36.782333737Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:37:36.782668 kubelet[2463]: E1002 19:37:36.782645 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:37:36.782764 kubelet[2463]: E1002 19:37:36.782695 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:37:36.782822 kubelet[2463]: E1002 19:37:36.782810 2463 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-xlc4s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-rsg2v_calico-system(a5d62a24-4dd0-4595-85ba-03387a0bd553): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:37:36.782960 kubelet[2463]: E1002 19:37:36.782903 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:37:45.138387 env[1342]: time="2023-10-02T19:37:45.138262401Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:37:45.452091 env[1342]: time="2023-10-02T19:37:45.452023133Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:37:45.456558 env[1342]: time="2023-10-02T19:37:45.456488801Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:37:45.456834 kubelet[2463]: E1002 19:37:45.456813 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:37:45.457300 kubelet[2463]: E1002 19:37:45.456858 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:37:45.457300 kubelet[2463]: E1002 19:37:45.457070 2463 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-t8xsv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6954bc65f6-kvgmt_calico-apiserver(4f76841c-7b97-4f9f-9233-1d054c0cf197): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:37:45.457300 kubelet[2463]: E1002 19:37:45.457128 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" podUID=4f76841c-7b97-4f9f-9233-1d054c0cf197 Oct 2 19:37:46.139140 env[1342]: time="2023-10-02T19:37:46.139025472Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:37:46.425159 env[1342]: time="2023-10-02T19:37:46.425105916Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:37:46.428639 env[1342]: time="2023-10-02T19:37:46.428599291Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:37:46.428862 kubelet[2463]: E1002 19:37:46.428840 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:37:46.428959 kubelet[2463]: E1002 19:37:46.428895 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:37:46.429059 kubelet[2463]: E1002 19:37:46.429041 2463 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wn5cl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6954bc65f6-zkktv_calico-apiserver(9db93d66-a5b1-4650-8909-6c7dd8f8180f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:37:46.429215 kubelet[2463]: E1002 19:37:46.429102 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" podUID=9db93d66-a5b1-4650-8909-6c7dd8f8180f Oct 2 19:37:52.138477 kubelet[2463]: E1002 19:37:52.138419 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:37:57.137376 kubelet[2463]: E1002 19:37:57.137339 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" podUID=9db93d66-a5b1-4650-8909-6c7dd8f8180f Oct 2 19:37:57.861793 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.ECHBLh.mount: Deactivated successfully. Oct 2 19:37:58.853609 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.GbEwfK.mount: Deactivated successfully. Oct 2 19:38:00.137977 kubelet[2463]: E1002 19:38:00.137948 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" podUID=4f76841c-7b97-4f9f-9233-1d054c0cf197 Oct 2 19:38:04.140351 env[1342]: time="2023-10-02T19:38:04.140258592Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:38:04.421636 env[1342]: time="2023-10-02T19:38:04.421454180Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:38:04.425401 env[1342]: time="2023-10-02T19:38:04.424773412Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:38:04.425612 kubelet[2463]: E1002 19:38:04.425076 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:38:04.425612 kubelet[2463]: E1002 19:38:04.425123 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:38:04.425612 kubelet[2463]: E1002 19:38:04.425251 2463 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-xlc4s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-rsg2v_calico-system(a5d62a24-4dd0-4595-85ba-03387a0bd553): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:38:04.426551 env[1342]: time="2023-10-02T19:38:04.426475779Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:38:04.734898 env[1342]: time="2023-10-02T19:38:04.734783846Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:38:04.740390 env[1342]: time="2023-10-02T19:38:04.740335267Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:38:04.740641 kubelet[2463]: E1002 19:38:04.740610 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:38:04.740754 kubelet[2463]: E1002 19:38:04.740662 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:38:04.740818 kubelet[2463]: E1002 19:38:04.740795 2463 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-xlc4s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-rsg2v_calico-system(a5d62a24-4dd0-4595-85ba-03387a0bd553): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:38:04.740971 kubelet[2463]: E1002 19:38:04.740863 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:38:07.862526 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.T0uTrs.mount: Deactivated successfully. Oct 2 19:38:08.854992 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.9sDxvF.mount: Deactivated successfully. Oct 2 19:38:11.138722 env[1342]: time="2023-10-02T19:38:11.138244220Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:38:11.447296 env[1342]: time="2023-10-02T19:38:11.447235910Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:38:11.451063 env[1342]: time="2023-10-02T19:38:11.451016444Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:38:11.451253 kubelet[2463]: E1002 19:38:11.451231 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:38:11.451622 kubelet[2463]: E1002 19:38:11.451267 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:38:11.451854 kubelet[2463]: E1002 19:38:11.451826 2463 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wn5cl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6954bc65f6-zkktv_calico-apiserver(9db93d66-a5b1-4650-8909-6c7dd8f8180f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:38:11.452028 kubelet[2463]: E1002 19:38:11.451913 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" podUID=9db93d66-a5b1-4650-8909-6c7dd8f8180f Oct 2 19:38:12.139847 env[1342]: time="2023-10-02T19:38:12.139794266Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:38:12.624332 env[1342]: time="2023-10-02T19:38:12.624253522Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:38:12.632735 env[1342]: time="2023-10-02T19:38:12.632682617Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:38:12.632944 kubelet[2463]: E1002 19:38:12.632920 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:38:12.633295 kubelet[2463]: E1002 19:38:12.632967 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:38:12.633295 kubelet[2463]: E1002 19:38:12.633106 2463 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-t8xsv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6954bc65f6-kvgmt_calico-apiserver(4f76841c-7b97-4f9f-9233-1d054c0cf197): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:38:12.633295 kubelet[2463]: E1002 19:38:12.633154 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" podUID=4f76841c-7b97-4f9f-9233-1d054c0cf197 Oct 2 19:38:17.860809 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.7hAfBo.mount: Deactivated successfully. Oct 2 19:38:17.894467 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.x4Pqk0.mount: Deactivated successfully. Oct 2 19:38:18.143796 kubelet[2463]: E1002 19:38:18.143684 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:38:21.616000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:21.622451 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 19:38:21.622638 kernel: audit: type=1400 audit(1696275501.616:1381): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:21.616000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:21.666158 kernel: audit: type=1400 audit(1696275501.616:1382): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:21.666336 kernel: audit: type=1300 audit(1696275501.616:1381): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c002b77ad0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:38:21.616000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c002b77ad0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:38:21.616000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:38:21.689930 kernel: audit: type=1327 audit(1696275501.616:1381): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:38:21.616000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=12 a1=c002b9dae0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:38:21.729306 kernel: audit: type=1300 audit(1696275501.616:1382): arch=c000003e syscall=254 success=no exit=-13 a0=12 a1=c002b9dae0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:38:21.616000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:38:21.747126 kernel: audit: type=1327 audit(1696275501.616:1382): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:38:22.584000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:22.584000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:22.620719 kernel: audit: type=1400 audit(1696275502.584:1384): avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:22.620846 kernel: audit: type=1400 audit(1696275502.584:1383): avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:22.620900 kernel: audit: type=1300 audit(1696275502.584:1383): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00187ed00 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:38:22.584000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00187ed00 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:38:22.642012 kernel: audit: type=1327 audit(1696275502.584:1383): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:38:22.584000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:38:22.584000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c014e35fb0 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:38:22.584000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:38:22.593000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7137 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:22.593000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c015478000 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:38:22.593000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:38:22.608000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:22.608000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c015478060 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:38:22.608000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:38:22.702000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:22.702000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00187ee80 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:38:22.702000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:38:22.703000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:22.703000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c015478240 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:38:22.703000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:38:23.137334 kubelet[2463]: E1002 19:38:23.137305 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" podUID=4f76841c-7b97-4f9f-9233-1d054c0cf197 Oct 2 19:38:25.137384 kubelet[2463]: E1002 19:38:25.137346 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" podUID=9db93d66-a5b1-4650-8909-6c7dd8f8180f Oct 2 19:38:27.864703 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.GooJcv.mount: Deactivated successfully. Oct 2 19:38:27.955000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:27.961363 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 19:38:27.961477 kernel: audit: type=1400 audit(1696275507.955:1389): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:27.955000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c002b9cd80 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:38:28.006488 kernel: audit: type=1300 audit(1696275507.955:1389): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c002b9cd80 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:38:28.007928 kernel: audit: type=1327 audit(1696275507.955:1389): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:38:27.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:38:27.955000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:28.027024 kernel: audit: type=1400 audit(1696275507.955:1390): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:27.955000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=13 a1=c002b9cdc0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:38:28.073410 kernel: audit: type=1300 audit(1696275507.955:1390): arch=c000003e syscall=254 success=no exit=-13 a0=13 a1=c002b9cdc0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:38:28.075227 kernel: audit: type=1327 audit(1696275507.955:1390): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:38:27.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:38:28.095950 kernel: audit: type=1400 audit(1696275507.957:1391): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:27.957000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:27.957000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c002b74780 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:38:28.116315 kernel: audit: type=1300 audit(1696275507.957:1391): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c002b74780 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:38:28.143585 kernel: audit: type=1327 audit(1696275507.957:1391): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:38:27.957000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:38:27.957000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:28.187563 kernel: audit: type=1400 audit(1696275507.957:1392): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:38:27.957000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c002b747c0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:38:27.957000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:38:29.139020 kubelet[2463]: E1002 19:38:29.138980 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:38:36.138133 kubelet[2463]: E1002 19:38:36.138090 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" podUID=4f76841c-7b97-4f9f-9233-1d054c0cf197 Oct 2 19:38:37.864033 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.jdhQFY.mount: Deactivated successfully. Oct 2 19:38:37.890384 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.pSupeI.mount: Deactivated successfully. Oct 2 19:38:38.140385 kubelet[2463]: E1002 19:38:38.140254 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" podUID=9db93d66-a5b1-4650-8909-6c7dd8f8180f Oct 2 19:38:43.138211 kubelet[2463]: E1002 19:38:43.138177 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:38:47.859243 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.WIVeOl.mount: Deactivated successfully. Oct 2 19:38:48.854391 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.RaWip1.mount: Deactivated successfully. Oct 2 19:38:49.138057 kubelet[2463]: E1002 19:38:49.137564 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" podUID=4f76841c-7b97-4f9f-9233-1d054c0cf197 Oct 2 19:38:50.137517 kubelet[2463]: E1002 19:38:50.137473 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" podUID=9db93d66-a5b1-4650-8909-6c7dd8f8180f Oct 2 19:38:57.138045 env[1342]: time="2023-10-02T19:38:57.137995012Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:38:57.452685 env[1342]: time="2023-10-02T19:38:57.452614231Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:38:57.459114 env[1342]: time="2023-10-02T19:38:57.459062940Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:38:57.459376 kubelet[2463]: E1002 19:38:57.459341 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:38:57.459746 kubelet[2463]: E1002 19:38:57.459398 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:38:57.459746 kubelet[2463]: E1002 19:38:57.459518 2463 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-xlc4s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-rsg2v_calico-system(a5d62a24-4dd0-4595-85ba-03387a0bd553): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:38:57.460662 env[1342]: time="2023-10-02T19:38:57.460632567Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:38:57.761275 env[1342]: time="2023-10-02T19:38:57.761131448Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:38:57.765441 env[1342]: time="2023-10-02T19:38:57.765363820Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:38:57.765749 kubelet[2463]: E1002 19:38:57.765722 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:38:57.765899 kubelet[2463]: E1002 19:38:57.765775 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:38:57.766036 kubelet[2463]: E1002 19:38:57.765980 2463 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-xlc4s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-rsg2v_calico-system(a5d62a24-4dd0-4595-85ba-03387a0bd553): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:38:57.766203 kubelet[2463]: E1002 19:38:57.766064 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:38:57.863425 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.QTYhAg.mount: Deactivated successfully. Oct 2 19:38:57.891183 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.LajUrW.mount: Deactivated successfully. Oct 2 19:39:00.138592 env[1342]: time="2023-10-02T19:39:00.138536019Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:39:00.445323 env[1342]: time="2023-10-02T19:39:00.445246956Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:39:00.449507 env[1342]: time="2023-10-02T19:39:00.449453124Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:39:00.449760 kubelet[2463]: E1002 19:39:00.449735 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:39:00.450190 kubelet[2463]: E1002 19:39:00.449783 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:39:00.450190 kubelet[2463]: E1002 19:39:00.449976 2463 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-t8xsv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6954bc65f6-kvgmt_calico-apiserver(4f76841c-7b97-4f9f-9233-1d054c0cf197): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:39:00.450190 kubelet[2463]: E1002 19:39:00.450027 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" podUID=4f76841c-7b97-4f9f-9233-1d054c0cf197 Oct 2 19:39:04.137965 env[1342]: time="2023-10-02T19:39:04.137918415Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:39:04.445174 env[1342]: time="2023-10-02T19:39:04.445098647Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:39:04.448197 env[1342]: time="2023-10-02T19:39:04.448132592Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:39:04.448446 kubelet[2463]: E1002 19:39:04.448410 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:39:04.448866 kubelet[2463]: E1002 19:39:04.448467 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:39:04.448866 kubelet[2463]: E1002 19:39:04.448620 2463 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-wn5cl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6954bc65f6-zkktv_calico-apiserver(9db93d66-a5b1-4650-8909-6c7dd8f8180f): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:39:04.448866 kubelet[2463]: E1002 19:39:04.448685 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" podUID=9db93d66-a5b1-4650-8909-6c7dd8f8180f Oct 2 19:39:07.861937 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.bo9tYO.mount: Deactivated successfully. Oct 2 19:39:07.897385 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.qcoclM.mount: Deactivated successfully. Oct 2 19:39:08.142988 kubelet[2463]: E1002 19:39:08.142148 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:39:09.158641 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 19:39:09.158808 kernel: audit: type=1130 audit(1696275549.135:1393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.17:22-10.200.12.6:52850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:09.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.17:22-10.200.12.6:52850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:09.136000 systemd[1]: Started sshd@7-10.200.8.17:22-10.200.12.6:52850.service. Oct 2 19:39:09.762000 audit[5674]: USER_ACCT pid=5674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:09.763334 sshd[5674]: Accepted publickey for core from 10.200.12.6 port 52850 ssh2: RSA SHA256:QTj/0Yd7w+agvpAJ3ZvxSnjeGijkbUdqm8sftt8AuvE Oct 2 19:39:09.782000 audit[5674]: CRED_ACQ pid=5674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:09.784342 sshd[5674]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:39:09.795719 systemd[1]: Started session-10.scope. Oct 2 19:39:09.796821 systemd-logind[1320]: New session 10 of user core. Oct 2 19:39:09.803453 kernel: audit: type=1101 audit(1696275549.762:1394): pid=5674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:09.803535 kernel: audit: type=1103 audit(1696275549.782:1395): pid=5674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:09.782000 audit[5674]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9ee5eb80 a2=3 a3=0 items=0 ppid=1 pid=5674 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:39:09.815913 kernel: audit: type=1006 audit(1696275549.782:1396): pid=5674 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 19:39:09.815956 kernel: audit: type=1300 audit(1696275549.782:1396): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9ee5eb80 a2=3 a3=0 items=0 ppid=1 pid=5674 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:39:09.782000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:39:09.833898 kernel: audit: type=1327 audit(1696275549.782:1396): proctitle=737368643A20636F7265205B707269765D Oct 2 19:39:09.801000 audit[5674]: USER_START pid=5674 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:09.858628 kernel: audit: type=1105 audit(1696275549.801:1397): pid=5674 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:09.804000 audit[5676]: CRED_ACQ pid=5676 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:09.874911 kernel: audit: type=1103 audit(1696275549.804:1398): pid=5676 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:10.326094 sshd[5674]: pam_unix(sshd:session): session closed for user core Oct 2 19:39:10.326000 audit[5674]: USER_END pid=5674 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:10.330428 systemd[1]: sshd@7-10.200.8.17:22-10.200.12.6:52850.service: Deactivated successfully. Oct 2 19:39:10.331360 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:39:10.340336 systemd-logind[1320]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:39:10.341237 systemd-logind[1320]: Removed session 10. Oct 2 19:39:10.328000 audit[5674]: CRED_DISP pid=5674 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:10.365004 kernel: audit: type=1106 audit(1696275550.326:1399): pid=5674 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:10.365139 kernel: audit: type=1104 audit(1696275550.328:1400): pid=5674 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:10.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.17:22-10.200.12.6:52850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:15.137535 kubelet[2463]: E1002 19:39:15.137393 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" podUID=9db93d66-a5b1-4650-8909-6c7dd8f8180f Oct 2 19:39:15.138136 kubelet[2463]: E1002 19:39:15.137815 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" podUID=4f76841c-7b97-4f9f-9233-1d054c0cf197 Oct 2 19:39:17.895711 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.ZieGKO.mount: Deactivated successfully. Oct 2 19:39:20.455489 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:39:20.455658 kernel: audit: type=1130 audit(1696275560.431:1402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.17:22-10.200.12.6:55220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:20.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.17:22-10.200.12.6:55220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:20.432668 systemd[1]: Started sshd@8-10.200.8.17:22-10.200.12.6:55220.service. Oct 2 19:39:21.064000 audit[5752]: USER_ACCT pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:21.065636 sshd[5752]: Accepted publickey for core from 10.200.12.6 port 55220 ssh2: RSA SHA256:QTj/0Yd7w+agvpAJ3ZvxSnjeGijkbUdqm8sftt8AuvE Oct 2 19:39:21.067589 sshd[5752]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:39:21.090911 kernel: audit: type=1101 audit(1696275561.064:1403): pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:21.091014 kernel: audit: type=1103 audit(1696275561.066:1404): pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:21.066000 audit[5752]: CRED_ACQ pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:21.098139 systemd[1]: Started session-11.scope. Oct 2 19:39:21.100308 systemd-logind[1320]: New session 11 of user core. Oct 2 19:39:21.066000 audit[5752]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd551b3a80 a2=3 a3=0 items=0 ppid=1 pid=5752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:39:21.114895 kernel: audit: type=1006 audit(1696275561.066:1405): pid=5752 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 2 19:39:21.114941 kernel: audit: type=1300 audit(1696275561.066:1405): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd551b3a80 a2=3 a3=0 items=0 ppid=1 pid=5752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:39:21.066000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:39:21.103000 audit[5752]: USER_START pid=5752 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:21.140264 kubelet[2463]: E1002 19:39:21.140014 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:39:21.157086 kernel: audit: type=1327 audit(1696275561.066:1405): proctitle=737368643A20636F7265205B707269765D Oct 2 19:39:21.157203 kernel: audit: type=1105 audit(1696275561.103:1406): pid=5752 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:21.158331 kernel: audit: type=1103 audit(1696275561.103:1407): pid=5754 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:21.103000 audit[5754]: CRED_ACQ pid=5754 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:21.582808 sshd[5752]: pam_unix(sshd:session): session closed for user core Oct 2 19:39:21.583000 audit[5752]: USER_END pid=5752 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:21.588535 systemd[1]: sshd@8-10.200.8.17:22-10.200.12.6:55220.service: Deactivated successfully. Oct 2 19:39:21.589482 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:39:21.591217 systemd-logind[1320]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:39:21.592531 systemd-logind[1320]: Removed session 11. Oct 2 19:39:21.583000 audit[5752]: CRED_DISP pid=5752 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:21.620479 kernel: audit: type=1106 audit(1696275561.583:1408): pid=5752 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:21.620602 kernel: audit: type=1104 audit(1696275561.583:1409): pid=5752 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:21.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.17:22-10.200.12.6:55220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:21.620000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:21.620000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c00111dd40 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:39:21.620000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:39:21.622000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:21.622000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c0024a9940 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:39:21.622000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:39:22.586000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:22.586000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01268de60 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:39:22.586000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:39:22.586000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:22.586000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00ba1e200 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:39:22.586000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:39:22.594000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7137 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:22.594000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c012703a40 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:39:22.594000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:39:22.608000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:22.608000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c012703a70 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:39:22.608000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:39:22.703000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:22.703000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00ba1e340 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:39:22.703000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:39:22.704000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:22.704000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0128520f0 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:39:22.704000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:39:27.955000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:27.961266 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 19:39:27.961375 kernel: audit: type=1400 audit(1696275567.955:1419): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:27.955000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:27.994361 kernel: audit: type=1400 audit(1696275567.955:1420): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:27.994454 kernel: audit: type=1300 audit(1696275567.955:1420): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c002b0c380 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:39:27.955000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c002b0c380 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:39:27.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:39:27.955000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=f a1=c0026d3700 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:39:28.034926 kernel: audit: type=1327 audit(1696275567.955:1420): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:39:28.034996 kernel: audit: type=1300 audit(1696275567.955:1419): arch=c000003e syscall=254 success=no exit=-13 a0=f a1=c0026d3700 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:39:27.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:39:28.058954 kernel: audit: type=1327 audit(1696275567.955:1419): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:39:27.958000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:28.079014 kernel: audit: type=1400 audit(1696275567.958:1421): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:27.958000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c0026d3740 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:39:28.097001 kernel: audit: type=1300 audit(1696275567.958:1421): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c0026d3740 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:39:27.958000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:39:28.121227 kernel: audit: type=1327 audit(1696275567.958:1421): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:39:27.958000 audit[2350]: AVC avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:28.174920 kernel: audit: type=1400 audit(1696275567.958:1422): avc: denied { watch } for pid=2350 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:39:27.958000 audit[2350]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c0026d37a0 a2=fc6 a3=0 items=0 ppid=2224 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:39:27.958000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:39:28.175723 kubelet[2463]: E1002 19:39:28.175533 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" podUID=9db93d66-a5b1-4650-8909-6c7dd8f8180f Oct 2 19:39:28.206832 systemd[1]: run-containerd-runc-k8s.io-df8120feab5aecc942b7d4c641a3faf7fdbecb9effdf7a5b94f513f1d4dd06cb-runc.vCP8uQ.mount: Deactivated successfully. Oct 2 19:39:30.137840 kubelet[2463]: E1002 19:39:30.137806 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" podUID=4f76841c-7b97-4f9f-9233-1d054c0cf197 Oct 2 19:39:31.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.17:22-10.200.12.6:34382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:31.687139 systemd[1]: Started sshd@9-10.200.8.17:22-10.200.12.6:34382.service. Oct 2 19:39:32.138486 kubelet[2463]: E1002 19:39:32.138176 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:39:32.312000 audit[5840]: USER_ACCT pid=5840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:32.313646 sshd[5840]: Accepted publickey for core from 10.200.12.6 port 34382 ssh2: RSA SHA256:QTj/0Yd7w+agvpAJ3ZvxSnjeGijkbUdqm8sftt8AuvE Oct 2 19:39:32.314000 audit[5840]: CRED_ACQ pid=5840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:32.314000 audit[5840]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff22e06c60 a2=3 a3=0 items=0 ppid=1 pid=5840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:39:32.314000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:39:32.315675 sshd[5840]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:39:32.319937 systemd-logind[1320]: New session 12 of user core. Oct 2 19:39:32.320832 systemd[1]: Started session-12.scope. Oct 2 19:39:32.325000 audit[5840]: USER_START pid=5840 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:32.326000 audit[5842]: CRED_ACQ pid=5842 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:32.815375 sshd[5840]: pam_unix(sshd:session): session closed for user core Oct 2 19:39:32.815000 audit[5840]: USER_END pid=5840 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:32.816000 audit[5840]: CRED_DISP pid=5840 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:32.818827 systemd[1]: sshd@9-10.200.8.17:22-10.200.12.6:34382.service: Deactivated successfully. Oct 2 19:39:32.819992 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:39:32.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.17:22-10.200.12.6:34382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:32.820914 systemd-logind[1320]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:39:32.821871 systemd-logind[1320]: Removed session 12. Oct 2 19:39:37.858333 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.7sN8lx.mount: Deactivated successfully. Oct 2 19:39:38.853771 systemd[1]: run-containerd-runc-k8s.io-df8120feab5aecc942b7d4c641a3faf7fdbecb9effdf7a5b94f513f1d4dd06cb-runc.LzXiuM.mount: Deactivated successfully. Oct 2 19:39:42.137528 kubelet[2463]: E1002 19:39:42.137495 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" podUID=9db93d66-a5b1-4650-8909-6c7dd8f8180f Oct 2 19:39:42.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.17:22-10.200.12.6:47130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:42.927202 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 2 19:39:42.927270 kernel: audit: type=1130 audit(1696275582.921:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.17:22-10.200.12.6:47130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:42.921868 systemd[1]: Started sshd@10-10.200.8.17:22-10.200.12.6:47130.service. Oct 2 19:39:43.549000 audit[5926]: USER_ACCT pid=5926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:43.551249 sshd[5926]: Accepted publickey for core from 10.200.12.6 port 47130 ssh2: RSA SHA256:QTj/0Yd7w+agvpAJ3ZvxSnjeGijkbUdqm8sftt8AuvE Oct 2 19:39:43.570000 audit[5926]: CRED_ACQ pid=5926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:43.571929 sshd[5926]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:39:43.579792 systemd[1]: Started session-13.scope. Oct 2 19:39:43.580931 systemd-logind[1320]: New session 13 of user core. Oct 2 19:39:43.589783 kernel: audit: type=1101 audit(1696275583.549:1433): pid=5926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:43.589869 kernel: audit: type=1103 audit(1696275583.570:1434): pid=5926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:43.589976 kernel: audit: type=1006 audit(1696275583.570:1435): pid=5926 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 2 19:39:43.570000 audit[5926]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9259eba0 a2=3 a3=0 items=0 ppid=1 pid=5926 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:39:43.600951 kernel: audit: type=1300 audit(1696275583.570:1435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9259eba0 a2=3 a3=0 items=0 ppid=1 pid=5926 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:39:43.570000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:39:43.618918 kernel: audit: type=1327 audit(1696275583.570:1435): proctitle=737368643A20636F7265205B707269765D Oct 2 19:39:43.585000 audit[5926]: USER_START pid=5926 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:43.585000 audit[5928]: CRED_ACQ pid=5928 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:43.658276 kernel: audit: type=1105 audit(1696275583.585:1436): pid=5926 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:43.658394 kernel: audit: type=1103 audit(1696275583.585:1437): pid=5928 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:44.139144 kubelet[2463]: E1002 19:39:44.139107 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:39:44.291142 sshd[5926]: pam_unix(sshd:session): session closed for user core Oct 2 19:39:44.291000 audit[5926]: USER_END pid=5926 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:44.294460 systemd[1]: sshd@10-10.200.8.17:22-10.200.12.6:47130.service: Deactivated successfully. Oct 2 19:39:44.295248 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:39:44.296658 systemd-logind[1320]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:39:44.297572 systemd-logind[1320]: Removed session 13. Oct 2 19:39:44.312903 kernel: audit: type=1106 audit(1696275584.291:1438): pid=5926 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:44.292000 audit[5926]: CRED_DISP pid=5926 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:44.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.17:22-10.200.12.6:47130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:44.330280 kernel: audit: type=1104 audit(1696275584.292:1439): pid=5926 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:44.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.17:22-10.200.12.6:47132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:44.396147 systemd[1]: Started sshd@11-10.200.8.17:22-10.200.12.6:47132.service. Oct 2 19:39:45.031000 audit[5940]: USER_ACCT pid=5940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:45.032497 sshd[5940]: Accepted publickey for core from 10.200.12.6 port 47132 ssh2: RSA SHA256:QTj/0Yd7w+agvpAJ3ZvxSnjeGijkbUdqm8sftt8AuvE Oct 2 19:39:45.032000 audit[5940]: CRED_ACQ pid=5940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:45.032000 audit[5940]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9a9056a0 a2=3 a3=0 items=0 ppid=1 pid=5940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:39:45.032000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:39:45.034030 sshd[5940]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:39:45.038888 systemd[1]: Started session-14.scope. Oct 2 19:39:45.039328 systemd-logind[1320]: New session 14 of user core. Oct 2 19:39:45.043000 audit[5940]: USER_START pid=5940 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:45.044000 audit[5943]: CRED_ACQ pid=5943 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:45.136761 kubelet[2463]: E1002 19:39:45.136730 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" podUID=4f76841c-7b97-4f9f-9233-1d054c0cf197 Oct 2 19:39:46.737628 sshd[5940]: pam_unix(sshd:session): session closed for user core Oct 2 19:39:46.738000 audit[5940]: USER_END pid=5940 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:46.738000 audit[5940]: CRED_DISP pid=5940 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:46.741193 systemd[1]: sshd@11-10.200.8.17:22-10.200.12.6:47132.service: Deactivated successfully. Oct 2 19:39:46.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.17:22-10.200.12.6:47132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:46.742244 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 19:39:46.742944 systemd-logind[1320]: Session 14 logged out. Waiting for processes to exit. Oct 2 19:39:46.743828 systemd-logind[1320]: Removed session 14. Oct 2 19:39:46.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.17:22-10.200.12.6:47148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:46.843525 systemd[1]: Started sshd@12-10.200.8.17:22-10.200.12.6:47148.service. Oct 2 19:39:47.468000 audit[5951]: USER_ACCT pid=5951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:47.470144 sshd[5951]: Accepted publickey for core from 10.200.12.6 port 47148 ssh2: RSA SHA256:QTj/0Yd7w+agvpAJ3ZvxSnjeGijkbUdqm8sftt8AuvE Oct 2 19:39:47.470000 audit[5951]: CRED_ACQ pid=5951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:47.470000 audit[5951]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc30225730 a2=3 a3=0 items=0 ppid=1 pid=5951 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:39:47.470000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:39:47.471757 sshd[5951]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:39:47.478275 systemd[1]: Started session-15.scope. Oct 2 19:39:47.478964 systemd-logind[1320]: New session 15 of user core. Oct 2 19:39:47.485000 audit[5951]: USER_START pid=5951 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:47.486000 audit[5956]: CRED_ACQ pid=5956 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:48.053035 sshd[5951]: pam_unix(sshd:session): session closed for user core Oct 2 19:39:48.053000 audit[5951]: USER_END pid=5951 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:48.056738 systemd[1]: sshd@12-10.200.8.17:22-10.200.12.6:47148.service: Deactivated successfully. Oct 2 19:39:48.057718 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 19:39:48.059469 systemd-logind[1320]: Session 15 logged out. Waiting for processes to exit. Oct 2 19:39:48.060227 kernel: kauditd_printk_skb: 20 callbacks suppressed Oct 2 19:39:48.060265 kernel: audit: type=1106 audit(1696275588.053:1456): pid=5951 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:48.060967 systemd-logind[1320]: Removed session 15. Oct 2 19:39:48.054000 audit[5951]: CRED_DISP pid=5951 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:48.095469 kernel: audit: type=1104 audit(1696275588.054:1457): pid=5951 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:48.095565 kernel: audit: type=1131 audit(1696275588.056:1458): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.17:22-10.200.12.6:47148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:48.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.17:22-10.200.12.6:47148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:48.161348 systemd[1]: run-containerd-runc-k8s.io-df8120feab5aecc942b7d4c641a3faf7fdbecb9effdf7a5b94f513f1d4dd06cb-runc.Kll5JS.mount: Deactivated successfully. Oct 2 19:39:53.137423 kubelet[2463]: E1002 19:39:53.137381 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" podUID=9db93d66-a5b1-4650-8909-6c7dd8f8180f Oct 2 19:39:55.138797 kubelet[2463]: E1002 19:39:55.138717 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:39:57.883600 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.7mkOXW.mount: Deactivated successfully. Oct 2 19:39:58.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.17:22-10.200.12.6:56562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:58.160530 systemd[1]: Started sshd@13-10.200.8.17:22-10.200.12.6:56562.service. Oct 2 19:39:58.180115 kernel: audit: type=1130 audit(1696275598.158:1459): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.17:22-10.200.12.6:56562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:39:58.808000 audit[6080]: USER_ACCT pid=6080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:58.831081 kernel: audit: type=1101 audit(1696275598.808:1460): pid=6080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:58.811536 sshd[6080]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:39:58.831451 sshd[6080]: Accepted publickey for core from 10.200.12.6 port 56562 ssh2: RSA SHA256:QTj/0Yd7w+agvpAJ3ZvxSnjeGijkbUdqm8sftt8AuvE Oct 2 19:39:58.808000 audit[6080]: CRED_ACQ pid=6080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:58.837140 systemd[1]: Started session-16.scope. Oct 2 19:39:58.838488 systemd-logind[1320]: New session 16 of user core. Oct 2 19:39:58.858917 kernel: audit: type=1103 audit(1696275598.808:1461): pid=6080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:58.859029 kernel: audit: type=1006 audit(1696275598.808:1462): pid=6080 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Oct 2 19:39:58.808000 audit[6080]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8764bc90 a2=3 a3=0 items=0 ppid=1 pid=6080 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:39:58.859920 kernel: audit: type=1300 audit(1696275598.808:1462): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8764bc90 a2=3 a3=0 items=0 ppid=1 pid=6080 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:39:58.877018 kernel: audit: type=1327 audit(1696275598.808:1462): proctitle=737368643A20636F7265205B707269765D Oct 2 19:39:58.808000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:39:58.841000 audit[6080]: USER_START pid=6080 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:58.901562 kernel: audit: type=1105 audit(1696275598.841:1463): pid=6080 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:58.902425 kernel: audit: type=1103 audit(1696275598.841:1464): pid=6095 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:58.841000 audit[6095]: CRED_ACQ pid=6095 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:59.137862 kubelet[2463]: E1002 19:39:59.137747 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" podUID=4f76841c-7b97-4f9f-9233-1d054c0cf197 Oct 2 19:39:59.322975 sshd[6080]: pam_unix(sshd:session): session closed for user core Oct 2 19:39:59.322000 audit[6080]: USER_END pid=6080 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:59.326680 systemd-logind[1320]: Session 16 logged out. Waiting for processes to exit. Oct 2 19:39:59.327930 systemd[1]: sshd@13-10.200.8.17:22-10.200.12.6:56562.service: Deactivated successfully. Oct 2 19:39:59.328686 systemd[1]: session-16.scope: Deactivated successfully. Oct 2 19:39:59.329987 systemd-logind[1320]: Removed session 16. Oct 2 19:39:59.323000 audit[6080]: CRED_DISP pid=6080 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:59.361937 kernel: audit: type=1106 audit(1696275599.322:1465): pid=6080 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:59.362068 kernel: audit: type=1104 audit(1696275599.323:1466): pid=6080 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Oct 2 19:39:59.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.17:22-10.200.12.6:56562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:40:07.137364 kubelet[2463]: E1002 19:40:07.137326 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" podUID=9db93d66-a5b1-4650-8909-6c7dd8f8180f Oct 2 19:40:07.886098 systemd[1]: run-containerd-runc-k8s.io-b9e629a643dd1726b5254e25566d44e5483d528517b95262760960b735541b63-runc.xiLn2A.mount: Deactivated successfully. Oct 2 19:40:08.138363 kubelet[2463]: E1002 19:40:08.138165 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:40:08.855482 systemd[1]: run-containerd-runc-k8s.io-df8120feab5aecc942b7d4c641a3faf7fdbecb9effdf7a5b94f513f1d4dd06cb-runc.VeoV3z.mount: Deactivated successfully. Oct 2 19:40:10.136976 kubelet[2463]: E1002 19:40:10.136941 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" podUID=4f76841c-7b97-4f9f-9233-1d054c0cf197 Oct 2 19:40:13.782562 systemd[1]: cri-containerd-e10795f73ae2fc7b5c0d846b542f661da2595b8b624c1fe820db4d369fd7546b.scope: Deactivated successfully. Oct 2 19:40:13.782903 systemd[1]: cri-containerd-e10795f73ae2fc7b5c0d846b542f661da2595b8b624c1fe820db4d369fd7546b.scope: Consumed 1.726s CPU time. Oct 2 19:40:13.784000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:40:13.790627 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:40:13.790714 kernel: audit: type=1334 audit(1696275613.784:1468): prog-id=81 op=UNLOAD Oct 2 19:40:13.784000 audit: BPF prog-id=98 op=UNLOAD Oct 2 19:40:13.805947 kernel: audit: type=1334 audit(1696275613.784:1469): prog-id=98 op=UNLOAD Oct 2 19:40:13.817989 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e10795f73ae2fc7b5c0d846b542f661da2595b8b624c1fe820db4d369fd7546b-rootfs.mount: Deactivated successfully. Oct 2 19:40:13.841699 env[1342]: time="2023-10-02T19:40:13.841641842Z" level=info msg="shim disconnected" id=e10795f73ae2fc7b5c0d846b542f661da2595b8b624c1fe820db4d369fd7546b Oct 2 19:40:13.842205 env[1342]: time="2023-10-02T19:40:13.841700342Z" level=warning msg="cleaning up after shim disconnected" id=e10795f73ae2fc7b5c0d846b542f661da2595b8b624c1fe820db4d369fd7546b namespace=k8s.io Oct 2 19:40:13.842205 env[1342]: time="2023-10-02T19:40:13.841713242Z" level=info msg="cleaning up dead shim" Oct 2 19:40:13.850411 env[1342]: time="2023-10-02T19:40:13.850377383Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:40:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6188 runtime=io.containerd.runc.v2\n" Oct 2 19:40:14.067056 systemd[1]: cri-containerd-de8c3cf46ef40f3018a0754378c960dcdaee9eca4a65f0b7c81de16c15e78283.scope: Deactivated successfully. Oct 2 19:40:14.067435 systemd[1]: cri-containerd-de8c3cf46ef40f3018a0754378c960dcdaee9eca4a65f0b7c81de16c15e78283.scope: Consumed 2.776s CPU time. Oct 2 19:40:14.065000 audit: BPF prog-id=118 op=UNLOAD Oct 2 19:40:14.073894 kernel: audit: type=1334 audit(1696275614.065:1470): prog-id=118 op=UNLOAD Oct 2 19:40:14.072000 audit: BPF prog-id=121 op=UNLOAD Oct 2 19:40:14.079906 kernel: audit: type=1334 audit(1696275614.072:1471): prog-id=121 op=UNLOAD Oct 2 19:40:14.096148 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-de8c3cf46ef40f3018a0754378c960dcdaee9eca4a65f0b7c81de16c15e78283-rootfs.mount: Deactivated successfully. Oct 2 19:40:14.120180 env[1342]: time="2023-10-02T19:40:14.120115132Z" level=info msg="shim disconnected" id=de8c3cf46ef40f3018a0754378c960dcdaee9eca4a65f0b7c81de16c15e78283 Oct 2 19:40:14.120648 env[1342]: time="2023-10-02T19:40:14.120184432Z" level=warning msg="cleaning up after shim disconnected" id=de8c3cf46ef40f3018a0754378c960dcdaee9eca4a65f0b7c81de16c15e78283 namespace=k8s.io Oct 2 19:40:14.120648 env[1342]: time="2023-10-02T19:40:14.120199932Z" level=info msg="cleaning up dead shim" Oct 2 19:40:14.128200 env[1342]: time="2023-10-02T19:40:14.128086268Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:40:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6214 runtime=io.containerd.runc.v2\n" Oct 2 19:40:14.694810 kubelet[2463]: I1002 19:40:14.693259 2463 scope.go:115] "RemoveContainer" containerID="de8c3cf46ef40f3018a0754378c960dcdaee9eca4a65f0b7c81de16c15e78283" Oct 2 19:40:14.695886 env[1342]: time="2023-10-02T19:40:14.695835370Z" level=info msg="CreateContainer within sandbox \"a701d1411193c346b55512b5f0affbf3e846beecd944cddf6e874aaa05cd3804\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Oct 2 19:40:14.696758 kubelet[2463]: I1002 19:40:14.696707 2463 scope.go:115] "RemoveContainer" containerID="e10795f73ae2fc7b5c0d846b542f661da2595b8b624c1fe820db4d369fd7546b" Oct 2 19:40:14.698487 env[1342]: time="2023-10-02T19:40:14.698457682Z" level=info msg="CreateContainer within sandbox \"90229d3cab5882a40f9c11ed350c6b1c2d782282b00a63acfcd186f67f0f0c63\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Oct 2 19:40:14.768954 env[1342]: time="2023-10-02T19:40:14.768896405Z" level=info msg="CreateContainer within sandbox \"a701d1411193c346b55512b5f0affbf3e846beecd944cddf6e874aaa05cd3804\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"13d14686674009fccd19a35967e97510d10317b7f62e89851a7c69407c45aef8\"" Oct 2 19:40:14.769618 env[1342]: time="2023-10-02T19:40:14.769547608Z" level=info msg="StartContainer for \"13d14686674009fccd19a35967e97510d10317b7f62e89851a7c69407c45aef8\"" Oct 2 19:40:14.774844 env[1342]: time="2023-10-02T19:40:14.774803232Z" level=info msg="CreateContainer within sandbox \"90229d3cab5882a40f9c11ed350c6b1c2d782282b00a63acfcd186f67f0f0c63\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"41e72b8a8cc417295271b1bfcb245a5448058652bd5c46997169526da0e8edd6\"" Oct 2 19:40:14.775622 env[1342]: time="2023-10-02T19:40:14.775584736Z" level=info msg="StartContainer for \"41e72b8a8cc417295271b1bfcb245a5448058652bd5c46997169526da0e8edd6\"" Oct 2 19:40:14.789279 systemd[1]: Started cri-containerd-13d14686674009fccd19a35967e97510d10317b7f62e89851a7c69407c45aef8.scope. Oct 2 19:40:14.809800 systemd[1]: Started cri-containerd-41e72b8a8cc417295271b1bfcb245a5448058652bd5c46997169526da0e8edd6.scope. Oct 2 19:40:14.832970 kernel: audit: type=1400 audit(1696275614.811:1472): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.833106 kernel: audit: type=1400 audit(1696275614.811:1473): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.860910 kernel: audit: type=1400 audit(1696275614.811:1474): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.870894 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1214616445.mount: Deactivated successfully. Oct 2 19:40:14.878349 kernel: audit: type=1400 audit(1696275614.811:1475): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.896473 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:40:14.896591 kernel: audit: type=1400 audit(1696275614.811:1476): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.858000 audit: BPF prog-id=183 op=LOAD Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { bpf } for pid=6235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2570 pid=6235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:40:14.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133643134363836363734303039666363643139613335393637653937 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2570 pid=6235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:40:14.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133643134363836363734303039666363643139613335393637653937 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { bpf } for pid=6235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { bpf } for pid=6235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { bpf } for pid=6235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { bpf } for pid=6235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { bpf } for pid=6235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit: BPF prog-id=184 op=LOAD Oct 2 19:40:14.859000 audit[6235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000312290 items=0 ppid=2570 pid=6235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:40:14.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133643134363836363734303039666363643139613335393637653937 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { bpf } for pid=6235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { bpf } for pid=6235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { bpf } for pid=6235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit[6235]: AVC avc: denied { bpf } for pid=6235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.859000 audit: BPF prog-id=185 op=LOAD Oct 2 19:40:14.859000 audit[6235]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003122d8 items=0 ppid=2570 pid=6235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:40:14.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133643134363836363734303039666363643139613335393637653937 Oct 2 19:40:14.859000 audit: BPF prog-id=185 op=UNLOAD Oct 2 19:40:14.859000 audit: BPF prog-id=184 op=UNLOAD Oct 2 19:40:14.860000 audit[6235]: AVC avc: denied { bpf } for pid=6235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.860000 audit[6235]: AVC avc: denied { bpf } for pid=6235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.860000 audit[6235]: AVC avc: denied { bpf } for pid=6235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.860000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.860000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.860000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.860000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.860000 audit[6235]: AVC avc: denied { perfmon } for pid=6235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.860000 audit[6235]: AVC avc: denied { bpf } for pid=6235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.860000 audit[6235]: AVC avc: denied { bpf } for pid=6235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.860000 audit: BPF prog-id=186 op=LOAD Oct 2 19:40:14.860000 audit[6235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003126e8 items=0 ppid=2570 pid=6235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:40:14.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133643134363836363734303039666363643139613335393637653937 Oct 2 19:40:14.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:14.936346 env[1342]: time="2023-10-02T19:40:14.936280272Z" level=info msg="StartContainer for \"13d14686674009fccd19a35967e97510d10317b7f62e89851a7c69407c45aef8\" returns successfully" Oct 2 19:40:14.960074 env[1342]: time="2023-10-02T19:40:14.959968481Z" level=info msg="StartContainer for \"41e72b8a8cc417295271b1bfcb245a5448058652bd5c46997169526da0e8edd6\" returns successfully" Oct 2 19:40:15.228096 systemd[1]: cri-containerd-14f9b0f44e1862aebcdaba8f57bfa24793f8989902d978d17600dc2a4ce9aa0d.scope: Deactivated successfully. Oct 2 19:40:15.228400 systemd[1]: cri-containerd-14f9b0f44e1862aebcdaba8f57bfa24793f8989902d978d17600dc2a4ce9aa0d.scope: Consumed 3.606s CPU time. Oct 2 19:40:15.237000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:40:15.237000 audit: BPF prog-id=103 op=UNLOAD Oct 2 19:40:15.265716 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-14f9b0f44e1862aebcdaba8f57bfa24793f8989902d978d17600dc2a4ce9aa0d-rootfs.mount: Deactivated successfully. Oct 2 19:40:15.312434 env[1342]: time="2023-10-02T19:40:15.312373770Z" level=info msg="shim disconnected" id=14f9b0f44e1862aebcdaba8f57bfa24793f8989902d978d17600dc2a4ce9aa0d Oct 2 19:40:15.312805 env[1342]: time="2023-10-02T19:40:15.312778072Z" level=warning msg="cleaning up after shim disconnected" id=14f9b0f44e1862aebcdaba8f57bfa24793f8989902d978d17600dc2a4ce9aa0d namespace=k8s.io Oct 2 19:40:15.312903 env[1342]: time="2023-10-02T19:40:15.312888973Z" level=info msg="cleaning up dead shim" Oct 2 19:40:15.323197 env[1342]: time="2023-10-02T19:40:15.323145419Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:40:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6316 runtime=io.containerd.runc.v2\n" Oct 2 19:40:15.699899 kubelet[2463]: I1002 19:40:15.699541 2463 scope.go:115] "RemoveContainer" containerID="14f9b0f44e1862aebcdaba8f57bfa24793f8989902d978d17600dc2a4ce9aa0d" Oct 2 19:40:15.703205 env[1342]: time="2023-10-02T19:40:15.703162929Z" level=info msg="CreateContainer within sandbox \"7cd6f9959e182e2e61ad02cd6d932c368c79847d4aec5a401e89957a9237fee7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Oct 2 19:40:15.754779 env[1342]: time="2023-10-02T19:40:15.754727462Z" level=info msg="CreateContainer within sandbox \"7cd6f9959e182e2e61ad02cd6d932c368c79847d4aec5a401e89957a9237fee7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"73f7396e4fafff5ebe5ea7772ea1071184c9ebeb7c89b9f04002146ab2ddf041\"" Oct 2 19:40:15.755473 env[1342]: time="2023-10-02T19:40:15.755443165Z" level=info msg="StartContainer for \"73f7396e4fafff5ebe5ea7772ea1071184c9ebeb7c89b9f04002146ab2ddf041\"" Oct 2 19:40:15.782285 systemd[1]: Started cri-containerd-73f7396e4fafff5ebe5ea7772ea1071184c9ebeb7c89b9f04002146ab2ddf041.scope. Oct 2 19:40:15.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.808000 audit: BPF prog-id=191 op=LOAD Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2224 pid=6338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:40:15.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663733393665346661666666356562653565613737373265613130 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2224 pid=6338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:40:15.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663733393665346661666666356562653565613737373265613130 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit: BPF prog-id=192 op=LOAD Oct 2 19:40:15.809000 audit[6338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003be520 items=0 ppid=2224 pid=6338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:40:15.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663733393665346661666666356562653565613737373265613130 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit: BPF prog-id=193 op=LOAD Oct 2 19:40:15.809000 audit[6338]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003be568 items=0 ppid=2224 pid=6338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:40:15.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663733393665346661666666356562653565613737373265613130 Oct 2 19:40:15.809000 audit: BPF prog-id=193 op=UNLOAD Oct 2 19:40:15.809000 audit: BPF prog-id=192 op=UNLOAD Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { perfmon } for pid=6338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit[6338]: AVC avc: denied { bpf } for pid=6338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:40:15.809000 audit: BPF prog-id=194 op=LOAD Oct 2 19:40:15.809000 audit[6338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003be978 items=0 ppid=2224 pid=6338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:40:15.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663733393665346661666666356562653565613737373265613130 Oct 2 19:40:15.859892 env[1342]: time="2023-10-02T19:40:15.859831735Z" level=info msg="StartContainer for \"73f7396e4fafff5ebe5ea7772ea1071184c9ebeb7c89b9f04002146ab2ddf041\" returns successfully" Oct 2 19:40:16.685000 audit[6349]: AVC avc: denied { watch } for pid=6349 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:40:16.685000 audit[6349]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000134e40 a2=fc6 a3=0 items=0 ppid=2224 pid=6349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:40:16.685000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:40:16.685000 audit[6349]: AVC avc: denied { watch } for pid=6349 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:40:16.685000 audit[6349]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003fcc20 a2=fc6 a3=0 items=0 ppid=2224 pid=6349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c11,c313 key=(null) Oct 2 19:40:16.685000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:40:18.509828 kubelet[2463]: E1002 19:40:18.509678 2463 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.0-a-58c23d0da1.178a61adaa822558", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.0-a-58c23d0da1", UID:"2db16e4dd71ecff5cb904318016c81b9", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-58c23d0da1"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 40, 8, 176305496, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 40, 8, 176305496, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.17:59906->10.200.8.11:2379: read: connection timed out' (will not retry!) Oct 2 19:40:19.277624 kubelet[2463]: E1002 19:40:19.277582 2463 controller.go:187] failed to update lease, error: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.17:60092->10.200.8.11:2379: read: connection timed out Oct 2 19:40:20.137846 kubelet[2463]: E1002 19:40:20.137815 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-zkktv" podUID=9db93d66-a5b1-4650-8909-6c7dd8f8180f Oct 2 19:40:21.137024 env[1342]: time="2023-10-02T19:40:21.136977947Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:40:21.452249 env[1342]: time="2023-10-02T19:40:21.452164219Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:40:21.457162 env[1342]: time="2023-10-02T19:40:21.457101739Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:40:21.457516 kubelet[2463]: E1002 19:40:21.457483 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:40:21.457998 kubelet[2463]: E1002 19:40:21.457532 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:40:21.457998 kubelet[2463]: E1002 19:40:21.457665 2463 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-xlc4s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-rsg2v_calico-system(a5d62a24-4dd0-4595-85ba-03387a0bd553): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:40:21.459161 env[1342]: time="2023-10-02T19:40:21.459128347Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:40:21.774852 env[1342]: time="2023-10-02T19:40:21.774607921Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:40:21.779417 env[1342]: time="2023-10-02T19:40:21.779363341Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:40:21.779639 kubelet[2463]: E1002 19:40:21.779610 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:40:21.779727 kubelet[2463]: E1002 19:40:21.779652 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:40:21.779814 kubelet[2463]: E1002 19:40:21.779792 2463 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-xlc4s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-rsg2v_calico-system(a5d62a24-4dd0-4595-85ba-03387a0bd553): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:40:21.779983 kubelet[2463]: E1002 19:40:21.779913 2463 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-rsg2v" podUID=a5d62a24-4dd0-4595-85ba-03387a0bd553 Oct 2 19:40:22.588000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:40:22.594469 kernel: kauditd_printk_skb: 239 callbacks suppressed Oct 2 19:40:22.596005 kernel: audit: type=1400 audit(1696275622.588:1522): avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:40:22.588000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:40:22.630939 kernel: audit: type=1400 audit(1696275622.588:1521): avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:40:22.632404 kernel: audit: type=1300 audit(1696275622.588:1521): arch=c000003e syscall=254 success=no exit=-13 a0=56 a1=c010bdd9e0 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:40:22.588000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=56 a1=c010bdd9e0 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:40:22.655308 kernel: audit: type=1327 audit(1696275622.588:1521): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:40:22.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:40:22.588000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c001df0220 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:40:22.695173 kernel: audit: type=1300 audit(1696275622.588:1522): arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c001df0220 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:40:22.696533 kernel: audit: type=1327 audit(1696275622.588:1522): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:40:22.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:40:22.595000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7137 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:40:22.735831 kernel: audit: type=1400 audit(1696275622.595:1523): avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7137 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:40:22.595000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=56 a1=c010bddad0 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:40:22.595000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:40:22.781034 kernel: audit: type=1300 audit(1696275622.595:1523): arch=c000003e syscall=254 success=no exit=-13 a0=56 a1=c010bddad0 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:40:22.782596 kernel: audit: type=1327 audit(1696275622.595:1523): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:40:22.783190 kernel: audit: type=1400 audit(1696275622.610:1524): avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:40:22.610000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7143 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:40:22.610000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=56 a1=c010ade150 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:40:22.610000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:40:22.700000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=6864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:40:22.700000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=56 a1=c001df0460 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:40:22.700000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:40:22.700000 audit[2288]: AVC avc: denied { watch } for pid=2288 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7141 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:40:22.700000 audit[2288]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=56 a1=c010bddbc0 a2=fc6 a3=0 items=0 ppid=2153 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c391 key=(null) Oct 2 19:40:22.700000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Oct 2 19:40:23.137789 env[1342]: time="2023-10-02T19:40:23.137748033Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:40:23.439577 env[1342]: time="2023-10-02T19:40:23.439506908Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:40:23.444774 env[1342]: time="2023-10-02T19:40:23.444715829Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:40:23.445037 kubelet[2463]: E1002 19:40:23.445007 2463 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:40:23.445475 kubelet[2463]: E1002 19:40:23.445062 2463 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:40:23.445475 kubelet[2463]: E1002 19:40:23.445231 2463 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-t8xsv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6954bc65f6-kvgmt_calico-apiserver(4f76841c-7b97-4f9f-9233-1d054c0cf197): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:40:23.445475 kubelet[2463]: E1002 19:40:23.445302 2463 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6954bc65f6-kvgmt" podUID=4f76841c-7b97-4f9f-9233-1d054c0cf197